Nothing Special   »   [go: up one dir, main page]

CN100536405C - Method of obtaining protection path of effectively used network resource - Google Patents

Method of obtaining protection path of effectively used network resource Download PDF

Info

Publication number
CN100536405C
CN100536405C CNB200610138329XA CN200610138329A CN100536405C CN 100536405 C CN100536405 C CN 100536405C CN B200610138329X A CNB200610138329X A CN B200610138329XA CN 200610138329 A CN200610138329 A CN 200610138329A CN 100536405 C CN100536405 C CN 100536405C
Authority
CN
China
Prior art keywords
protection
link
path
intrinsic
solution
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB200610138329XA
Other languages
Chinese (zh)
Other versions
CN101179419A (en
Inventor
杨静
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CNB200610138329XA priority Critical patent/CN100536405C/en
Publication of CN101179419A publication Critical patent/CN101179419A/en
Application granted granted Critical
Publication of CN100536405C publication Critical patent/CN100536405C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a method for effectively using the network resources to acquire the protection path, which is invented in order to solve the problems existing in the prior art that the inherent protection of the partial link and waste of the network resources caused by the end-to-end protection coexistence of the overall path. The invention comprises the following processes that: (1) the service protection level is judged. If the service protection level is high, then the end-to-end protection path is solved for the working path by adopting the shortest path algorithm; if the service protection level is not high, then Process (2) is got to; (2) all the links starting from a source node to a destination node are searched and the links having the inherent protection and the continuous partial protection path which does not have the inherent protection link set are sequentially added into the solved protection path. The invention takes the inherent protection ability on the bottom layer of the optical transmission network into account, avoids the phenomenon of protection overlapping from occurring and reduces the waste of the network resources on the basis of meeting the requirement of the service protection level.

Description

Effectively use the protection method for obtaining path of Internet resources
Technical field
The present invention relates to protect method for obtaining path, the protection method for obtaining path of particularly effective use Internet resources.
Background technology
The development of optical network communication technology has made things convenient for our life on the one hand, and has made our life depend on communication more on the other hand.Particularly along with the continuous maturation of SDH and WDM technology, the bandwidth potential of greatly excavating out optical fiber and being had, optical-fiber network is constantly all carrying huge traffic carrying capacity, if transmission equipment fault or optical cable bring tremendous loss by accidental amputation, all can for our work, life.The survivability that how to improve network is the major issue that the network operation manager urgently will consider.For loaded service on the optical-fiber network provides protection, a kind of very necessary means have been become.Involved protection mechanism in the optical-fiber network typically refers to: utilize the capacity of reserving, for service aisle provides alternate channel, in case service aisle breaks down, business can arrive the destination from alternate channel.Because this mode has adopted the mode of reserving alternate channel, after fault took place, the time of recovering influenced business was very fast, is a kind of mode of effective raising network survivability.
Adopt the network configuration of this technology that line style and two kinds of annulars are arranged; the looped network of SDH wherein; because have more perfect defencive function and networking mode more flexibly; be use in the SDH network configuration wider a kind of; in such network topology; utilize the intrinsic protection mechanism of optical transport network bottom, just can play the professional effect of protection.Development along with network transmission technology; networking mode also no longer is confined to single S DH network; and be based on ring network mode and the networking mode of mesh network (mesh) and the mixed networking mode of depositing of SDH multiplexing segment protect ring, channel protection ring, can make full use of the diversity of physics route in the mesh network like this.Under this networking mode; utilize the intrinsic protection mechanism of network bottom layer to provide perfect protection merely for customer service; it is that operating path is found the solution one and protected the path end to end that prior art adopts shortest path first usually, for business provides perfect protection mechanism.
The shortcoming of above-mentioned prior art is: because shortest path first is based on the mesh network design, algorithm is not considered the protection mechanism that the optical transport network bottom is intrinsic in the process of finding the solution.In fact; part of links in the operating path may possess the intrinsic protective capability (loop multiplexing section protection or linear multiplex section protection etc.) of optical transport network bottom; if still find the solution the protection path according to the method described above; the phenomenon that the coexistence of intrinsic protection of local link and entire path end-to-end protection will occur, the waste Internet resources.
Therefore; from effectively utilizing the angle of Internet resources; need require different business at protection level; different protection path method for solving is provided; satisfying on the professional basis that requires for protection level; take into account the intrinsic protective capability of original transmission network, Internet resources avoid waste as far as possible.
Summary of the invention
For defective and the deficiency that overcomes prior art, the object of the present invention is to provide a kind of protection method for obtaining path that can avoid effective use Internet resources of network resources waste.
In order to achieve the above object, the protection method for obtaining path of a kind of effective use Internet resources of the present invention may further comprise the steps:
(1) judge other height of service protection level, if service protection rank height, then adopting shortest path first is that operating path is found the solution and protected the path end to end; If the service protection rank is not high, then enter step (2);
Wherein, if professional protection level requires such protection mechanism is provided: for all working node except that source node and destination node and active link fault, can not make service disconnection, then this business belongs to the high business of protection level, otherwise belongs to the not high business of protection level;
(2) search begins to all links the destination node from source node, and will have the link of intrinsic protection and add in the protection path of finding the solution through the localised protection path of finding the solution the continuous no intrinsic protection link set that obtains in order;
Wherein, intrinsic protection is meant the protection mechanism that the optical transport network bottom provides.
As a further improvement on the present invention, described step (2) is specially:
(21) begin to obtain one from source node in order and do not find the solution the link in protection path and judge whether this link has intrinsic protection, if judged result is for being then to enter step (22); If judged result then enters step (23) for not;
(22) this link is added in the protection path of finding the solution, enter step (24);
(23) search for the set of the continuous link of no intrinsic protection behind this link successively, and after finding the solution the localised protection path of this link set, add in the protection path of finding the solution, enter step (24);
(24) check the active link of whether not finding the solution the protection path in addition,, then enter step (21) if having; If no, then step finishes.
As a further improvement on the present invention, described step (23) is specially:
(231) search for the link set of the continuous link of no intrinsic protection behind this link successively;
(232) with in the operating path not the node in this link set from topology, delete;
(233) by the independence strategy for after this link set finds the solution the localised protection path, this link set is emptied.
As a further improvement on the present invention; the method of the link set of the continuous link of no intrinsic protection is behind this link of search described in the step (231): the link that will not have intrinsic protection leaves in the set; and check the active link that is positioned at after this link successively according to the direction of pointing to destination node from source node; if there is not intrinsic protection; then add in this link set; if intrinsic protection is arranged or arrived destination node, then finish search.
As a further improvement on the present invention, described step (24) is specially:
(241) judge according to the direction from the source node to the destination node whether the tail node of this active link or this link set is the destination node of operating path, if judged result is for being then step end; If judged result then enters step (21) for not.
As a further improvement on the present invention, the intrinsic protection described in the described step (21) comprises at least: multiplex section protective ring, channel protection ring, SNCP and linear multiplex section protection.
As a further improvement on the present invention, the independence strategy described in the step (233) comprises at least: node is irrelevant, link is irrelevant, the shared risk group is irrelevant, the shared risk link group is irrelevant.
After adopting above-mentioned method, take diverse ways to find the solution the protection path by protection level being required different business.On the basis of satisfying the requirement of service protection rank, considered the intrinsic protective capability of optical transport network bottom, avoid occurring protected mode and the overlapping phenomenon of the intrinsic protection mechanism of link end to end, thereby reduce waste of network resources.
Description of drawings
Fig. 1 is the overall procedure block diagram of finding the solution the protection path among the present invention;
Fig. 2 is a FB(flow block) of finding the solution the localised protection path among the present invention;
Fig. 3 is the topological environmental figure of the embodiment of the invention.
Embodiment
Below in conjunction with accompanying drawing the specific embodiment of the present invention is described in further detail.
As shown in Figure 1,, use method provided by the invention,, find the solution and protect the path end to end for the high business of protection level for the present invention finds the solution the overall procedure block diagram of protecting the path; For the less demanding business of protection level, then take into full account the intrinsic protection mechanism of transmission network bottom, for it finds the solution local protection path.Method provided by the invention comprises the following steps:
(101) judge professional protection level, for the protection level height, the business of the end-to-end protection mechanism that requires to provide perfect, execution in step (102); Otherwise execution in step (103);
If professional protection level requires such protection mechanism is provided: for all working node except that source node and destination node and active link fault; can not make service disconnection; this business just belongs to the high business of protection level of indication of the present invention, provides perfect end-to-end protection for this service needed for it.
(102) adopt shortest path first, find the solution for operating path and protect the path end to end;
When finding the solution the end-to-end protection path, earlier other nodes except that the source and destination node in the operating path are deleted from network topology, and then adopted shortest path first to find the solution, obtain an end-to-end protection path that has nothing to do with operating path.
(103) the localised protection route method is found the solution in employing, for operating path is found the solution the protection path;
In the process of finding the solution the protection path, considered the intrinsic protective capability of optical transport network bottom; only find the solution local protection path for the active link (or active link set) that does not possess intrinsic protection; thereby avoid occurring protected mode and the overlapping phenomenon of the intrinsic protection mechanism of optical transport network bottom end to end, can effectively utilize Internet resources more.
As shown in Figure 2, for finding the solution the FB(flow block) in localised protection path, specifically comprise following substep:
(201) get next bar active link in the operating path; When taking off an active link, if carry out this step for the first time, what obtain so is article one link that begins from source node in the operating path, otherwise obtains next bar active link of work at present link according to the direction of pointing to purpose from the source, and is set to the work at present link;
(202) check whether the work at present link has intrinsic protection, if having, execution in step (203) then, otherwise execution in step (204);
The intrinsic protection attribute of link is a kind of in the link topology information, can pass through the management plane static configuration, also can pass through Routing Protocol (for example: ospf protocol and Extended Protocol thereof) dynamically diffusion between each node of network internal.Algorithm receives these information, leaves the topological database that is used for path computing in.Intrinsic protection of the present invention comprises protection mechanisms such as multiplex section protective ring based on SDH, channel protection ring, SNCP, linear multiplex section protection, and other various optical transport network bottoms protection mechanism that may provide.
(203) the work at present link is added in the protection path of finding the solution, then execution in step (207);
(204) continue search follow-up work link, find the link set of continuous no intrinsic protection;
When searching for the link set of no intrinsic protection continuously, at first the work at present link is left in the set, check the active link that is positioned at after the work at present link successively according to the direction of pointing to destination node from source node then, if link does not have intrinsic protection, it is added in the above-mentioned set, and be set to the work at present link; If intrinsic protection is arranged, search this time finishes.If arrived destination node, search so this time also finishes.
(205) find the solution local end-to-end protection for current link set, find the solution local protection path and comprise following substep:
(a) with those nodes in current link set not in the operating path, delete from topology, when avoiding finding the solution the protection path for local operating path, the protection path is through other operating path nodes outside the local operating path.
(b) adopting specific independence strategy is that current link set is found the solution the localised protection path.Independence strategy described here comprises: node is irrelevant, link is irrelevant, SRG (shared risk group) is irrelevant, SRLG (shared risk link group) is irrelevant, and does not get rid of other irrelevant form.
(c) the localised protection path is found the solution and is finished, and empties this link set.
(206) the localised protection path is added in the protection path to be found the solution, enter step (207);
(207) check the active link of whether not finding the solution the protection path in addition,, then return step (201) if having; Otherwise the protection path that operating path is described has been found the solution and has been finished, and algorithm finishes.
When judging whether not find the solution the active link of protection in addition, judge according to the direction from the source node to the destination node whether the tail node of work at present link is the destination node of operating path, if the active link of not finding the solution protection is described; If not, the operating path of not finding the solution protection in addition is described.
As shown in Figure 3, be example below with the topological environmental, how further instruction the present invention finds the solution the protection path of operating path W.Wherein, A is a source node, and A, B, C, D are the node on the SDH multiplexing section protection rings, H-Z is the link with the intrinsic protection mechanism of 1+1, and Z is a destination node, and W is an operating path, P0 is the end-to-end protection path of operating path W, and P1 is the protection path of operating path W; Considered the intrinsic protective capability of optical transport network bottom; for the high business of protection level; adopt the end-to-end protection route method of finding the solution of tradition; from topology, delete other nodes except that the source and destination node in the operating path earlier; promptly delete C, E, H node, the protection path of adopting shortest path first to find the solution then to obtain is: A-L-M-N-Z.
For the not high business of protection level,, adopt and find the solution the localised protection route method in order effectively to utilize the intrinsic resource conservation of network.Concrete handling process is as follows:
(1) gets next bar active link in the operating path.Because be to carry out this step for the first time, get article one active link of operating path W: A-C, and link A-C is set to the work at present link;
(2) check whether the work at present link has intrinsic protection.Because link A-C is positioned on the Multiplex Section Shared Protection Ring, possess looped network protection mechanism, therefore active link is added in the protection path, protect the path to be at present: A-C;
(3) check whether also have untreated active link.The tail node C of work at present link is not the destination node of operating path, illustrates to also have untreated active link (also having active link C-E, E-H and H-Z to be untreated at present);
(4) get next bar active link in the operating path.According to the direction from the source node to the destination node, next bar active link of A-C link is C-E, and C-E is set to the work at present link;
(5) check whether active link has intrinsic protection; because link C-E is common active link; do not possess intrinsic protection mechanism; search for the follow-up work link in order; find the link set G of continuous no intrinsic protection; at first work at present link C-E is added among the link set G; be positioned at link after the C-E link: E-H according to the direction inspection of pointing to purpose from the source then; this link does not have intrinsic protection; therefore also add among the link set G, and E-H is set is the work at present link, continues next bar active link: H-Z of search; because link H-Z has intrinsic protection, so this search finishes.The link set G of the no intrinsic protection that obtains at present comprises two link: C-E, E-H;
(6) find the solution the localised protection path for link set G; at first with in the operating path those not the node in current link set G from topology, delete; at present, A node among the operating path A-C-E-H-Z and Z node not in link set G, therefore deletion of node A and Z from topology.According to certain independence strategy, the local operating path C-E-H that forms for the link among the set G finds the solution the protection path then, finds the solution to obtain and the irrelevant localised protection path of C-E-H node: C-F-H then, empties link set G.
(7) add in the protection path to be found the solution finding the solution the localised protection path C-F-H that obtains, the protection path that obtains at present is: A-C-F-H;
(8) look into whether also have untreated active link.Because the tail node of work at present link E-H is not the destination node of operating path, illustrate and also have untreated active link, therefore get next the bar active link in the operating path, according to the direction from the source node to the destination node, next bar active link of E-H link is H-Z, and H-Z is set to the work at present link;
(9) check whether the work at present link has intrinsic protection.Because link H-Z has 1+1 privacy protection mechanism, therefore active link to be added in the protection path, the protection path that obtains at present is: A-C-F-H-Z;
(10) check whether also have untreated active link, the tail node of work at present link H-Z is the destination node of operating path, illustrates that present all working link all disposes, so algorithm finishes.For operating path W (A-C-E-H-Z) finds the solution the protection path that obtains is P1 (A-C-F-H-Z).Wherein, A-C and H-Z link utilization the intrinsic protection mechanism of optical transport network bottom, C-E-H link section and C-F-H link section have then formed local end-to-end protection.
The present invention takes diverse ways to find the solution the protection path by protection level being required different business.On the basis of satisfying the requirement of service protection rank, considered the intrinsic protective capability of optical transport network bottom, avoid occurring protected mode and the overlapping phenomenon of the intrinsic protection mechanism of link end to end, thereby reduce waste of network resources.

Claims (7)

1, a kind of protection method for obtaining path of effective use Internet resources is characterized in that, may further comprise the steps:
(1) judge other height of service protection level, if service protection rank height, then adopting shortest path first is that operating path is found the solution and protected the path end to end; If the service protection rank is not high, then enter step (2);
Wherein, if professional protection level requires such protection mechanism is provided: for all working node except that source node and destination node and active link fault, can not make service disconnection, then this business belongs to the high business of protection level, otherwise belongs to the not high business of protection level;
(2) search begins to all links the destination node from source node, and will have the link of intrinsic protection and add in the protection path of finding the solution through the localised protection path of finding the solution the continuous no intrinsic protection link set that obtains in order;
Wherein, intrinsic protection is meant the protection mechanism that the optical transport network bottom provides.
According to the protection method for obtaining path of the described effective use Internet resources of claim 1, it is characterized in that 2, described step (2) is specially:
(21) begin to obtain one from source node in order and do not find the solution the link in protection path and judge whether this link has intrinsic protection, if judged result is for being then to enter step (22); If judged result then enters step (23) for not;
(22) this link is added in the protection path of finding the solution, enter step (24);
(23) search for the set of the continuous link of no intrinsic protection behind this link successively, and after finding the solution the localised protection path of this link set, add in the protection path of finding the solution, enter step (24);
(24) check the active link of whether not finding the solution the protection path in addition,, then enter step (21) if having; If no, then step finishes.
According to the protection method for obtaining path of the described effective use Internet resources of claim 2, it is characterized in that 3, described step (23) is specially:
(231) search for the link set of the continuous link of no intrinsic protection behind this link successively;
(232) with in the operating path not the node in this link set from topology, delete;
(233) by the independence strategy for after this link set finds the solution the localised protection path, this link set is emptied.
4, according to the protection method for obtaining path of the described effective use Internet resources of claim 3; it is characterized in that; the method of the link set of the continuous link of no intrinsic protection is behind this link of search described in the step (231): the link that will not have intrinsic protection leaves in the set; and check the active link that is positioned at after this link successively according to the direction of pointing to destination node from source node; if there is not intrinsic protection; then add in this link set; if intrinsic protection is arranged or arrived destination node, then finish search.
According to the protection method for obtaining path of the described effective use Internet resources of claim 2, it is characterized in that 5, described step (24) is specially:
(241) judge according to the direction from the source node to the destination node whether the tail node of this active link or this link set is the destination node of operating path, if judged result is for being then step end; If judged result then enters step (21) for not.
6, according to the protection method for obtaining path of the described effective use Internet resources of claim 2; it is characterized in that the intrinsic protection described in the described step (21) comprises at least: multiplex section protective ring, channel protection ring, SNCP and linear multiplex section protection.
7, according to the protection method for obtaining path of the described effective use Internet resources of claim 3; it is characterized in that the independence strategy described in the step (233) comprises at least: node is irrelevant, link is irrelevant, the shared risk group is irrelevant, the shared risk link group is irrelevant.
CNB200610138329XA 2006-11-07 2006-11-07 Method of obtaining protection path of effectively used network resource Expired - Fee Related CN100536405C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB200610138329XA CN100536405C (en) 2006-11-07 2006-11-07 Method of obtaining protection path of effectively used network resource

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB200610138329XA CN100536405C (en) 2006-11-07 2006-11-07 Method of obtaining protection path of effectively used network resource

Publications (2)

Publication Number Publication Date
CN101179419A CN101179419A (en) 2008-05-14
CN100536405C true CN100536405C (en) 2009-09-02

Family

ID=39405519

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB200610138329XA Expired - Fee Related CN100536405C (en) 2006-11-07 2006-11-07 Method of obtaining protection path of effectively used network resource

Country Status (1)

Country Link
CN (1) CN100536405C (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101577844B (en) * 2009-06-05 2012-05-23 中兴通讯股份有限公司 Method and system for searching wavelength division multiplexing network path
CN101938309B (en) * 2010-09-15 2013-05-08 重庆邮电大学 Network code-based WDM network sectionalized protection method
CN101938426B (en) * 2010-09-16 2015-06-10 中兴通讯股份有限公司 Routing inquiry method and system for automatic switched optical network
CN102469012B (en) * 2010-11-12 2016-03-30 中兴通讯股份有限公司 routing inquiring device and method
CN102740175B (en) * 2012-06-12 2014-09-24 武汉邮电科学研究院 Method for protecting and recovering cross-domain end-to-end label switched path
CN108574640B (en) * 2017-03-10 2020-11-27 中国移动通信集团陕西有限公司 Method and device for detecting the same service route in a transmission network

Also Published As

Publication number Publication date
CN101179419A (en) 2008-05-14

Similar Documents

Publication Publication Date Title
US7308198B1 (en) Method for allocating protection bandwidth in a telecommunications mesh network
CN101227248B (en) Method for establishing business path
CN100536405C (en) Method of obtaining protection path of effectively used network resource
US10587472B2 (en) Highly reliable path accommodation design apparatus and method
CN105978741A (en) Network fault handling method and system
CN104734950A (en) Method and device for protecting PTN network services
Ramasubramanian et al. Dual-link failure resiliency through backup link mutual exclusion
CN1333554C (en) Method for combining multi-section protection and mesh network recovery
CN101674217B (en) Method for realizing permanent ring network protection in MESH network
CN100382504C (en) Cross-over end-to-end connection setting method for main apparatus protection in automatic exchange optical network
CN101159494A (en) Service protecting method for automatic exchange optical network
US20140040476A1 (en) Method and system for network restructuring in multilayer network
CN102143410A (en) Path computing method and unit in optical network
Hwang et al. Multiple shared backup cycles for survivable optical mesh networks
WO2005022823A1 (en) A method for achieving a path with protection entity in the intelligent optical network
Klopfenstein Rerouting tunnels for MPLS network resource optimization
CN102325039A (en) An Optimal Design Method of ASON Network Oriented to Power Control Service
Ho et al. Spare capacity allocation for WDM mesh networks with partial wavelength conversion capacity
CN110062301A (en) Route selection method, device, equipment and storage medium
Saini et al. Fallacious node algorithm for performance enhancement in optical-burst-switching networks
CN103490810B (en) The light multicast dynamic P circle 2 jumping segment protection method that a kind of wavelength convert scope is limited
Lu et al. Asymmetric CDC ROADM architecture for efficient support of bi-directional asymmetric traffic demands
CN106330294A (en) Business control method and device in optical communication network
Li et al. On finding the multicast protection tree considering SRLG in WDM optical networks
Todd et al. Demand-wise shared protection network design and topology allocation with dual-failure restorability

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20090902

Termination date: 20151107

EXPY Termination of patent right or utility model