CN100536405C - Method of obtaining protection path of effectively used network resource - Google Patents
Method of obtaining protection path of effectively used network resource Download PDFInfo
- Publication number
- CN100536405C CN100536405C CNB200610138329XA CN200610138329A CN100536405C CN 100536405 C CN100536405 C CN 100536405C CN B200610138329X A CNB200610138329X A CN B200610138329XA CN 200610138329 A CN200610138329 A CN 200610138329A CN 100536405 C CN100536405 C CN 100536405C
- Authority
- CN
- China
- Prior art keywords
- protection
- link
- path
- intrinsic
- solution
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a method for effectively using the network resources to acquire the protection path, which is invented in order to solve the problems existing in the prior art that the inherent protection of the partial link and waste of the network resources caused by the end-to-end protection coexistence of the overall path. The invention comprises the following processes that: (1) the service protection level is judged. If the service protection level is high, then the end-to-end protection path is solved for the working path by adopting the shortest path algorithm; if the service protection level is not high, then Process (2) is got to; (2) all the links starting from a source node to a destination node are searched and the links having the inherent protection and the continuous partial protection path which does not have the inherent protection link set are sequentially added into the solved protection path. The invention takes the inherent protection ability on the bottom layer of the optical transmission network into account, avoids the phenomenon of protection overlapping from occurring and reduces the waste of the network resources on the basis of meeting the requirement of the service protection level.
Description
Technical field
The present invention relates to protect method for obtaining path, the protection method for obtaining path of particularly effective use Internet resources.
Background technology
The development of optical network communication technology has made things convenient for our life on the one hand, and has made our life depend on communication more on the other hand.Particularly along with the continuous maturation of SDH and WDM technology, the bandwidth potential of greatly excavating out optical fiber and being had, optical-fiber network is constantly all carrying huge traffic carrying capacity, if transmission equipment fault or optical cable bring tremendous loss by accidental amputation, all can for our work, life.The survivability that how to improve network is the major issue that the network operation manager urgently will consider.For loaded service on the optical-fiber network provides protection, a kind of very necessary means have been become.Involved protection mechanism in the optical-fiber network typically refers to: utilize the capacity of reserving, for service aisle provides alternate channel, in case service aisle breaks down, business can arrive the destination from alternate channel.Because this mode has adopted the mode of reserving alternate channel, after fault took place, the time of recovering influenced business was very fast, is a kind of mode of effective raising network survivability.
Adopt the network configuration of this technology that line style and two kinds of annulars are arranged; the looped network of SDH wherein; because have more perfect defencive function and networking mode more flexibly; be use in the SDH network configuration wider a kind of; in such network topology; utilize the intrinsic protection mechanism of optical transport network bottom, just can play the professional effect of protection.Development along with network transmission technology; networking mode also no longer is confined to single S DH network; and be based on ring network mode and the networking mode of mesh network (mesh) and the mixed networking mode of depositing of SDH multiplexing segment protect ring, channel protection ring, can make full use of the diversity of physics route in the mesh network like this.Under this networking mode; utilize the intrinsic protection mechanism of network bottom layer to provide perfect protection merely for customer service; it is that operating path is found the solution one and protected the path end to end that prior art adopts shortest path first usually, for business provides perfect protection mechanism.
The shortcoming of above-mentioned prior art is: because shortest path first is based on the mesh network design, algorithm is not considered the protection mechanism that the optical transport network bottom is intrinsic in the process of finding the solution.In fact; part of links in the operating path may possess the intrinsic protective capability (loop multiplexing section protection or linear multiplex section protection etc.) of optical transport network bottom; if still find the solution the protection path according to the method described above; the phenomenon that the coexistence of intrinsic protection of local link and entire path end-to-end protection will occur, the waste Internet resources.
Therefore; from effectively utilizing the angle of Internet resources; need require different business at protection level; different protection path method for solving is provided; satisfying on the professional basis that requires for protection level; take into account the intrinsic protective capability of original transmission network, Internet resources avoid waste as far as possible.
Summary of the invention
For defective and the deficiency that overcomes prior art, the object of the present invention is to provide a kind of protection method for obtaining path that can avoid effective use Internet resources of network resources waste.
In order to achieve the above object, the protection method for obtaining path of a kind of effective use Internet resources of the present invention may further comprise the steps:
(1) judge other height of service protection level, if service protection rank height, then adopting shortest path first is that operating path is found the solution and protected the path end to end; If the service protection rank is not high, then enter step (2);
Wherein, if professional protection level requires such protection mechanism is provided: for all working node except that source node and destination node and active link fault, can not make service disconnection, then this business belongs to the high business of protection level, otherwise belongs to the not high business of protection level;
(2) search begins to all links the destination node from source node, and will have the link of intrinsic protection and add in the protection path of finding the solution through the localised protection path of finding the solution the continuous no intrinsic protection link set that obtains in order;
Wherein, intrinsic protection is meant the protection mechanism that the optical transport network bottom provides.
As a further improvement on the present invention, described step (2) is specially:
(21) begin to obtain one from source node in order and do not find the solution the link in protection path and judge whether this link has intrinsic protection, if judged result is for being then to enter step (22); If judged result then enters step (23) for not;
(22) this link is added in the protection path of finding the solution, enter step (24);
(23) search for the set of the continuous link of no intrinsic protection behind this link successively, and after finding the solution the localised protection path of this link set, add in the protection path of finding the solution, enter step (24);
(24) check the active link of whether not finding the solution the protection path in addition,, then enter step (21) if having; If no, then step finishes.
As a further improvement on the present invention, described step (23) is specially:
(231) search for the link set of the continuous link of no intrinsic protection behind this link successively;
(232) with in the operating path not the node in this link set from topology, delete;
(233) by the independence strategy for after this link set finds the solution the localised protection path, this link set is emptied.
As a further improvement on the present invention; the method of the link set of the continuous link of no intrinsic protection is behind this link of search described in the step (231): the link that will not have intrinsic protection leaves in the set; and check the active link that is positioned at after this link successively according to the direction of pointing to destination node from source node; if there is not intrinsic protection; then add in this link set; if intrinsic protection is arranged or arrived destination node, then finish search.
As a further improvement on the present invention, described step (24) is specially:
(241) judge according to the direction from the source node to the destination node whether the tail node of this active link or this link set is the destination node of operating path, if judged result is for being then step end; If judged result then enters step (21) for not.
As a further improvement on the present invention, the intrinsic protection described in the described step (21) comprises at least: multiplex section protective ring, channel protection ring, SNCP and linear multiplex section protection.
As a further improvement on the present invention, the independence strategy described in the step (233) comprises at least: node is irrelevant, link is irrelevant, the shared risk group is irrelevant, the shared risk link group is irrelevant.
After adopting above-mentioned method, take diverse ways to find the solution the protection path by protection level being required different business.On the basis of satisfying the requirement of service protection rank, considered the intrinsic protective capability of optical transport network bottom, avoid occurring protected mode and the overlapping phenomenon of the intrinsic protection mechanism of link end to end, thereby reduce waste of network resources.
Description of drawings
Fig. 1 is the overall procedure block diagram of finding the solution the protection path among the present invention;
Fig. 2 is a FB(flow block) of finding the solution the localised protection path among the present invention;
Fig. 3 is the topological environmental figure of the embodiment of the invention.
Embodiment
Below in conjunction with accompanying drawing the specific embodiment of the present invention is described in further detail.
As shown in Figure 1,, use method provided by the invention,, find the solution and protect the path end to end for the high business of protection level for the present invention finds the solution the overall procedure block diagram of protecting the path; For the less demanding business of protection level, then take into full account the intrinsic protection mechanism of transmission network bottom, for it finds the solution local protection path.Method provided by the invention comprises the following steps:
(101) judge professional protection level, for the protection level height, the business of the end-to-end protection mechanism that requires to provide perfect, execution in step (102); Otherwise execution in step (103);
If professional protection level requires such protection mechanism is provided: for all working node except that source node and destination node and active link fault; can not make service disconnection; this business just belongs to the high business of protection level of indication of the present invention, provides perfect end-to-end protection for this service needed for it.
(102) adopt shortest path first, find the solution for operating path and protect the path end to end;
When finding the solution the end-to-end protection path, earlier other nodes except that the source and destination node in the operating path are deleted from network topology, and then adopted shortest path first to find the solution, obtain an end-to-end protection path that has nothing to do with operating path.
(103) the localised protection route method is found the solution in employing, for operating path is found the solution the protection path;
In the process of finding the solution the protection path, considered the intrinsic protective capability of optical transport network bottom; only find the solution local protection path for the active link (or active link set) that does not possess intrinsic protection; thereby avoid occurring protected mode and the overlapping phenomenon of the intrinsic protection mechanism of optical transport network bottom end to end, can effectively utilize Internet resources more.
As shown in Figure 2, for finding the solution the FB(flow block) in localised protection path, specifically comprise following substep:
(201) get next bar active link in the operating path; When taking off an active link, if carry out this step for the first time, what obtain so is article one link that begins from source node in the operating path, otherwise obtains next bar active link of work at present link according to the direction of pointing to purpose from the source, and is set to the work at present link;
(202) check whether the work at present link has intrinsic protection, if having, execution in step (203) then, otherwise execution in step (204);
The intrinsic protection attribute of link is a kind of in the link topology information, can pass through the management plane static configuration, also can pass through Routing Protocol (for example: ospf protocol and Extended Protocol thereof) dynamically diffusion between each node of network internal.Algorithm receives these information, leaves the topological database that is used for path computing in.Intrinsic protection of the present invention comprises protection mechanisms such as multiplex section protective ring based on SDH, channel protection ring, SNCP, linear multiplex section protection, and other various optical transport network bottoms protection mechanism that may provide.
(203) the work at present link is added in the protection path of finding the solution, then execution in step (207);
(204) continue search follow-up work link, find the link set of continuous no intrinsic protection;
When searching for the link set of no intrinsic protection continuously, at first the work at present link is left in the set, check the active link that is positioned at after the work at present link successively according to the direction of pointing to destination node from source node then, if link does not have intrinsic protection, it is added in the above-mentioned set, and be set to the work at present link; If intrinsic protection is arranged, search this time finishes.If arrived destination node, search so this time also finishes.
(205) find the solution local end-to-end protection for current link set, find the solution local protection path and comprise following substep:
(a) with those nodes in current link set not in the operating path, delete from topology, when avoiding finding the solution the protection path for local operating path, the protection path is through other operating path nodes outside the local operating path.
(b) adopting specific independence strategy is that current link set is found the solution the localised protection path.Independence strategy described here comprises: node is irrelevant, link is irrelevant, SRG (shared risk group) is irrelevant, SRLG (shared risk link group) is irrelevant, and does not get rid of other irrelevant form.
(c) the localised protection path is found the solution and is finished, and empties this link set.
(206) the localised protection path is added in the protection path to be found the solution, enter step (207);
(207) check the active link of whether not finding the solution the protection path in addition,, then return step (201) if having; Otherwise the protection path that operating path is described has been found the solution and has been finished, and algorithm finishes.
When judging whether not find the solution the active link of protection in addition, judge according to the direction from the source node to the destination node whether the tail node of work at present link is the destination node of operating path, if the active link of not finding the solution protection is described; If not, the operating path of not finding the solution protection in addition is described.
As shown in Figure 3, be example below with the topological environmental, how further instruction the present invention finds the solution the protection path of operating path W.Wherein, A is a source node, and A, B, C, D are the node on the SDH multiplexing section protection rings, H-Z is the link with the intrinsic protection mechanism of 1+1, and Z is a destination node, and W is an operating path, P0 is the end-to-end protection path of operating path W, and P1 is the protection path of operating path W; Considered the intrinsic protective capability of optical transport network bottom; for the high business of protection level; adopt the end-to-end protection route method of finding the solution of tradition; from topology, delete other nodes except that the source and destination node in the operating path earlier; promptly delete C, E, H node, the protection path of adopting shortest path first to find the solution then to obtain is: A-L-M-N-Z.
For the not high business of protection level,, adopt and find the solution the localised protection route method in order effectively to utilize the intrinsic resource conservation of network.Concrete handling process is as follows:
(1) gets next bar active link in the operating path.Because be to carry out this step for the first time, get article one active link of operating path W: A-C, and link A-C is set to the work at present link;
(2) check whether the work at present link has intrinsic protection.Because link A-C is positioned on the Multiplex Section Shared Protection Ring, possess looped network protection mechanism, therefore active link is added in the protection path, protect the path to be at present: A-C;
(3) check whether also have untreated active link.The tail node C of work at present link is not the destination node of operating path, illustrates to also have untreated active link (also having active link C-E, E-H and H-Z to be untreated at present);
(4) get next bar active link in the operating path.According to the direction from the source node to the destination node, next bar active link of A-C link is C-E, and C-E is set to the work at present link;
(5) check whether active link has intrinsic protection; because link C-E is common active link; do not possess intrinsic protection mechanism; search for the follow-up work link in order; find the link set G of continuous no intrinsic protection; at first work at present link C-E is added among the link set G; be positioned at link after the C-E link: E-H according to the direction inspection of pointing to purpose from the source then; this link does not have intrinsic protection; therefore also add among the link set G, and E-H is set is the work at present link, continues next bar active link: H-Z of search; because link H-Z has intrinsic protection, so this search finishes.The link set G of the no intrinsic protection that obtains at present comprises two link: C-E, E-H;
(6) find the solution the localised protection path for link set G; at first with in the operating path those not the node in current link set G from topology, delete; at present, A node among the operating path A-C-E-H-Z and Z node not in link set G, therefore deletion of node A and Z from topology.According to certain independence strategy, the local operating path C-E-H that forms for the link among the set G finds the solution the protection path then, finds the solution to obtain and the irrelevant localised protection path of C-E-H node: C-F-H then, empties link set G.
(7) add in the protection path to be found the solution finding the solution the localised protection path C-F-H that obtains, the protection path that obtains at present is: A-C-F-H;
(8) look into whether also have untreated active link.Because the tail node of work at present link E-H is not the destination node of operating path, illustrate and also have untreated active link, therefore get next the bar active link in the operating path, according to the direction from the source node to the destination node, next bar active link of E-H link is H-Z, and H-Z is set to the work at present link;
(9) check whether the work at present link has intrinsic protection.Because link H-Z has 1+1 privacy protection mechanism, therefore active link to be added in the protection path, the protection path that obtains at present is: A-C-F-H-Z;
(10) check whether also have untreated active link, the tail node of work at present link H-Z is the destination node of operating path, illustrates that present all working link all disposes, so algorithm finishes.For operating path W (A-C-E-H-Z) finds the solution the protection path that obtains is P1 (A-C-F-H-Z).Wherein, A-C and H-Z link utilization the intrinsic protection mechanism of optical transport network bottom, C-E-H link section and C-F-H link section have then formed local end-to-end protection.
The present invention takes diverse ways to find the solution the protection path by protection level being required different business.On the basis of satisfying the requirement of service protection rank, considered the intrinsic protective capability of optical transport network bottom, avoid occurring protected mode and the overlapping phenomenon of the intrinsic protection mechanism of link end to end, thereby reduce waste of network resources.
Claims (7)
1, a kind of protection method for obtaining path of effective use Internet resources is characterized in that, may further comprise the steps:
(1) judge other height of service protection level, if service protection rank height, then adopting shortest path first is that operating path is found the solution and protected the path end to end; If the service protection rank is not high, then enter step (2);
Wherein, if professional protection level requires such protection mechanism is provided: for all working node except that source node and destination node and active link fault, can not make service disconnection, then this business belongs to the high business of protection level, otherwise belongs to the not high business of protection level;
(2) search begins to all links the destination node from source node, and will have the link of intrinsic protection and add in the protection path of finding the solution through the localised protection path of finding the solution the continuous no intrinsic protection link set that obtains in order;
Wherein, intrinsic protection is meant the protection mechanism that the optical transport network bottom provides.
According to the protection method for obtaining path of the described effective use Internet resources of claim 1, it is characterized in that 2, described step (2) is specially:
(21) begin to obtain one from source node in order and do not find the solution the link in protection path and judge whether this link has intrinsic protection, if judged result is for being then to enter step (22); If judged result then enters step (23) for not;
(22) this link is added in the protection path of finding the solution, enter step (24);
(23) search for the set of the continuous link of no intrinsic protection behind this link successively, and after finding the solution the localised protection path of this link set, add in the protection path of finding the solution, enter step (24);
(24) check the active link of whether not finding the solution the protection path in addition,, then enter step (21) if having; If no, then step finishes.
According to the protection method for obtaining path of the described effective use Internet resources of claim 2, it is characterized in that 3, described step (23) is specially:
(231) search for the link set of the continuous link of no intrinsic protection behind this link successively;
(232) with in the operating path not the node in this link set from topology, delete;
(233) by the independence strategy for after this link set finds the solution the localised protection path, this link set is emptied.
4, according to the protection method for obtaining path of the described effective use Internet resources of claim 3; it is characterized in that; the method of the link set of the continuous link of no intrinsic protection is behind this link of search described in the step (231): the link that will not have intrinsic protection leaves in the set; and check the active link that is positioned at after this link successively according to the direction of pointing to destination node from source node; if there is not intrinsic protection; then add in this link set; if intrinsic protection is arranged or arrived destination node, then finish search.
According to the protection method for obtaining path of the described effective use Internet resources of claim 2, it is characterized in that 5, described step (24) is specially:
(241) judge according to the direction from the source node to the destination node whether the tail node of this active link or this link set is the destination node of operating path, if judged result is for being then step end; If judged result then enters step (21) for not.
6, according to the protection method for obtaining path of the described effective use Internet resources of claim 2; it is characterized in that the intrinsic protection described in the described step (21) comprises at least: multiplex section protective ring, channel protection ring, SNCP and linear multiplex section protection.
7, according to the protection method for obtaining path of the described effective use Internet resources of claim 3; it is characterized in that the independence strategy described in the step (233) comprises at least: node is irrelevant, link is irrelevant, the shared risk group is irrelevant, the shared risk link group is irrelevant.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB200610138329XA CN100536405C (en) | 2006-11-07 | 2006-11-07 | Method of obtaining protection path of effectively used network resource |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB200610138329XA CN100536405C (en) | 2006-11-07 | 2006-11-07 | Method of obtaining protection path of effectively used network resource |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101179419A CN101179419A (en) | 2008-05-14 |
CN100536405C true CN100536405C (en) | 2009-09-02 |
Family
ID=39405519
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB200610138329XA Expired - Fee Related CN100536405C (en) | 2006-11-07 | 2006-11-07 | Method of obtaining protection path of effectively used network resource |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN100536405C (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101577844B (en) * | 2009-06-05 | 2012-05-23 | 中兴通讯股份有限公司 | Method and system for searching wavelength division multiplexing network path |
CN101938309B (en) * | 2010-09-15 | 2013-05-08 | 重庆邮电大学 | Network code-based WDM network sectionalized protection method |
CN101938426B (en) * | 2010-09-16 | 2015-06-10 | 中兴通讯股份有限公司 | Routing inquiry method and system for automatic switched optical network |
CN102469012B (en) * | 2010-11-12 | 2016-03-30 | 中兴通讯股份有限公司 | routing inquiring device and method |
CN102740175B (en) * | 2012-06-12 | 2014-09-24 | 武汉邮电科学研究院 | Method for protecting and recovering cross-domain end-to-end label switched path |
CN108574640B (en) * | 2017-03-10 | 2020-11-27 | 中国移动通信集团陕西有限公司 | Method and device for detecting the same service route in a transmission network |
-
2006
- 2006-11-07 CN CNB200610138329XA patent/CN100536405C/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
CN101179419A (en) | 2008-05-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7308198B1 (en) | Method for allocating protection bandwidth in a telecommunications mesh network | |
CN101227248B (en) | Method for establishing business path | |
CN100536405C (en) | Method of obtaining protection path of effectively used network resource | |
US10587472B2 (en) | Highly reliable path accommodation design apparatus and method | |
CN105978741A (en) | Network fault handling method and system | |
CN104734950A (en) | Method and device for protecting PTN network services | |
Ramasubramanian et al. | Dual-link failure resiliency through backup link mutual exclusion | |
CN1333554C (en) | Method for combining multi-section protection and mesh network recovery | |
CN101674217B (en) | Method for realizing permanent ring network protection in MESH network | |
CN100382504C (en) | Cross-over end-to-end connection setting method for main apparatus protection in automatic exchange optical network | |
CN101159494A (en) | Service protecting method for automatic exchange optical network | |
US20140040476A1 (en) | Method and system for network restructuring in multilayer network | |
CN102143410A (en) | Path computing method and unit in optical network | |
Hwang et al. | Multiple shared backup cycles for survivable optical mesh networks | |
WO2005022823A1 (en) | A method for achieving a path with protection entity in the intelligent optical network | |
Klopfenstein | Rerouting tunnels for MPLS network resource optimization | |
CN102325039A (en) | An Optimal Design Method of ASON Network Oriented to Power Control Service | |
Ho et al. | Spare capacity allocation for WDM mesh networks with partial wavelength conversion capacity | |
CN110062301A (en) | Route selection method, device, equipment and storage medium | |
Saini et al. | Fallacious node algorithm for performance enhancement in optical-burst-switching networks | |
CN103490810B (en) | The light multicast dynamic P circle 2 jumping segment protection method that a kind of wavelength convert scope is limited | |
Lu et al. | Asymmetric CDC ROADM architecture for efficient support of bi-directional asymmetric traffic demands | |
CN106330294A (en) | Business control method and device in optical communication network | |
Li et al. | On finding the multicast protection tree considering SRLG in WDM optical networks | |
Todd et al. | Demand-wise shared protection network design and topology allocation with dual-failure restorability |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20090902 Termination date: 20151107 |
|
EXPY | Termination of patent right or utility model |