WO2014180448A1 - Method and device for protecting ptn network service - Google Patents

Method and device for protecting ptn network service Download PDF

Info

Publication number
WO2014180448A1
WO2014180448A1 PCT/CN2014/079990 CN2014079990W WO2014180448A1 WO 2014180448 A1 WO2014180448 A1 WO 2014180448A1 CN 2014079990 W CN2014079990 W CN 2014079990W WO 2014180448 A1 WO2014180448 A1 WO 2014180448A1
Authority
WO
WIPO (PCT)
Prior art keywords
protection
service
link
paths
circle
Prior art date
Application number
PCT/CN2014/079990
Other languages
French (fr)
Chinese (zh)
Inventor
陈捷
欧雪刚
于洪宾
罗伟
李兴明
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2014180448A1 publication Critical patent/WO2014180448A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/64Hybrid switching systems
    • H04L12/6418Hybrid transport

Abstract

The present invention discloses a method and device for protecting PTN network service, and relates, within communication network planning and design, to PTN network service planning technology based on P-cycle protection. The method comprises: traversing each service within a PTN network service grouping, establishing a service path for said each service route, and obtaining N service routes corresponding to N services; configuring, for each link within each service path of each of the N service paths, a protective ring suitable for multiple services; establishing two protection paths for already-configured protective rings of any link through which multiple service paths of the N service paths pass, and causing said two protection paths to respectively provide protection to the link service groupings of said protective rings. The present invention advantageously utilizes indivisible characteristics of PTN service flow and high-efficiency P-ring protection to configure two protection path P-ring protection for crossover links, thus increasing network bandwidth utilization rates.

Description

一种对 PTN网络业务进行保护的方法及装置 技术领域 本发明涉及网络规划技术与计算机应用相结合的技术领域, 特别涉及通信网络规 划设计中的基于 P-cycle保护的 PTN网络业务规划技术, 即, 使 PTN网络中的业务满 足 P-cycle保护, 同时使配置出的 P-cycle需求容量最小, 而提供的保护能力最大的一 种提高网络带宽利用率的规划方法及装置。 背景技术 分组传送网 (PTN: Packet Transport Network)是新一代基于分组的、 面向连接的 多业务传送技术, 不仅能较好地承载电信级以太网业务, 而且兼顾了传统的试验数据 管理 /技术数据管理 (TDM: Testing Data Management/Technical Data Management) 业 务。 在我国运营商的城域网中, PTN技术主要定位于城域的汇聚接入层, 网络主要承 载的业务有: 第二 /三代移动通信技术 (2nd/3rd-generation) 基站业务、 集团专线和互 联网大客户业务、内部业务(营业厅数据通信网络( DCN: Data Communication Network) 和网路协定电视(IPTV: Internet Protocol Television ) ) 光线路终端(OLT: Optical Line Terminal ) 无线局域网络 (WLAN: Wireless Local Area Networks ) 环境监控等多种 高质分组业务。所以一旦网络中链路或节点失效将中断大量的业务,造成巨大的损失。 预配置保护环 (P-cycle: Preconfigured protection cycle), 具有对 P圈上链路和跨 段链路都提供保护的能力。 PTN网络中,为业务的工作标记交换路径 (LSP: Label Switch Path) 配置的 P圈为 LSP双向隧道环。 随着业务规模日益扩大, 网络的生存性显得越来越重要。 另外, 带宽需求的增加 使得网络的带宽资源更加紧张。 这就迫使我们在考虑 PTN网络业务生存能力的同时, 也得兼顾带宽的利用率。 发明内容 本发明实施例的目的在于提供一种对 PTN网络业务进行保护的方法及装置,能够 解决在链路失效时, 无法高效率的保护链路上的业务带宽, 导致网络带宽利用率低的 问题。 根据本发明的一个实施例, 提供了一种对 PTN网络业务进行保护的方法, 包括: 遍历 PTN网络业务集合中的每个业务, 对所述每个业务路由建立业务路径, 得到 对应于 N个业务的 N条业务路径; 为 N条业务路径之每条业务路径中的每条链路配置适合于多业务的保护圈; 对 N条业务路径中多条业务路径所经过任一链路的已配置的保护圈, 建立两条保 护路径, 使所述两条保护路径分别对该保护圈的链路业务集合提供保护。 优选地, 按照已用工作带宽从大到小的顺序对所述每条业务路径中的每条链路进 行降序排序, 并依次遍历所述每条链路; 从预置的保护圈数据库中找出包含所述每条链路的所有保护圈, 并计算出配置每 个保护圈所需的工作带宽及其本身的冗余率; 按照所述冗余率从小到大的顺序对所述所有保护圈依次进行判断, 得到所述每条 链路的保护圈。 优选地,所述的按照所述冗余率从小到大的顺序对所述所有保护圈依次进行判断, 得到所述每条链路的保护圈包括: 将配置每个保护圈所需的工作带宽依次与该保护圈的链路剩余带宽进行比较; 若所述链路剩余带宽大于配置该保护圈所需的工作带宽, 则确定所述保护圈为该 链路的保护圈。 优选地, 所述方法还包括: 若所述保护圈的部分链路存在保护圈, 则删除包含所述部分链路的所有保护圈; 对删除的所有保护圈中需要保护的链路重新进行配置, 得到适合于多业务的保护 圈。 优选地, 所述的建立两条保护路径, 使所述两条保护路径分别对该保护圈的链路 业务集合提供保护包括: 从已配置的保护圈中划分出两条独立的保护路径; 对该保护圈的链路业务集合进行划分, 得到其业务工作带宽总和相等或相近似的 两个子业务集合; 将所述的两个子业务集合分别配置给所述的两条独立的保护路径。 优选地, 所述的配置每个保护圈所需的工作带宽为, 所述两个子业务集合中业务 工作带宽总和的最大值。 根据本发明的另一实施例, 提供了一种对 PTN网络业务进行保护的装置, 包括: 业务路径模块, 设置为遍历 PTN网络业务集合中的每个业务, 对所述每个业务路 由建立业务路径, 得到对应于 N个业务的 N条业务路径; 配置模块, 设置为为 N条业务路径之每条业务路径中的每条链路配置适合于多业 务的保护圈; 倒换配置模块, 设置为对 N条业务路径中多条业务路径所经过任一链路的已配置 的保护圈, 建立两条保护路径, 使所述两条保护路径分别对该保护圈的链路业务集合 提供保护。 优选地, 所述的配置模块包括: 遍历子模块, 设置为按照已用工作带宽从大到小的顺序对所述每条业务路径中的 每条链路进行降序排序, 并依次遍历所述每条链路; 计算子模块, 设置为从预置的保护圈数据库中找出包含所述每条链路的所有保护 圈, 并计算出配置每个保护圈所需的工作带宽及其本身的冗余率; 判断子模块, 设置为按照所述冗余率从小到大的顺序对所述所有保护圈依次进行 判断, 得到所述每条链路的保护圈。 优选地, 所述装置还包括: 重新配置子模块, 设置为若所述保护圈的部分链路存在保护圈, 则删除包含所述 部分链路的所有保护圈, 对删除的所有保护圈中需要保护的链路重新进行配置, 得到 适合于多业务的保护圈。 优选地, 所述的倒换配置模块包括: 保护圈划分子模块, 设置为从已配置的保护圈中划分出两条独立的保护路径; 集合划分子模块, 设置为对该保护圈的链路业务集合进行划分, 得到其业务工作 带宽总和相等或相近似的两个子业务集合; 分配保护子模块, 设置为将所述的两个子业务集合分别配置给所述的两条独立的 保护路径。 与现有技术相比较, 本发明实施例的有益效果在于: 针对 PTN业务流量不可分割 的特点, 对业务的工作 LSP提供 P-cycle保护, 同时使配置出的 P-cycle能够对失效的 链路提供近似 2倍的高效保护能力, 有效地提高了网络带宽的利用率。 附图说明 图 1是本发明实施例提供的对 PTN网络业务进行保护的方法原理图; 图 2是本发明实施例提供的对 PTN网络业务进行保护的基于 P-cycle的 PTN网络 业务的装置结构图; 图 3是本发明实施例提供的对 PTN网络业务进行保护的 P圈工作和保护倒换说明 图; 图 4是本发明实施例提供的对 PTN网络业务进行保护的方法流程图; 图 5是本发明实施例提供的对 PTN网络业务进行保护的 PTN网络拓扑图; 图 6是本发明实施例提供的对 PTN网络业务进行保护的业务信息图; 以及 图 7是本发明实施例提供的对 PTN网络业务进行保护的 P-cycle规划图。 具体实施方式 以下结合附图对本发明的优选实施例进行详细说明, 应当理解, 以下所说明的优 选实施例仅用于说明和解释本发明, 并不用于限定本发明。 在本发明进行 PTN网络规划、 设计及优化时, 所述 PTN网络具有以下特点: ( 1 ) PTN网络拓扑结构根据实际应用已知, 包括节点数和节点连通情况。 TECHNICAL FIELD The present invention relates to the technical field of combining network planning technology and computer application, and particularly relates to a PTN network service planning technology based on P-cycle protection in communication network planning and design, that is, A planning method and apparatus for improving the network bandwidth utilization by ensuring that the services in the PTN network satisfy the P-cycle protection while minimizing the configured P-cycle demand capacity and providing the greatest protection capability. BACKGROUND OF THE INVENTION Packet Transport Network (PTN) is a new generation of packet-based, connection-oriented multi-service transmission technology, which not only can better carry carrier-class Ethernet services, but also takes into account traditional experimental data management/technical data. Management (TDM: Testing Data Management/Technical Data Management) business. In the metropolitan area network of China's operators, the PTN technology is mainly located in the aggregation access layer of the metropolitan area. The main services carried by the network are: Second/third generation mobile communication technology (2 n d/3rd-gener a tion) Base station service , Group line and Internet major customer business, internal business (DCN: Data Communication Network and IPTV (Internet Protocol Television)) Optical line terminal (OLT: Optical Line Terminal) WLAN (WLAN: Wireless Local Area Networks) A variety of high-quality packet services such as environmental monitoring. Therefore, once a link or node fails in the network, a large amount of services will be interrupted, causing huge losses. P-cycle: Preconfigured protection cycle, which has the ability to protect both links on the P-ring and across the link. On the PTN network, the P-circle configured for the LSP (Label Switch Path) is the LSP bidirectional tunnel ring. As the scale of business grows, the survivability of the network becomes more and more important. In addition, the increase in bandwidth requirements makes the bandwidth resources of the network more tense. This forces us to consider the bandwidth utilization while considering the survivability of PTN network services. SUMMARY OF THE INVENTION An object of the present invention is to provide a method and a device for protecting a PTN network service, which can solve the problem that the service bandwidth on the link cannot be effectively protected when the link fails, resulting in low network bandwidth utilization. problem. According to an embodiment of the present invention, a method for protecting a PTN network service is provided, including: Traversing each service in the PTN network service set, establishing a service path for each of the service routes, and obtaining N service paths corresponding to N services; each link in each of the N service paths Configuring a protection circle suitable for multiple services; establishing two protection paths for the configured protection circle of any link through which multiple service paths pass through the N service paths, so that the two protection paths respectively belong to the chain of the protection circle The road business collection provides protection. Preferably, each link in each of the service paths is sorted in descending order according to the used working bandwidth from large to small, and each link is traversed in sequence; and the preset protection circle database is used to find Outing all the protection rings of each link, and calculating the working bandwidth required for each protection ring and its own redundancy rate; all the protections are performed according to the redundancy ratio from small to large. The circle sequentially determines to obtain the protection ring of each link. Preferably, the all protection rings are sequentially determined according to the redundancy ratio from small to large, and the protection ring of each link is obtained: the working bandwidth required for each protection ring to be configured And comparing with the remaining bandwidth of the link of the protection ring; if the remaining bandwidth of the link is greater than the working bandwidth required to configure the protection ring, determining that the protection ring is a protection ring of the link. Preferably, the method further includes: deleting a protection ring including the part of the link if a part of the link of the protection ring exists; reconfiguring the link to be protected in all the protection rings that are deleted , get a protection circle suitable for multiple business. Preferably, the two protection paths are established, and the two protection paths respectively provide protection for the link service set of the protection circle, including: dividing two independent protection paths from the configured protection circle; The link service set of the protection circle is divided, and two sub-service sets whose service working bandwidths are equal or similar are obtained; The two sub-service sets are separately configured to the two independent protection paths. Preferably, the working bandwidth required for configuring each protection ring is the maximum value of the sum of service working bandwidths in the two sub-service sets. According to another embodiment of the present invention, an apparatus for protecting a PTN network service is provided, including: a service path module, configured to traverse each service in a PTN network service set, and establish a service for each service route The path is configured to obtain N service paths corresponding to the N services; the configuration module is configured to configure a protection ring suitable for multiple services for each link in each of the N service paths; the switching configuration module is set to Two protection paths are established for the configured protection ring of any one of the N service paths, and the two protection paths respectively provide protection for the link service collection of the protection circle. Preferably, the configuration module includes: a traversal sub-module, configured to perform a descending ordering of each link in each of the service paths in descending order of used working bandwidth, and sequentially traverse each of the links a link sub-module, configured to find all the protection rings including each of the links from the preset protection circle database, and calculate the working bandwidth required for configuring each protection ring and its own redundancy The determining sub-module is configured to sequentially determine all the protection rings according to the redundancy ratio from small to large, to obtain the protection ring of each link. Preferably, the device further includes: a reconfiguration sub-module, configured to delete all protection rings including the partial link if a part of the link of the protection ring has a protection ring, and need to delete all the protection rings The protected link is reconfigured to obtain a protection circle suitable for multiple services. Preferably, the switching configuration module includes: a protection circle dividing sub-module, configured to divide two independent protection paths from the configured protection circle; and the set dividing sub-module is set as a link service to the protection ring The set is divided into two sub-service sets whose service working bandwidths are equal or similar; The protection protection sub-module is configured to separately configure the two sub-service sets to the two independent protection paths. Compared with the prior art, the beneficial effects of the embodiments of the present invention are as follows: P-cycle protection is provided for the working LSP of the service, and the configured P-cycle can be used for the failed link, for the inseparable feature of the PTN service traffic. Provides approximately 2 times more efficient protection, effectively improving the utilization of network bandwidth. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a schematic diagram of a method for protecting a PTN network service according to an embodiment of the present invention; FIG. 2 is a device structure of a P-cycle based PTN network service for protecting a PTN network service according to an embodiment of the present invention; FIG. 3 is a schematic diagram of a P-circle operation and protection switching for protecting a PTN network service according to an embodiment of the present invention; FIG. 4 is a flowchart of a method for protecting a PTN network service according to an embodiment of the present invention; The PTN network topology diagram for protecting the PTN network service provided by the embodiment of the present invention; FIG. 6 is a service information diagram for protecting the PTN network service according to the embodiment of the present invention; and FIG. 7 is a PTN provided by the embodiment of the present invention. P-cycle plan for network service protection. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS The preferred embodiments of the present invention are described in detail below with reference to the accompanying drawings. When the PTN network is planned, designed, and optimized according to the present invention, the PTN network has the following features: (1) The PTN network topology is known according to actual applications, including the number of nodes and the connectivity of nodes.
(2) 对于业务的带宽需求, 每个网络节点有完全的分配波长的能力。 (2) For the bandwidth requirements of the service, each network node has the ability to fully allocate wavelengths.
(3 ) PTN 网络设备有控制平面, 从而支持业务工作路径在受影响情况下, 倒换 到保护路径。 (3) The PTN network device has a control plane, so that the service working path is switched to the protection path under the affected condition.
(4) 网络中的 P圈是指 LSP隧道保护环。 本发明涉及的 PTN网络业务路由具体规则和相关参数如下: (1) 具体规则: (4) The P circle in the network refers to the LSP tunnel protection ring. The specific rules and related parameters of the PTN network service routing involved in the present invention are as follows: (1) Specific rules:
PTN网络业务是有向的,且上下行业务并不一定对称,在进行路由、建立工作 LSP 时采用有向带权图的 Dijkstra最短路径算法。 (2) 相关参数: 网络拓扑可以通过一个有向图 G (N, E) 表示。 根据实际应用, 拓扑结构已知, 节点间的链路已知, 带宽已知。 相关参数如下: The PTN network service is directed, and the uplink and downlink services are not necessarily symmetric. The Dijkstra shortest path algorithm with directed weighted graph is used in routing and establishing working LSP. (2) Related parameters: The network topology can be represented by a directed graph G (N, E). According to the actual application, the topology is known, the links between nodes are known, and the bandwidth is known. The relevant parameters are as follows:
N: N为节点设备集合, n=|N|, 为节点个数。 N: N is the set of node devices, n=|N|, which is the number of nodes.
E: 网络链路集合, d=|£|为链路数, 节点间可以有多条链路。 连通节点之间的链 路由 2根传输方向相反的光纤链路组成。 E: Network link set, d=|£| is the number of links, there can be multiple links between nodes. Chain routing between connected nodes consists of two fiber links with opposite transmission directions.
M: 表示光纤集合, M2, ……, M , m表示网络的光纤数, 由于 节点间可以存在多条链路, 所以 m=2d。 M: indicates the fiber collection, M 2 , ..., M , m indicates the number of fibers in the network. Since there may be multiple links between nodes, m=2d.
T: 业务集合 (这里假设为配置 P-cycle保护的业务), T={TX, Τ2, ……, Tc、, c为任意常数, 表示业务数。 Tf: P-cycle保护设计失败的业务集合 (包括建立工作 LSP失败的业务)。 T: Service set (here assumed to be a P-cycle protected service), T={T X , Τ 2 , ..., T c , and c are arbitrary constants, indicating the number of services. T f : P-cycle protects the service set that the design fails (including the service that fails to establish a working LSP).
Ts: 配置 P-cycle成功的业务集合。 T s : Configure the P-cycle successful service collection.
Pa: 网络 P圈数据库。 P a : Network P circle database.
Ps: 网络中已路由业务配置的 P圈集合。 P s : A set of P-circles for routing service configurations in the network.
PLi: 包含链路 A的 P圈集合。 E(i): 圈 的冗余率。 P Li : Contains the P circle set of link A. E(i): The redundancy ratio of the circle.
Wp: 所有已路由业务工作 LSP经过的链路, 初始化为空。 图 1是本发明实施例提供的对 PTN网络业务进行保护的方法原理图,如图 1所示, 具体步骤如下: 步骤 SI : 遍历 PTN网络业务集合中的每个业务, 对所述每个业务路由建立业务 路径, 得到对应于 N个业务的 N条业务路径。 步骤 S2:为 N条业务路径之每条业务路径中的每条链路配置适合于多业务的保护 圈。 在步骤 S2中,按照已用工作带宽从大到小的顺序对所述每条业务路径中的每条链 路进行降序排序, 并依次遍历所述每条链路; 从预置的保护圈数据库中找出包含所述每条链路的所有保护圈, 并计算出配置每 个保护圈所需的工作带宽及其本身的冗余率; 按照所述冗余率从小到大的顺序对所述所有保护圈依次进行判断, 得到所述每条 链路的保护圈。 进一步地, 所述的按照所述冗余率从小到大的顺序对所述所有保护圈依次进行判 断, 得到所述每条链路的保护圈包括: 将配置每个保护圈所需的工作带宽依次与该保护圈的链路剩余带宽进行比较; 若所述链路剩余带宽大于配置该保护圈所需的工作带宽, 则确定所述保护圈为该 链路的保护圈。 进一步地, 若所述保护圈的部分链路存在保护圈, 则删除包含所述部分链路的所 有保护圈; 对删除的所有保护圈中需要保护的链路重新进行配置, 得到适合于多业务 的保护圈。 步骤 S3 :对 N条业务路径中多条业务路径所经过任一链路的已配置的保护圈,建 立两条保护路径, 使所述两条保护路径分别对该保护圈的链路业务集合提供保护。 进一步地, 所述的建立两条保护路径, 使所述两条保护路径分别对该保护圈的链 路业务集合提供保护的步骤包括: 从已配置的保护圈中划分出两条独立的保护路径; 对该保护圈的链路业务集合进行划分, 得到其业务工作带宽总和相等或相近似的 两个子业务集合; 将所述的两个子业务集合分别配置给所述的两条独立的保护路径。 进一步地, 所述的配置每个保护圈所需的工作带宽为, 所述两个子业务集合中业 务工作带宽总和的最大值。 图 2是本发明实施例提供的对 PTN网络业务进行保护的装置结构图,如图 2所示, 包括: 业务路径模块、 配置模块和倒换配置模块。 所述业务路径模块设置为遍历 PTN网络业务集合中的每个业务,对所述每个业务 路由建立业务路径, 得到对应于 N个业务的 N条业务路径。 所述配置模块设置为为 N条业务路径之每条业务路径中的每条链路配置适合于多 业务的保护圈。 其中, 所述配置模块的遍历子模块设置为按照已用工作带宽从大到小 的顺序对所述每条业务路径中的每条链路进行降序排序, 并依次遍历所述每条链路。 所述配置模块的计算子模块设置为从预置的保护圈数据库中找出包含所述每条链路的 所有保护圈, 并计算出配置每个保护圈所需的工作带宽及其本身的冗余率。 所述配置 模块的判断子模块设置为按照所述冗余率从小到大的顺序对所述所有保护圈依次进行 判断, 得到所述每条链路的保护圈。 所述配置模块的重新配置子模块设置为若所述保 护圈的部分链路存在保护圈, 则删除包含所述部分链路的所有保护圈, 对删除的所有 保护圈中需要保护的链路重新进行配置, 得到适合于多业务的保护圈。 所述倒换配置模块设置为对 N条业务路径中多条业务路径所经过任一链路的已配 置的保护圈, 建立两条保护路径, 使所述两条保护路径分别对该保护圈的链路业务集 合提供保护。 其中, 所述倒换配置模块的保护圈划分子模块设置为从已配置的保护圈 中划分出两条独立的保护路径。 所述倒换配置模块的集合划分子模块设置为对该保护 圈的链路业务集合进行划分, 得到其业务工作带宽总和相等或相近似的两个子业务集 合。 所述倒换配置模块的分配保护子模块设置为将所述的两个子业务集合分别配置给 所述的两条独立的保护路径。 图 3是本发明实施例提供的对 PTN网络业务进行保护的 P圈工作和保护倒换说明 图, 如图 3所示, 粗线为配置的 P圈环上链路(A-B-C-D-E-F-A)。 图 3 (a)是 P圈跨 接链路 B-E上的 PTN网络业务工作情况。 图 3 (b) 是 B-E链路失效时, P圈对受影 响的 PTN网络业务提供保护的倒换方式。 如图 3 (a) 中所示, 链路上已标出工作容量 (单位: Mbps), 环上链路的上下行 光纤工作带宽相同, 如 A-B链路上下行光纤工作带宽各为 5M。 在跨接链路 B-E处, E-B虚线箭头表示从节点 E到 B方向的光纤上的工作流量, (6, 1 ) 表示该流量由带 宽分别为 1, 6的业务组成。 同理, B-E虚线箭头表示从节点 B到 E方向的光纤上的 工作流量, (4, 5, 3 ) 表示该流量由带宽分别为 3, 4, 5的业务组成。 针对 PTN业务流量不可分割的特点, 配置 P圈的策略是: 将已用工作带宽最大的 链路作为跨接链路, 然后将此链路上的业务带宽集合分为两个带宽总和相近的集合。 在此链路失效时, 两个集合的业务流量可以分别被 P圈上两条路径保护。 在图 3 (a) 中 B-E方向光纤承载的业务带宽集合为 (3, 4, 5 )。 在 B-E链路失效 时,如图 3 (b)虚线箭头所示,让带宽(3, 4)的业务流量(即总带宽为 7M)由 B-A-F-E 进行保护, 带宽为 5的业务流量由 B-C-D-E进行保护。 E-B方向光纤工作带宽之和为 7M, 该流量由 E-F-A-B进行保护。 通过该策略, 我们对 P圈配置 7M带宽就可以实现 对环上和跨接链路的保护。 图 4是本发明实施例提供的对 PTN网络业务进行保护的方法流程图,如图 4所示, 包括如下步骤: 步骤 401 : 根据网络拓扑, 采用基于 K最短路由算法构造最小 P圈和服务等级协 议 (SLA: Service -Level Agreement) 算法构建 P圈数据库 (包括基本圈和扩展圈)。 对集合 T中的业务按优先级进行排序。 步骤 402: 依次遍历集合 Γ中的业务, 若已处理完所有业务, 则算法结束。 步骤 403 : 对业务 路由, 建立工作 LSP。 若 ;业务路由失败, 则加入集合 7>, 返回步骤 402; 若路由成功, 则建立工作 LSP, 将该 LSP经过的链路加入集合 , 然 后按照已用的工作带宽大小对 链路降序排序。 步骤 404: 依次遍历处理集合 的链路, 若已处理完所有链路, 新加的业务 ;能 够进行 P圈保护, 则将 加入集合 7;, 返回步骤 402。 步骤 405:根据 P圈数据库 ,找到包含未处理链路 J,的所有 P圈,记为集合 ^。 计算出 ^中每个 P圈需要的带宽和冗余率, 依次取出冗余率最小的 P圈, 选中的 P 圈记为 。 其中, P圈的带宽采用图 3 (b) 计算 P圈带宽的方法。 步骤 406: 查看圈 光纤剩余带宽。 若存在光纤剩余带宽小于配置该 P圈所需的 带宽, 则取冗余率较大的另一个 P圈 +1, 然后再判断该 P圈中的光纤剩余容量是否 满足。直到在集合 ^中找到一个容量满足的 P圈。若未找到这样的 P圈, 则将不能配 置 P圈的新加业务 ;加入 7>, 还原集合 , 返回步骤 402; 若存在这样的圈 S, 将 该圈加入集合 , 删除 中由所找到的圈 保护的链路, 更新圈 中的所有光纤剩 余带宽。 若 的部分链路已经在集合 中存在 P圈保护, 则记录已保护的链路集合为 L, 删除 A中保护链路集合 的所有 P圈, 同时对删除的 P圈链路容量更新, 为删除的 P 圈中需要保护的业务工作链路配置 P圈保护, 将配置的 P圈加入 。 返回步骤 404。 其中, P 圈冗余率 £ )定义为配置圈 A所消耗的网络容量与实际保护的工作容量 的比值, 冗余率计算采用如下公式: Wp: The link through which all LSPs of the routed service work are initialized to null. FIG. 1 is a schematic diagram of a method for protecting a PTN network service according to an embodiment of the present invention. As shown in FIG. 1 , the specific steps are as follows: Step SI: traverse each service in the PTN network service set, establish a service path for each service route, and obtain N service paths corresponding to N services. Step S2: configuring a protection ring suitable for multiple services for each link in each of the N service paths. In step S2, each link in each of the service paths is sorted in descending order according to the used working bandwidth from large to small, and each link is traversed in sequence; from the preset protection circle database Finding all the protection rings including each of the links, and calculating the working bandwidth required for configuring each protection ring and its own redundancy rate; according to the order of the redundancy ratio from small to large All the protection rings are judged in turn to obtain the protection ring of each link. Further, the all protection rings are sequentially determined according to the redundancy ratio from small to large, and the protection ring of each link is obtained: the working bandwidth required for each protection ring is configured. And comparing with the remaining bandwidth of the link of the protection ring; if the remaining bandwidth of the link is greater than the working bandwidth required to configure the protection ring, determining that the protection ring is a protection ring of the link. Further, if a part of the link of the protection ring has a protection ring, all the protection rings including the part of the link are deleted; and the links to be protected in all the protection rings that are deleted are reconfigured to obtain a service suitable for multiple services. Protection ring. In the step S3, two protection paths are established for the configured protection ring of any one of the multiple service paths in the N service paths, so that the two protection paths respectively provide protection for the link service set of the protection ring. Further, the step of establishing two protection paths, so that the two protection paths respectively provide protection for the link service set of the protection circle includes: dividing two independent protection paths from the configured protection circle And dividing the link service set of the protection circle to obtain two sub-service sets whose service work bandwidths are equal or similar to each other; and configuring the two sub-service sets to the two independent protection paths respectively. Further, the working bandwidth required for configuring each protection circle is the maximum value of the sum of service working bandwidths in the two sub-service sets. 2 is a structural diagram of an apparatus for protecting a PTN network service according to an embodiment of the present invention. As shown in FIG. 2, the method includes: a service path module, a configuration module, and a switching configuration module. The service path module is configured to traverse each service in the PTN network service set, establish a service path for each service route, and obtain N service paths corresponding to N services. The configuration module is configured to configure a protection ring suitable for multiple services for each of each of the N service paths. The traversal sub-module of the configuration module is configured to perform descending ordering on each link in each service path according to the used working bandwidth from large to small, and traverse the each link in sequence. The calculation sub-module of the configuration module is configured to find all the protection rings including the each link from the preset protection circle database, and calculate the working bandwidth required for configuring each protection circle and its own redundancy. The rate. The determining sub-module of the configuration module is configured to sequentially determine all the protection rings according to the redundancy ratio from small to large, to obtain a protection ring of each link. The reconfiguration sub-module of the configuration module is configured to delete all the protection rings that include the part of the link if a part of the link of the protection ring has a protection ring, and re-protect the link that needs to be protected in all the protection rings that are deleted. Configure it to get a protection circle suitable for multiple services. The switching configuration module is configured to establish two protection paths for the configured protection ring of any one of the plurality of service paths in the N service paths, so that the two protection paths respectively link the service to the protection ring Collections provide protection. The protection circle division sub-module of the switching configuration module is configured to divide two independent protection paths from the configured protection circle. The set dividing sub-module of the switching configuration module is configured to divide the link service set of the protection circle, and obtain two sub-service sets whose service working bandwidths are equal or similar. The allocation protection sub-module of the switching configuration module is configured to separately configure the two sub-service sets to the two independent protection paths. FIG. 3 is a schematic diagram of a P-circle operation and a protection switching for protecting a PTN network service according to an embodiment of the present invention. As shown in FIG. 3, a thick line is a configured P-ring uplink link (ABCDEFA). Figure 3 (a) shows the operation of the PTN network service on the P-ring bridging link BE. Figure 3 (b) shows the switching mode of the P-circle to protect the affected PTN network service when the BE link fails. As shown in Figure 3 (a), the working capacity (unit: Mbps) is marked on the link, and the working bandwidth of the uplink and downlink fibers on the ring is the same. For example, the working bandwidth of the uplink and downlink fibers of the AB link is 5M each. At the bridging link BE, the EB dotted arrow indicates the working traffic on the fiber from the node E to the B direction, and (6, 1) indicates that the traffic consists of services with bandwidths of 1, 6, respectively. Similarly, the BE dotted arrow indicates the working traffic on the fiber from the Node B to the E direction, and (4, 5, 3) indicates that the traffic consists of services with bandwidths of 3, 4, and 5 respectively. The policy of configuring the P-circle is as follows: The link with the largest working bandwidth is used as the spanning link, and then the service bandwidth set on this link is divided into two sets with the same sum of bandwidths. . When this link fails, the traffic of the two sets can be protected by two paths on the P circle. In Figure 3 (a), the set of service bandwidths carried by the fiber in the BE direction is (3, 4, 5). When the BE link fails, as shown by the dotted arrow in Figure 3 (b), the traffic of the bandwidth (3, 4) (that is, the total bandwidth is 7M) is protected by the BAFE, and the traffic with the bandwidth of 5 is protected by the BCDE. . The sum of the working bandwidths of the EB direction fibers is 7M, which is protected by the EFAB. Through this strategy, we can protect the ring and crossover links by configuring 7M bandwidth for the P circle. FIG. 4 is a flowchart of a method for protecting a PTN network service according to an embodiment of the present invention. As shown in FIG. 4, the method includes the following steps: Step 401: According to a network topology, construct a minimum P-circle and a service level by using an algorithm based on K shortest path. The SLA (Service-Level Agreement) algorithm builds a P-circle database (including basic and extended circles). Sort the services in the set T by priority. Step 402: Traverse the services in the set 依次 in turn, and if all the services have been processed, the algorithm ends. Step 403: Establish a working LSP for the service route. If the service route fails, join the set 7>, and return to step 402. If the route is successful, the working LSP is established, the link through which the LSP passes is added to the set, and then the links are sorted in descending order according to the used working bandwidth. Step 404: Traverse the links of the processing set in sequence, if all the links have been processed, the newly added services; if the P-circle protection can be performed, the set 7 will be added; and the process returns to step 402. Step 405: According to the P-circle database, find all P-circles including the unprocessed link J, and record them as a set ^. Calculate the bandwidth and redundancy required for each P-ring in ^, and then take out the P-ring with the smallest redundancy rate, and the selected P-circle is recorded as. Among them, the bandwidth of the P circle uses the method of calculating the P-circle bandwidth in Figure 3 (b). Step 406: View the remaining bandwidth of the ring fiber. If the remaining bandwidth of the optical fiber is smaller than the bandwidth required for configuring the P-circle, another P-circle +1 with a larger redundancy ratio is taken, and then it is determined whether the remaining capacity of the optical fiber in the P-ring is satisfied. Until a circle of capacity is found in the set ^. If such a P circle is not found, the new service of the P circle cannot be configured; adding 7>, restoring the set, and returning to step 402; if there is such a circle S, adding the circle to the set, deleting the circle found by the circle Protected links, updating the remaining bandwidth of all fibers in the circle. If some links have P-circle protection in the set, record the protected link set as L, delete all P-rings of the protected link set in A, and update the deleted P-ring link capacity for deletion. In the P circle, the service working link that needs to be protected is configured with P-circle protection, and the configured P-ring is added. Returning to step 404. Among them, the P-ring redundancy rate is defined as the ratio of the network capacity consumed by the configuration circle A to the actual protected working capacity. The redundancy rate is calculated as follows:
E(k) = , 式中, Sw表示为配置该 P圈在光纤链路 上消耗的容
Figure imgf000011_0001
E(k) = , where S w represents the capacity consumed to configure the P-ring on the fiber link
Figure imgf000011_0001
量, w表示链路 上的可以被该 P圈保护的工作流量, J表示该 P圈所有光纤链路的 鱼朱 A n 图 5是本发明实施例提供的对 PTN网络业务进行保护的 PTN网络拓扑图,如图 5 所示, 每一个圆代表网络拓扑中的一个节点, 共有 8个节点, 链路为两条方向相反的 光纤, 光纤带宽 10G。 图 6是本发明实施例提供的对 PTN网络业务进行保护的业务信息图,如图 6所示, 为规划软件中需要配置 P圈的业务信息。 其中, 业务信息包括业务的源节点、 目的节 点、 保护方式、 带宽等。 图 7是本发明实施例提供的对 PTN网络业务进行保护的 P-cycle规划图, 如图 7 所示, 为 P-cycle规划后的容量及配置节点, 该 P-cycle规划的具体步骤如下: 步骤 701 :建立初始为图 5的 PTN网络拓扑图,光线带宽 10G,并具有图 6中 PTN 网络需要承载的业务的已知业务信息。 步骤 702: 集合 Γ中的业务包括 PW1、 PW2和 PW3, 对业务 PW1路由, 并建立 工作 LSP, 并将该 LSP经过的链路加入集合 , 按照已用工作带宽大小降序排列的 ^ 链路为: Η-Α, Α-Β , Β-Ε。 步骤 703 : 根据预先计算出的 Ρ圈数据库^。找到包含 链路 Η-Α的配置 Ρ圈, BP H-G-B-A-H, H-G-B-E-F-A-H, H-G-B-C-D-E-F-A-H。 计算每个 P圈配置所需带宽 以及每个 P圈本身的冗余率。从所有 P圈中找出冗余率最小的 P圈,事实上, H-G-B-A-H 禾 P H-G-B-E-F-A-H的冗余率£( )均等于 2。 即 H-G-B-A-H的 E(k、 =1200M/600M=2, H-G-B-E-F-A-H的 £(Α) =1800Μ/900Μ=2。 但从最优 Ρ圈的角度考虑, H-G-B-E-F-A-H 可以同时保护 链路 H-A, A-B , B-E三条链路。 因此, H-G-B-E-F-A-H为业务 PW1 的配置 P圈, 业务 PW1规划结束, H-G-B-E-F-A-H的容量为 300M。 步骤 704: 将 P圈为 A-B-C-D-E-F-A加入集合 , 并删除 f A中由所找到的 P圈 H-G-B-E-F-A-H保护的链路 H-A, A-B, B-E, 更新 P圈 H-G-B-E-F-A-H的光线剩余 带宽。 步骤 705 : 继续为业务 WP2配置 P圈, 得到 2链路为 B-E。 为 2链路 B-E配 置 P圈, 2链路 B-E为跨接链路,得到 P圈为 A-B-C-D-E-F-A。因此, A-B-C-D-E-F-A 为业务 PW2的配置 P圈, 业务 PW2规划结束, A-B-C-D-E-F-A的容量为 500M。 步骤 706: Wp2链路 B-E的配置 P圈的部分链路 A-B和 B-E已经在集合 中存在 配置的 P圈 H-G-B-E-F-A-H中,记录已保护链路 A-B和 B-E的集合为 。删除集合 中已保护链路 A-B和 B-E的 P圈 H-G-B-E-F-A-H,同时对删除的 P圈 H-G-B-E-F-A-H 链路带宽更新。 然后, 为删除的 P圈 H-G-B-E-F-A-H中需要保护的业务 PW1的链路 H-A重新配置 P圈, 得到配置 P圈为 H-G-B-A-H, 并加入集合 。 其中, H-G-B-A-H 的容量为 300M。 步骤 707: 继续为业务 WP3配置 P圈, 得到 3链路为 G-B和 B-E。 按照已用工 作带宽从大到小的顺序, 为 3链路 B-E配置 P圈, 3链路 B-E为跨接链路, 得到 P圈为 A-B-C-D-E-F-A。 更新 P圈 A-B-C-D-E-F-A的容量为 600M。 步骤 708: 为 3链路 G-B配置 P圈, 得到 P圈为 H-G-B-A-H, 容量为 300M。 业务 WP3规划结束, 配置 P圈为 A-B-C-D-E-F-A和 H-G-B-A-H。 业务 WP1、 WP2和 WP3最终规划生成的 P圈及其容量为 P1圈(A-B-C-D-E-F-A, 600M) 禾 P P2圈 (H-G-B-A-H, 300M)。 本发明是在设计 PTN分组传输网规划软件过程中提出来的, 然而只要经过修改, 它也可以适用于其他类型的网络规划过程。 综上所述, 本发明具有以下技术效果: 能够利用 PTN业务流量不可分割的特点以 及 P圈保护效率高的优势, 对跨接链路配置两条保护路径的 P圈保护, 从而提高网络 带宽的利用率。 同时, 该保护方法同时适用于业务的动态加入, 扩展了本发明的实用 性。 尽管上文对本发明进行了详细说明, 但是本发明不限于此, 本技术领域技术人员 可以根据本发明的原理进行各种修改。 因此, 凡按照本发明原理所作的修改, 都应当 理解为落入本发明的保护范围。 工业实用性 本发明提供的上述技术方案, 可以应用于对 PTN网络业务进行保护的过程中, 采 用遍历 PTN网络业务集合中的每个业务, 对所述每个业务路由建立业务路径, 得到对 应于 N个业务的 N条业务路径; 为 N条业务路径之每条业务路径中的每条链路配置 适合于多业务的保护圈; 对 N条业务路径中多条业务路径所经过任一链路的已配置的 保护圈, 建立两条保护路径, 使所述两条保护路径分别对该保护圈的链路业务集合提 供保护的技术方案, 有益效果在于: 针对 PTN业务流量不可分割的特点, 对业务的工 作 LSP提供 P-cycle保护, 同时使配置出的 P-cycle能够对失效的链路提供近似 2倍的 高效保护能力, 有效地提高了网络带宽的利用率。 Amount, w represents a work flow can be protected on the P-ring links, J P represents the ring A n all fish Zhu FIG. 5 is an optical fiber link PTN PTN network traffic to protect a network according to an embodiment of the present invention The topology diagram, as shown in Figure 5, represents a node in the network topology. There are 8 nodes in total. The link is two opposite fibers, and the fiber bandwidth is 10G. FIG. 6 is a service information diagram for protecting a PTN network service according to an embodiment of the present invention. As shown in FIG. 6, the service information of the P circle needs to be configured in the planning software. The service information includes a source node, a destination node, a protection mode, and a bandwidth of the service. FIG. 7 is a P-cycle planning diagram for protecting a PTN network service according to an embodiment of the present invention. As shown in FIG. 7, the P-cycle planning capacity and configuration node, the specific steps of the P-cycle planning are as follows: Step 701: Establish a PTN network topology diagram initially shown in FIG. 5, with a ray bandwidth of 10 G, and having known service information of services to be carried by the PTN network in FIG. 6. Step 702: The services in the aggregation group include PW1, PW2, and PW3, and the service PW1 is routed, and the working LSP is established, and the link through which the LSP passes is added to the set. The link that is arranged in descending order of the used working bandwidth is: Η-Α, Α-Β, Β-Ε. Step 703: According to the pre-calculated circle database ^. Find the configuration ring containing link Η-Α, BP HGBAH, HGBEFAH, HGBCDEFAH. Calculate the bandwidth required for each P-ring configuration and the redundancy rate of each P-ring itself. Find the P-ring with the smallest redundancy from all P-circles. In fact, the redundancy rate of HGBAH and P HGBEFAH is equal to 2. That is, HGBAH's E (k, =1200M/600M=2, HGBEFAH's £(Α)=1800Μ/900Μ=2. However, from the perspective of the optimal loop, HGBEFAH can protect the links HA, AB, BE three chains at the same time. Therefore, HGBEFAH is configured as the P circle of the service PW1, and the service PW1 planning ends. The capacity of the HGBEFAH is 300M. Step 704: Add the P circle to the set of ABCDEFA, and delete the links HA, AB, BE protected by the found P circle HGBEFAH in f A , and update the remaining bandwidth of the light of the P circle HGBEFAH. Step 705: Continue to configure the P circle for the service WP2, and obtain the 2 link as the BE. Configure a P-ring for the 2- link BE, and a 2- link BE for the spanning link, and get the P-circle as ABCDEFA. Therefore, ABCDEFA is the configuration P circle of the service PW2, the service PW2 planning ends, and the capacity of the ABCDEFA is 500M. Step 706: The partial links AB and BE of the configuration P circle of the Wp 2 link BE are already in the configured P circle HGBEFAH in the set, and the set of the protected links AB and BE is recorded as . Delete the P-band HGBEFAH of the protected link AB and BE in the set, and update the bandwidth of the deleted P-circle HGBEFAH link. Then, reconfigure the P-circle for the link HA of the service PW1 to be protected in the deleted P-ring HGBEFAH, and obtain the configured P-circle as HGBAH, and join the set. Among them, the capacity of HGBAH is 300M. Step 707: Continue to configure the P circle for the service WP3, and obtain the 3 links as GB and BE. According to the order of the used working bandwidth from the largest to the smallest, the P-ring is configured for the 3- link BE, and the 3- link BE is the spanning link, and the P-circle is ABCDEFA. The capacity of the updated P circle ABCDEFA is 600M. Step 708: Configure a P-circle for the 3- link GB, and obtain a P-circle as HGBAH and a capacity of 300M. The business WP3 planning ends, and the P circle is configured as ABCDEFA and HGBAH. The P circle generated by the final plan of the business WP1, WP2 and WP3 and its capacity are P1 circle (ABCDEFA, 600M) and P P2 circle (HGBAH, 300M). The present invention has been proposed in the process of designing a PTN packet transmission network planning software, but it can be applied to other types of network planning processes as long as it is modified. In summary, the present invention has the following technical effects: It can utilize the indivisible characteristics of the PTN service traffic and the high efficiency of the P-circle protection, and configure the P-circle protection of the two protection paths for the cross-link, thereby improving the network bandwidth. Utilization rate. At the same time, the protection method is applicable to the dynamic addition of services at the same time, and the utility of the invention is expanded. Although the invention has been described in detail above, the invention is not limited thereto, and various modifications may be made by those skilled in the art in accordance with the principles of the invention. Therefore, modifications made in accordance with the principles of the invention should be construed as falling within the scope of the invention. Industrial Applicability The above technical solution provided by the present invention can be applied to the process of protecting a PTN network service, and traversing each service in the PTN network service set, and establishing a service path for each service route, which is obtained corresponding to N service paths of N services; configure a protection ring suitable for multiple services for each link in each of the N service paths; and have passed any link of multiple service paths in the N service paths The configuration of the protection circle, the establishment of two protection paths, and the two protection paths respectively provide protection for the link service set of the protection circle, and the beneficial effects are: for the inseparable characteristics of the PTN service traffic, for the service The working LSP provides P-cycle protection, and the configured P-cycle can provide approximately 2 times more efficient protection for the failed link, effectively improving the utilization of the network bandwidth.

Claims

权 利 要 求 书 Claim
1. 一种对 PTN网络业务进行保护的方法, 包括: 1. A method of protecting a PTN network service, including:
遍历 PTN 网络业务集合中的每个业务, 对所述每个业务路由建立业务路 径, 得到对应于 N个业务的 N条业务路径;  Traversing each service in the PTN network service set, establishing a service path for each service route, and obtaining N service paths corresponding to N services;
为 N条业务路径之每条业务路径中的每条链路配置适合于多业务的保护 圈; 对 N条业务路径中多条业务路径所经过任一链路的已配置的保护圈, 建立 两条保护路径,使所述两条保护路径分别对该保护圈的链路业务集合提供保护。  Configuring a protection ring suitable for multiple services for each link in each of the N service paths; establishing two protections for the configured protection ring of any of the links in the N service paths The path is such that the two protection paths respectively provide protection for the link service set of the protection circle.
2. 根据权利要求 1所述的方法, 其中, 所述的为 N条业务路径之每条业务路径中 的每条链路配置适合于多业务的保护圈包括: The method according to claim 1, wherein the configuring a protection ring suitable for multiple services for each link in each of the N service paths includes:
按照已用工作带宽从大到小的顺序对所述每条业务路径中的每条链路进行 降序排序, 并依次遍历所述每条链路;  Each link in each of the service paths is sorted in descending order according to the used working bandwidth from large to small, and each link is traversed in sequence;
从预置的保护圈数据库中找出包含所述每条链路的所有保护圈, 并计算出 配置每个保护圈所需的工作带宽及其本身的冗余率;  Find all the protection rings containing each of the links from the preset protection circle database, and calculate the working bandwidth required for each protection ring and its own redundancy rate;
按照所述冗余率从小到大的顺序对所述所有保护圈依次进行判断, 得到所 述每条链路的保护圈。  The protection loops are sequentially determined in the order of the redundancy ratio from small to large, and the protection loop of each link is obtained.
3. 根据权利要求 2所述的方法, 其中, 所述的按照所述冗余率从小到大的顺序对 所述所有保护圈依次进行判断, 得到所述每条链路的保护圈包括: The method according to claim 2, wherein the determining, by the order of the redundancy ratio, the protection rings are sequentially determined, and obtaining the protection circle of each link includes:
将配置每个保护圈所需的工作带宽依次与该保护圈的链路剩余带宽进行比 较;  The working bandwidth required to configure each protection ring is sequentially compared with the remaining bandwidth of the link of the protection ring;
若所述链路剩余带宽大于配置该保护圈所需的工作带宽, 则确定所述保护 圈为该链路的保护圈。  If the remaining bandwidth of the link is greater than the working bandwidth required to configure the protection ring, it is determined that the protection circle is a protection ring of the link.
4. 根据权利要求 2或 3所述的方法, 其中, 还包括: 若所述保护圈的部分链路存在保护圈, 则删除包含所述部分链路的所有保 护圈; 对删除的所有保护圈中需要保护的链路重新进行配置, 得到适合于多业务 的保护圈。 根据权利要求 2至 4中任一项所述的方法, 其中, 所述的建立两条保护路径, 使所述两条保护路径分别对该保护圈的链路业务集合提供保护包括: The method according to claim 2 or 3, further comprising: if a part of the link of the protection ring has a protection ring, deleting all the protection rings including the part of the link; The link that needs to be protected is reconfigured to obtain a protection circle suitable for multiple services. The method according to any one of claims 2 to 4, wherein the establishing two protection paths, so that the two protection paths respectively provide protection for the link service set of the protection circle includes:
从已配置的保护圈中划分出两条独立的保护路径;  Separate two separate protection paths from the configured protection circle;
对该保护圈的链路业务集合进行划分, 得到其业务工作带宽总和相等或相 近似的两个子业务集合;  The link service set of the protection circle is divided, and two sub-service sets whose service working bandwidths are equal or similar are obtained;
将所述的两个子业务集合分别配置给所述的两条独立的保护路径。 根据权利要求 2、 3和 5中任一项所述的方法, 其中, 所述的配置每个保护圈所 需的工作带宽为, 所述两个子业务集合中业务工作带宽总和的最大值。 一种对 PTN网络业务进行保护的装置, 包括: 业务路径模块, 设置为遍历 PTN网络业务集合中的每个业务,对所述每个 业务路由建立业务路径, 得到对应于 N个业务的 N条业务路径;  The two sub-service sets are separately configured to the two independent protection paths. The method according to any one of claims 2, 3 and 5, wherein the required working bandwidth for each guard ring is the maximum value of the sum of the service working bandwidths of the two sub-service sets. An apparatus for protecting a PTN network service, comprising: a service path module, configured to traverse each service in a PTN network service set, establish a service path for each service route, and obtain N pieces corresponding to N services Business path
配置模块, 设置为为 N条业务路径之每条业务路径中的每条链路配置适合 于多业务的保护圈;  a configuration module, configured to configure a protection ring suitable for multiple services for each link in each of the N service paths;
倒换配置模块, 设置为对 N条业务路径中多条业务路径所经过任一链路的 已配置的保护圈, 建立两条保护路径, 使所述两条保护路径分别对该保护圈的 链路业务集合提供保护。 根据权利要求 7所述的装置, 其中, 所述的配置模块包括:  The switching configuration module is configured to establish two protection paths for the configured protection ring of any one of the plurality of service paths in the N service paths, so that the two protection paths respectively form a link service set for the protection circle. Provide protection. The device according to claim 7, wherein the configuration module comprises:
遍历子模块, 设置为按照已用工作带宽从大到小的顺序对所述每条业务路 径中的每条链路进行降序排序, 并依次遍历所述每条链路;  The traversing sub-module is configured to perform a descending ordering of each link in each of the service paths in order of decreasing working bandwidth, and traversing each of the links in sequence;
计算子模块, 设置为从预置的保护圈数据库中找出包含所述每条链路的所 有保护圈, 并计算出配置每个保护圈所需的工作带宽及其本身的冗余率; 判断子模块, 设置为按照所述冗余率从小到大的顺序对所述所有保护圈依 次进行判断, 得到所述每条链路的保护圈。 根据权利要求 8所述的装置, 其中, 还包括: 重新配置子模块, 设置为若所述保护圈的部分链路存在保护圈, 则删除包 含所述部分链路的所有保护圈, 对删除的所有保护圈中需要保护的链路重新进 行配置, 得到适合于多业务的保护圈。 根据权利要求 7所述的装置, 其中, 所述的倒换配置模块包括: 保护圈划分子模块, 设置为从已配置的保护圈中划分出两条独立的保护路 径; a calculation sub-module, configured to find all the protection rings including each link from the preset protection circle database, and calculate the working bandwidth required for each protection circle and its own redundancy rate; The sub-module is configured to sequentially determine all the protection rings according to the redundancy ratio from small to large, and obtain the protection ring of each link. The device according to claim 8, further comprising: a reconfiguration submodule, configured to delete all protection rings including the partial link if a protection ring exists on a part of the links of the protection ring, for deleting The links that need to be protected in all protection rings are reconfigured to obtain a protection circle suitable for multiple services. The apparatus according to claim 7, wherein the switching configuration module comprises: The protection circle division sub-module is set to divide two independent protection paths from the configured protection circle;
集合划分子模块, 设置为对该保护圈的链路业务集合进行划分, 得到其业 务工作带宽总和相等或相近似的两个子业务集合;  The set partitioning sub-module is configured to divide the link service set of the protection circle, and obtain two sub-service sets whose service working bandwidths are equal or similar;
分配保护子模块, 设置为将所述的两个子业务集合分别配置给所述的两条 独立的保护路径。  The protection protection sub-module is configured to separately configure the two sub-service sets to the two independent protection paths.
PCT/CN2014/079990 2013-12-20 2014-06-16 Method and device for protecting ptn network service WO2014180448A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201310714895.0 2013-12-20
CN201310714895.0A CN104734950B (en) 2013-12-20 2013-12-20 The method and device that a kind of pair of PTN network business is protected

Publications (1)

Publication Number Publication Date
WO2014180448A1 true WO2014180448A1 (en) 2014-11-13

Family

ID=51866828

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/079990 WO2014180448A1 (en) 2013-12-20 2014-06-16 Method and device for protecting ptn network service

Country Status (2)

Country Link
CN (1) CN104734950B (en)
WO (1) WO2014180448A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016078218A1 (en) * 2014-11-19 2016-05-26 中兴通讯股份有限公司 Ring network detection point automatic identification method, apparatus, and storage medium
CN106302149A (en) * 2016-08-30 2017-01-04 成都科来软件有限公司 A kind of method and device based on service logic many-to-many communication path analysis
CN111865627A (en) * 2019-04-25 2020-10-30 中国移动通信集团河北有限公司 Transmission networking evaluation method and device, computing equipment and computer storage medium
CN113364619A (en) * 2021-06-03 2021-09-07 湖北工业大学 Method and system for establishing packet transport network

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104967477B (en) * 2015-06-26 2018-03-13 南京邮电大学 Optical-fiber network intelligence P circle guard methods based on multicast service
CN106487546B (en) * 2015-08-26 2020-06-05 中兴通讯股份有限公司 DCN function configuration method and device
CN106549788B (en) * 2015-09-21 2020-11-13 中兴通讯股份有限公司 Service protection transition method and device
CN105577435A (en) * 2015-12-21 2016-05-11 中国联合网络通信集团有限公司 Method and equipment for configuring P-cycles
CN109831380B (en) * 2019-02-25 2021-07-20 国网江苏省电力有限公司苏州供电分公司 Path protection method for power communication service

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1588882A (en) * 2004-09-23 2005-03-02 上海交通大学 Protection rotation method for preset protective ring
EP1921808A1 (en) * 2006-11-10 2008-05-14 Lucent Technologies Inc. Preemptive transmission protection scheme for data services
CN102480368A (en) * 2010-11-22 2012-05-30 中兴通讯股份有限公司 Protecting method and system of aggregation link
CN102916842A (en) * 2012-11-06 2013-02-06 烽火通信科技股份有限公司 Method for implementing PTN (Packet Transport Network) equipment double-returning protection by overlaying various protection modes

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1330129C (en) * 2004-09-23 2007-08-01 上海交通大学 Network protective method based on multiple volume preset protective ring
CN101494473B (en) * 2009-03-04 2013-12-11 北京邮电大学 Protection method for WDM optical network loop based on resource and taking regard of protection duration control
CN102123003A (en) * 2010-12-23 2011-07-13 北京邮电大学 Preset circle heuristic constructing method for optical network protection
CN103259590B (en) * 2013-05-27 2015-12-09 重庆邮电大学 A kind of light multicast static P circle segment protection method of jumping section based on 2

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1588882A (en) * 2004-09-23 2005-03-02 上海交通大学 Protection rotation method for preset protective ring
EP1921808A1 (en) * 2006-11-10 2008-05-14 Lucent Technologies Inc. Preemptive transmission protection scheme for data services
CN102480368A (en) * 2010-11-22 2012-05-30 中兴通讯股份有限公司 Protecting method and system of aggregation link
CN102916842A (en) * 2012-11-06 2013-02-06 烽火通信科技股份有限公司 Method for implementing PTN (Packet Transport Network) equipment double-returning protection by overlaying various protection modes

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016078218A1 (en) * 2014-11-19 2016-05-26 中兴通讯股份有限公司 Ring network detection point automatic identification method, apparatus, and storage medium
CN106302149A (en) * 2016-08-30 2017-01-04 成都科来软件有限公司 A kind of method and device based on service logic many-to-many communication path analysis
CN111865627A (en) * 2019-04-25 2020-10-30 中国移动通信集团河北有限公司 Transmission networking evaluation method and device, computing equipment and computer storage medium
CN113364619A (en) * 2021-06-03 2021-09-07 湖北工业大学 Method and system for establishing packet transport network

Also Published As

Publication number Publication date
CN104734950A (en) 2015-06-24
CN104734950B (en) 2019-04-26

Similar Documents

Publication Publication Date Title
WO2014180448A1 (en) Method and device for protecting ptn network service
Davoli et al. Traffic engineering with segment routing: SDN-based architectural design and open source implementation
EP2911348B1 (en) Control device discovery in networks having separate control and forwarding devices
Astaneh et al. Optimization of SDN flow operations in multi-failure restoration scenarios
JP4828865B2 (en) Efficient and robust routing independent of traffic pattern variability
CN104704759B (en) The transmitting function virtualization of optical-fiber network based on wavelength-division multiplex (WDM)
KR102123035B1 (en) Three stage folded clos optimization for 802.1aq
US20130308444A1 (en) Method and apparatus for determining paths between source/destination pairs
EP1757026B1 (en) Method and apparatus for forwarding data in a data communications network
US9807035B1 (en) Using available bandwidths of an IP fabric to intelligently distribute data
KR20100112144A (en) Tie-breaking in shortest path determination
IL230202A (en) Method and apparatus for resilient routing of control traffic in a split-architecture system
Muthumanikandan et al. Link failure recovery using shortest path fast rerouting technique in SDN
US8472313B2 (en) System and method for optical bypass routing and switching
JP5869041B2 (en) Method for mapping network topology request to physical network, computer program product, mobile communication system, and network configuration platform
CN101909004B (en) Multi-domain optical network routing method based on edge ROADM (Reconfigurable Optical Add-Drop Multiplexer) ring structure
CN113242179A (en) SDN-based SR path calculation and label stack generation method and SDN controller
JP2018037983A (en) Route conversion controller, route conversion control method and route conversion control program
Alexandrovich et al. Proactive backup scheme of routes in distributed computer networks
Wang et al. Reliability as an interdomain service
EP2898626A1 (en) Method and system for supporting dynamic resource management in a backhaul network
Zhang et al. Survivable path computation in PCE-based multi-domain networks
Bai et al. A Distributed Congestion Mitigation Mechanism Based on Neighboring Nodes Traffic Steering
Qin et al. Minimum cost multi-path parallel transmission with delay constraint by extending openflow
US20140119172A1 (en) Apparatus and Method to Find Partially Disjoint Routes for Dual Fiber-Cuts

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14795498

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 14795498

Country of ref document: EP

Kind code of ref document: A1