CN109242242A - A kind of method and system modeled for determining system protection private network business risk - Google Patents

A kind of method and system modeled for determining system protection private network business risk Download PDF

Info

Publication number
CN109242242A
CN109242242A CN201810837438.3A CN201810837438A CN109242242A CN 109242242 A CN109242242 A CN 109242242A CN 201810837438 A CN201810837438 A CN 201810837438A CN 109242242 A CN109242242 A CN 109242242A
Authority
CN
China
Prior art keywords
business
node
network
path
link
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810837438.3A
Other languages
Chinese (zh)
Other versions
CN109242242B (en
Inventor
王继业
张庚
汪洋
王亚男
王智慧
丁慧霞
滕玲
陈相舟
王科
尹弘亮
邱丽君
李哲
李健
唐亮
吴赛
孙辰军
刘欣
卢朝晖
李伯中
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
State Grid Information and Telecommunication Co Ltd
China Electric Power Research Institute Co Ltd CEPRI
State Grid Hebei Electric Power Co Ltd
Original Assignee
State Grid Corp of China SGCC
State Grid Information and Telecommunication Co Ltd
China Electric Power Research Institute Co Ltd CEPRI
State Grid Hebei Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, State Grid Information and Telecommunication Co Ltd, China Electric Power Research Institute Co Ltd CEPRI, State Grid Hebei Electric Power Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN201810837438.3A priority Critical patent/CN109242242B/en
Publication of CN109242242A publication Critical patent/CN109242242A/en
Application granted granted Critical
Publication of CN109242242B publication Critical patent/CN109242242B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F30/00Computer-aided design [CAD]
    • G06F30/20Design optimisation, verification or simulation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/12Computing arrangements based on biological models using genetic models
    • G06N3/126Evolutionary algorithms, e.g. genetic algorithms or genetic programming
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/06Electricity, gas or water supply

Abstract

The present invention provides a kind of for determining the method and system of the business risk of system protection private network network, belongs to the communications field of system protection private network network.The method of the present invention includes: step 1, carries out fault location to system protection private network network, determines fault type and alerted according to fault type;Step 2 creates the rerouting mechanism based on business risk and constructs routing optimality mathematical model;Step 3 constructs Route Optimization Model according to the stability contorting business carried on the communication link of the routing optimality mathematical model of the above-mentioned rerouting mechanism building based on business risk and the automatic heavy-route of triggering.The present invention realizes the delay of business average transmission and the weighted sum of the whole network traffic balancing degree is minimum.The present invention is effectively reduced the operation risk of business, avoids traffic lost, further enhances robustness and the flexibility of real-time system protection private network network communicating system.

Description

A kind of method and system modeled for determining system protection private network business risk
Technical field
The present invention relates to the communications fields of system protection private network network, and relate more specifically to a kind of for determining system Protect the method and system of private network business risk modeling.
Background technique
Compared with traditional WDM network, main networking mode one of of the Mesh networking as ASON network has flexibly, easily The characteristics of extension.Under this networking mode, restoration path can have many items, improve the safety of network, and maximum journey Whole network resource is utilized on degree.In Mesh networking, to enable interrupting service to reclose, except adopting traditional dedicated guarantor Shield and shared protection are outer, additionally it is possible to the instant recovery of business is realized by means of rerouting mechanism.
Dynamic heavy-route is one of GMPLS/ASON bring central characteristics, is that one kind takes into account protective capability and the utilization of resources The protected mode of efficiency, and to the revolutionary supplement of traditional protection mode and improvement.There is it, anti-fine protection of repeatedly breaking/ It reverts in order to possible.
Summary of the invention
It is an object of the invention to can be effectively reduced the operation risk of business, real-time system protection private network is further enhanced The robustness and stability of network, it is ensured that the reliable and stable operation of communication network and network system proposes a kind of for determining The method of the business risk of system protection private network network, comprising:
Step 1 carries out fault location to system protection private network network, determines fault type and alerted according to fault type;
Step 2 creates the rerouting mechanism based on business risk and constructs routing optimality mathematical model, specifically:
Wherein,For the average communication duration of business, Ti is the time delay of business i, and L is business number, and BD is traffic balancing Degree, Li are the business number of i-th chain road carrying, and m is network link number, and Tmax is maximum traffic time delay, and Lmax is chain The maximum traffic number of road carrying, α and β are two constant coefficients, and constraint portions indicate service delay constraint and link traffic number Constraint;
Step 3,
According to the routing optimality mathematical model of the above-mentioned rerouting mechanism building based on business risk and the automatic weight road of triggering By communication link on the stability contorting business that carries, construct Route Optimization Model, it is specific as follows:
It to the stability contorting business initializtion in system protection private network network, constructs network topology G (V, E, W), industry is set It is engaged in list S (vs, vd);
Wherein V is node set, and E is link set, and W is weight-time delay of each of the links, and vs is business start node, Vd is business purpose node;
Broken link X is deleted in network topology G, obtains new network topology G ';
K time delay shortest path before finding for every business in collection of services S forms business optional path collection Sk;
Every business is regarded to a gene of chromosome as, chromosome length is business number, and gene coding uses nature The fitness function of number encoder, chromosome i is
Initial population is randomly generated, selects function for roulette wheel selection, the probability that chromosome i is selected for
Crossover process uses location-based hybridization operation method, and mutation process is to change 1 base in some chromosome at random The position of cause, based on certain the number of iterations, filters out one from the optional path of business concentration using traditional genetic algorithm Optimum combination;
Obtained service path combination, average traffic communication delay and traffic balancing degree is exported, according to output judgement business Path risk, average traffic communication delay is smaller and traffic balancing degree is passed through in 0 business road, and service path value-at-risk is lower.
Optionally, step 1 is specifically to construct network topology G, collection of services S and fault warning set A, when in network with Chain road Li break down Fi when, business Si generates abnormal in destination node, determines fault type and generates warning information Ai, is formed The bigraph (bipartite graph) of fault warning set A and suspected malfunctions link set F, pre-process bigraph (bipartite graph), simplify bigraph (bipartite graph), set F In, remove must not failure set FN, leaving must the set FY of the failure and set FS of suspected malfunctions;Utilize fault location Algorithm, the final failure element determined in FS, so that it is determined that faulty link set FF in network.
Optionally, rerouting mechanism passes through the LSP of node D and node G to node K, node from first node A configured with one The interruption of D and node G are fine, heavy-route process are as follows:
After the FIU or OTU of node D detects alarm, master control GMPLS module is reported;
The impacted IN service of node D master control GMPLS module check sends Notify message to first node A;
After the GMPLS module of first node A receives Notify message, an end-to-end restoration path is calculated, then along meter Good path sends PATH message to the direction end-node K through intermediate node, and on the way, each node establishes reversed interconnection;
After the GMPLS module of end-node K receives PATH message, RESV is sent to the direction first node A via intermediate node and is disappeared Breath establishes positive interconnection in each node on the way;
After first node A receives the RESV message that end-node is sent, alarm monitoring is opened, node transmission is swum still further below and opens announcement Alert PATH message.Downstream node receives the alarm monitoring opened after the message to new business path, the alarm prison of whole LSP After opening, old road diameter is then deleted if it is non-revertive mode business.
The invention also provides a kind of systems for determining the business risk of system protection private network network, comprising:
Fault location and warning unit carry out fault location to system protection private network network, determine fault type and basis Fault type alarm;
Mathematical model unit is constructed, the rerouting mechanism based on business risk is created and constructs routing optimality mathematical model, tool Body are as follows:
Wherein,For the average communication duration of business, Ti is the time delay of business i, and L is business number, and BD is traffic balancing Degree, Li are the business number of i-th chain road carrying, and m is network link number, and Tmax is maximum traffic time delay, and Lmax is chain The maximum traffic number of road carrying, α and β are two constant coefficients, and constraint portions indicate service delay constraint and link traffic number Constraint;
Optimized model unit is constructed, according to the routing optimality mathematical modulo of the above-mentioned rerouting mechanism building based on business risk The stability contorting business carried on the communication link of type and the automatic heavy-route of triggering, constructs Route Optimization Model, specific as follows:
It to the stability contorting business initializtion in system protection private network network, constructs network topology G (V, E, W), industry is set It is engaged in list S (vs, vd);
Wherein V is node set, and E is link set, and W is weight-time delay of each of the links, and vs is business start node, Vd is business purpose node;
Broken link X is deleted in network topology G, obtains new network topology G ';
K time delay shortest path before finding for every business in collection of services S forms business optional path collection Sk;
Every business is regarded to a gene of chromosome as, chromosome length is business number, and gene coding uses nature The fitness function of number encoder, chromosome i is
Initial population is randomly generated, selects function for roulette wheel selection, the probability that chromosome i is selected for
Crossover process uses location-based hybridization operation method, and mutation process is to change 1 base in some chromosome at random The position of cause, based on certain the number of iterations, filters out one from the optional path of business concentration using traditional genetic algorithm Optimum combination;
Obtained service path combination, average traffic communication delay and traffic balancing degree is exported, according to output judgement business Path risk, average traffic communication delay is smaller and traffic balancing degree is passed through in 0 business road, and service path value-at-risk is lower.
Optionally, fault location and warning unit are specifically to construct network topology G, collection of services S and fault warning set A, when link Li random in network breaks down Fi, business Si generates exception in destination node, determines fault type and generates announcement Alert information Ai, forms the bigraph (bipartite graph) of fault warning set A and suspected malfunctions link set F, pre-processes to bigraph (bipartite graph), simplifies Bigraph (bipartite graph), in set F, remove must not failure set FN, leaving must the set FY of the failure and set FS of suspected malfunctions; Using fault location algorithm, the final failure element determined in FS, so that it is determined that faulty link set FF in network.
Optionally, rerouting mechanism passes through the LSP of node D and node G to node K, node from first node A configured with one The interruption of D and node G are fine, heavy-route process are as follows:
After the FIU or OTU of node D detects alarm, master control GMPLS module is reported;
The impacted IN service of node D master control GMPLS module check sends Notify message to first node A;
After the GMPLS module of first node A receives Notify message, an end-to-end restoration path is calculated, then along meter Good path sends PATH message to the direction end-node K through intermediate node, and on the way, each node establishes reversed interconnection;
After the GMPLS module of end-node K receives PATH message, RESV is sent to the direction first node A via intermediate node and is disappeared Breath establishes positive interconnection in each node on the way;
After first node A receives the RESV message that end-node is sent, alarm monitoring is opened, node transmission is swum still further below and opens announcement Alert PATH message.Downstream node receives the alarm monitoring opened after the message to new business path, the alarm prison of whole LSP After opening, old road diameter is then deleted if it is non-revertive mode business.
The present invention has the advantages that
(1) present invention realizes the delay of business average transmission and the weighted sum of the whole network traffic balancing degree is minimum.
(2) present invention is effectively reduced the operation risk of business, avoids traffic lost, further enhances real-time system Protect robustness and the flexibility of private network network communicating system.
Detailed description of the invention
Fig. 1 is that the present invention is a kind of for determining the method rerouting mechanism process of the business risk of system protection private network network Figure;
Fig. 2 is that the present invention is a kind of for determining the method fault location and warning of the business risk of system protection private network network Model structure;
Fig. 3 is that the present invention is a kind of for determining the method bigraph (bipartite graph) schematic diagram of the business risk of system protection private network network;
Fig. 4 is that the present invention is a kind of for determining the method fault location and warning of the business risk of system protection private network network Flow chart;
Fig. 5 is that a kind of method active blending algorithm for determining the business risk of system protection private network network of the present invention is former Reason figure;
Fig. 6 is that the present invention is a kind of for determining the method flow diagram of the business risk of system protection private network network;
Fig. 7 is that the present invention is a kind of for determining the system construction drawing of the business risk of system protection private network network.
Specific embodiment
Exemplary embodiments of the present invention are introduced referring now to the drawings, however, the present invention can use many different shapes Formula is implemented, and is not limited to the embodiment described herein, and to provide these embodiments be at large and fully disclose The present invention, and the scope of the present invention is sufficiently conveyed to person of ordinary skill in the field.Show for what is be illustrated in the accompanying drawings Term in example property embodiment is not limitation of the invention.In the accompanying drawings, identical cells/elements use identical attached Icon note.
Unless otherwise indicated, term (including scientific and technical terminology) used herein has person of ordinary skill in the field It is common to understand meaning.Further it will be understood that with the term that usually used dictionary limits, should be understood as and its The context of related fields has consistent meaning, and is not construed as Utopian or too formal meaning.
The present invention provides a kind of method for determining the business risk of system protection private network network, as shown in fig. 6, packet It includes:
Step 1 carries out fault location to system protection private network network, determines fault type and alerted according to fault type;
As shown in figure 4, fault location detailed process is to construct network topology G as shown in Figure 2, collection of services S, failure Set A is alerted as input, bigraph (bipartite graph) as shown in Figure 3 is established, finds related to faulty link set F, determine failure Type is simultaneously alerted according to fault type;Secondly, pre-processed, simplify bigraph (bipartite graph), in set F, removing must not failure collection FN is closed, leaving must the set FY of the failure and set FS of suspected malfunctions;Using fault location algorithm, the final event determined in FS Hinder element, so that it is determined that faulty link set FF in network.
If Fig. 2 network topology G has business S0, S1 and S2, when link L (5,10) generate failure, business S0 and S2 are generated Alert A0 and A2.Then suspected malfunctions link set is { F (7,6), F (6,5), F (2,5), F (5,10), F (10,13) }, and basis Business S1 is good, exclusion link { F (7,6), F (6,5) }.Bigraph (bipartite graph) as shown above is ultimately formed, if it is single-stranded Road fault scenes, then faulty link is necessarily (5,10);If it is multilink fault scene, since A2 can only be drawn by F (5,10) It rises, then inevitable faulty link is (5,10), and suspected malfunctions link is (2,5) and (10,13), then the set of faulty link may be { F (2,5), F (5,10) }, { F (10,13), F (5,10) } or { F (2,5), F (5,10), F (10,13) }.
Wherein fault location principle is as shown in Figure 5.Fig. 5 refers to a simple scenario of fault location, first to alarm Information is pre-processed, and bigraph (bipartite graph) as shown in Figure 5 is obtained, and determines the range of suspected malfunctions link;According to pretreated letter Breath, the determining routing for needing to send detection business, and detection business is sent, as shown in Figure 5;The alarm generated according to detection business Information is accurately positioned the position 1 of faulty link.For example, link e12 and link e23 failure in figure, cause business spw1 and Spw2 is interrupted, and generates bigraph (bipartite graph), and by proving, possible failure path set is { e12, e23 } and { e23 }.Then again in chain Detection business is sent in road e12 and link e23, determines the combination of final faulty link.Active blending algorithm is only in local transmission Detection business, business are only 1 jump, and occupancy resource is less, and detection time is shorter.
Step 2 creates the rerouting mechanism based on business risk and constructs routing optimality mathematical model, specifically:
Wherein,For the average communication duration of business, Ti is the time delay of business i, and L is business number, and BD is traffic balancing Degree, Li are the business number of i-th chain road carrying, and m is network link number, and Tmax is maximum traffic time delay, and Lmax is chain The maximum traffic number of road carrying, α and β are two constant coefficients, and constraint portions indicate service delay constraint and link traffic number Constraint;
Wherein, as shown in Figure 1, rerouting mechanism passes through node D and node G to node K from first node A configured with one LSP, node D and node G interruption it is fine, heavy-route process are as follows:
After the FIU or OTU of node D detects alarm, master control GMPLS module is reported;
The impacted IN service of node D master control GMPLS module check sends Notify message to first node A;
After the GMPLS module of first node A receives Notify message, an end-to-end restoration path is calculated, then along meter Good path sends PATH message to the direction end-node K through intermediate node, and on the way, each node establishes reversed interconnection;
After the GMPLS module of end-node K receives PATH message, RESV is sent to the direction first node A via intermediate node and is disappeared Breath establishes positive interconnection in each node on the way;
After first node A receives the RESV message that end-node is sent, alarm monitoring is opened, node transmission is swum still further below and opens announcement Alert PATH message.Downstream node receives the alarm monitoring opened after the message to new business path, the alarm prison of whole LSP After opening, old road diameter is then deleted if it is non-revertive mode business.
Step 3,
According to the routing optimality mathematical model of the above-mentioned rerouting mechanism building based on business risk and the automatic weight road of triggering By communication link on the stability contorting business that carries, construct Route Optimization Model, it is specific as follows:
Initialization constructs network topology G (V, E, W), is arranged service lists S (vs, vd);
Wherein V is node set, and E is link set, and W is weight-time delay of each of the links, and vs is business start node, Vd is business purpose node;
Broken link X is deleted in network topology G, obtains new network topology G ';
K time delay shortest path before finding for every business in collection of services S forms business optional path collection Sk;
Every business is regarded to a gene of chromosome as, chromosome length is business number, and gene coding uses nature The fitness function of number encoder, chromosome i is
Initial population is randomly generated, selects function for roulette wheel selection, the probability that chromosome i is selected for
Crossover process uses location-based hybridization operation method, and mutation process is to change 1 base in some chromosome at random The position of cause, based on certain the number of iterations, filters out one from the optional path of business concentration using traditional genetic algorithm Optimum combination;
Export obtained service path combination and average traffic communication delay and traffic balancing degree.
The present invention also provides a kind of systems for determining the business risk of system protection private network network, as shown in fig. 7, being System 200 specifically includes:
Fault location and warning unit 201 carry out fault location to system protection private network network, determine fault type and root It is alerted according to fault type, specially building network topology G, collection of services S and fault warning set A, when link random in network Li break down Fi when, business Si generates abnormal in destination node, determines fault type and generates warning information Ai, forms failure and accuse The bigraph (bipartite graph) of alert set A and suspected malfunctions link set F, pre-process bigraph (bipartite graph), simplified bigraph (bipartite graph), in set F, remove Go must not failure set FN, leaving must the set FY of the failure and set FS of suspected malfunctions;Using fault location algorithm, The final failure element determined in FS, so that it is determined that faulty link set FF in network.
Mathematical model unit 202 is constructed, the rerouting mechanism based on business risk is created and constructs routing optimality mathematical model, Specifically:
Wherein,For the average communication duration of business, Ti is the time delay of business i, and L is business number, and BD is traffic balancing Degree, Li are the business number of i-th chain road carrying, and m is network link number, and Tmax is maximum traffic time delay, and Lmax is chain The maximum traffic number of road carrying, α and β are two constant coefficients, and constraint portions indicate service delay constraint and link traffic number Constraint;
Wherein, rerouting mechanism passes through the LSP, node D of node D and node G to node K configured with one from first node A Fine, the heavy-route process with the interruption of node G are as follows:
After the FIU or OTU of node D detects alarm, master control GMPLS module is reported;
The impacted IN service of node D master control GMPLS module check sends Notify message to first node A;
After the GMPLS module of first node A receives Notify message, an end-to-end restoration path is calculated, then along meter Good path sends PATH message to the direction end-node K through intermediate node, and on the way, each node establishes reversed interconnection;
After the GMPLS module of end-node K receives PATH message, RESV is sent to the direction first node A via intermediate node and is disappeared Breath establishes positive interconnection in each node on the way;
After first node A receives the RESV message that end-node is sent, alarm monitoring is opened, node transmission is swum still further below and opens announcement Alert PATH message.Downstream node receives the alarm monitoring opened after the message to new business path, the alarm prison of whole LSP After opening, old road diameter is then deleted if it is non-revertive mode business.
Optimized model unit 203 is constructed, according to the routing optimality number of the above-mentioned rerouting mechanism building based on business risk The stability contorting business carried on model and the communication link of the automatic heavy-route of triggering is learned, constructs Route Optimization Model, specifically such as Under:
It to the stability contorting business initializtion in system protection private network network, constructs network topology G (V, E, W), industry is set It is engaged in list S (vs, vd);
Wherein V is node set, and E is link set, and W is weight-time delay of each of the links, and vs is business start node, Vd is business purpose node;
Broken link X is deleted in network topology G, obtains new network topology G ';
K time delay shortest path before finding for every business in collection of services S forms business optional path collection Sk;
Every business is regarded to a gene of chromosome as, chromosome length is business number, and gene coding uses nature The fitness function of number encoder, chromosome i is
Initial population is randomly generated, selects function for roulette wheel selection, the probability that chromosome i is selected for
Crossover process uses location-based hybridization operation method, and mutation process is to change 1 base in some chromosome at random The position of cause, based on certain the number of iterations, filters out one from the optional path of business concentration using traditional genetic algorithm Optimum combination;
Obtained service path combination, average traffic communication delay and traffic balancing degree is exported, according to output judgement business Path risk, average traffic communication delay is smaller and traffic balancing degree is passed through in 0 business road, and service path value-at-risk is lower.
The present invention realizes the delay of business average transmission and the weighted sum of the whole network traffic balancing degree is minimum.
The present invention is effectively reduced the operation risk of business, avoids traffic lost, further enhances real-time system guarantor Protect robustness and the flexibility of private network network communicating system.

Claims (6)

1. a kind of method for determining the business risk of system protection private network network characterized by comprising
Step 1 carries out fault location to system protection private network network, determines fault type and alerted according to fault type;
Step 2 creates the rerouting mechanism based on business risk and constructs routing optimality mathematical model, specifically:
Wherein,For the average communication duration of business, Ti is the time delay of business i, and L is business number, and BD is traffic balancing degree, Li For the business number of i-th chain road carrying, m is network link number, and Tmax is maximum traffic time delay, and Lmax is link carrying Maximum traffic number, α and β are two constant coefficients, and constraint portions indicate service delay constraint and the constraint of link traffic number;
Step 3,
According to the routing optimality mathematical model of the above-mentioned rerouting mechanism building based on business risk and trigger automatic heavy-route The stability contorting business carried on communication link constructs Route Optimization Model, specific as follows:
It to the stability contorting business initializtion in system protection private network network, constructs network topology G (V, E, W), setting business arranges Table S (vs, vd);
Wherein V is node set, and E is link set, and W is weight-time delay of each of the links, and vs is business start node, and vd is Business purpose node;
Broken link X is deleted in network topology G, obtains new network topology G ';
K time delay shortest path before finding for every business in collection of services S forms business optional path collection Sk;
Every business is regarded to a gene of chromosome as, chromosome length is business number, and gene coding is compiled using natural number Code, the fitness function of chromosome i are as follows:
Initial population is randomly generated, selects function for roulette wheel selection, the probability that chromosome i is selected for
Crossover process uses location-based hybridization operation method, and mutation process is to change 1 gene in some chromosome at random Position, using traditional genetic algorithm, based on certain the number of iterations, from the optional path of business concentration filter out one it is optimal Combination;
Obtained service path combination, average traffic communication delay and traffic balancing degree is exported, service path is judged according to output Risk, average traffic communication delay is smaller and traffic balancing degree is passed through in 0 business road, and service path value-at-risk is lower.
2. according to the method described in claim 1, it is characterized by: the step one is specifically to construct network topology G, business Set S and fault warning set A, when link Li random in network breaks down Fi, business Si generates exception in destination node, really Determine fault type and generate warning information Ai, the bigraph (bipartite graph) of fault warning set A and suspected malfunctions link set F is formed, to two Portion's figure is pre-processed, and bigraph (bipartite graph) is simplified, in set F, removing must not failure set FN, leave must failure set FY With the set FS of suspected malfunctions;Using fault location algorithm, the final failure element determined in FS, so that it is determined that failure in network Link set FF.
3. according to the method described in claim 1, it is characterized by: the rerouting mechanism is configured with one from first node A By the LSP of node D and node G to node K, the interruption of node D and node G are fine, heavy-route process are as follows:
After the FIU or OTU of node D detects alarm, master control GMPLS module is reported;
The impacted IN service of node D master control GMPLS module check sends Notify message to first node A;
After the GMPLS module of first node A receives Notify message, an end-to-end restoration path is calculated, then edge calculates Path, through intermediate node to the direction end-node K send PATH message, on the way, each node establishes reversed interconnection;
After the GMPLS module of end-node K receives PATH message, RESV message is sent to the direction first node A via intermediate node, Each node establishes positive interconnection on the way;
After first node A receives the RESV message that end-node is sent, alarm monitoring is opened, node transmission is swum still further below and opens alarm PATH message.Downstream node receives the alarm monitoring opened after the message to new business path, and the alarm monitoring of whole LSP is beaten After opening, old road diameter is then deleted if it is non-revertive mode business.
4. a kind of business risk Optimization Modeling system of system protection private network network characterized by comprising
Fault location and warning unit carry out fault location to system protection private network network, determine fault type and according to failure Type alarm;
Mathematical model unit is constructed, the rerouting mechanism based on business risk is created and constructs routing optimality mathematical model, specifically:
Wherein,For the average communication duration of business, Ti is the time delay of business i, and L is business number, and BD is traffic balancing degree, Li For the business number of i-th chain road carrying, m is network link number, and Tmax is maximum traffic time delay, and Lmax is link carrying Maximum traffic number, α and β are two constant coefficients, and constraint portions indicate service delay constraint and the constraint of link traffic number;
Construct Optimized model unit, according to it is above-mentioned based on business risk rerouting mechanism building routing optimality mathematical model and The stability contorting business carried on the communication link of automatic heavy-route is triggered, Route Optimization Model is constructed, specific as follows:
It to the stability contorting business initializtion in system protection private network network, constructs network topology G (V, E, W), setting business arranges Table S (vs, vd);
Wherein V is node set, and E is link set, and W is weight-time delay of each of the links, and vs is business start node, and vd is Business purpose node;
Broken link X is deleted in network topology G, obtains new network topology G ';
K time delay shortest path before finding for every business in collection of services S forms business optional path collection Sk;
Every business is regarded to a gene of chromosome as, chromosome length is business number, and gene coding is compiled using natural number Code, the fitness function of chromosome i are as follows:
Initial population is randomly generated, selects function for roulette wheel selection, the probability that chromosome i is selected for
Crossover process uses location-based hybridization operation method, and mutation process is to change 1 gene in some chromosome at random Position, using traditional genetic algorithm, based on certain the number of iterations, from the optional path of business concentration filter out one it is optimal Combination;
Obtained service path combination, average traffic communication delay and traffic balancing degree is exported, service path is judged according to output Risk, average traffic communication delay is smaller and traffic balancing degree is passed through in 0 business road, and service path value-at-risk is lower.
5. system according to claim 4, it is characterised in that: the fault location and warning unit is specifically to construct net Network topology G, collection of services S and fault warning set A, when link Li random in network breaks down Fi, business Si is in Su Jie Point generates exception, determines fault type and generates warning information Ai, forms fault warning set A and suspected malfunctions link set F Bigraph (bipartite graph), bigraph (bipartite graph) is pre-processed, bigraph (bipartite graph) is simplified, in set F, removing must not failure set FN, leaving must Determine the set FY of failure and the set FS of suspected malfunctions;Using fault location algorithm, the final failure element determined in FS, thus Determine faulty link set FF in network.
6. system according to claim 4, it is characterised in that: the rerouting mechanism is configured with one from first node A By the LSP of node D and node G to node K, the interruption of node D and node G are fine, heavy-route process are as follows:
After the FIU or OTU of node D detects alarm, master control GMPLS module is reported;
The impacted IN service of node D master control GMPLS module check sends Notify message to first node A;
After the GMPLS module of first node A receives Notify message, an end-to-end restoration path is calculated, then edge calculates Path, through intermediate node to the direction end-node K send PATH message, on the way, each node establishes reversed interconnection;
After the GMPLS module of end-node K receives PATH message, RESV message is sent to the direction first node A via intermediate node, Each node establishes positive interconnection on the way;
After first node A receives the RESV message that end-node is sent, alarm monitoring is opened, node transmission is swum still further below and opens alarm PATH message.Downstream node receives the alarm monitoring opened after the message to new business path, and the alarm monitoring of whole LSP is beaten After opening, old road diameter is then deleted if it is non-revertive mode business.
CN201810837438.3A 2018-07-26 2018-07-26 Method and system for determining risk modeling of system protection private network business Active CN109242242B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810837438.3A CN109242242B (en) 2018-07-26 2018-07-26 Method and system for determining risk modeling of system protection private network business

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810837438.3A CN109242242B (en) 2018-07-26 2018-07-26 Method and system for determining risk modeling of system protection private network business

Publications (2)

Publication Number Publication Date
CN109242242A true CN109242242A (en) 2019-01-18
CN109242242B CN109242242B (en) 2022-04-15

Family

ID=65072616

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810837438.3A Active CN109242242B (en) 2018-07-26 2018-07-26 Method and system for determining risk modeling of system protection private network business

Country Status (1)

Country Link
CN (1) CN109242242B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110060179A (en) * 2019-04-24 2019-07-26 国网山东省电力公司济南供电公司 Multi-voltage grade Maintenance Schedule Optimization method and device based on risk degree of overlapping
CN110225540A (en) * 2019-01-30 2019-09-10 北京中科晶上科技股份有限公司 A kind of fault detection method towards centralization access net
CN111404727A (en) * 2020-03-02 2020-07-10 国网浙江省电力有限公司信息通信分公司 Route analysis method based on standby route potential risk assessment model

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106209621A (en) * 2016-06-17 2016-12-07 中国人民解放军空军工程大学 The link failure recovery method of qos constraint
US20170085488A1 (en) * 2015-09-22 2017-03-23 Brocade Communications Systems, Inc. Intelligent, load adaptive, and self optimizing master node selection in an extended bridge
CN106656598A (en) * 2016-12-22 2017-05-10 云南电网有限责任公司 Method and system for configuring alternative route of key service of electric power communication network
US9800474B1 (en) * 2014-10-21 2017-10-24 Amazon Technologies, Inc. Inter service network communication optimization

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9800474B1 (en) * 2014-10-21 2017-10-24 Amazon Technologies, Inc. Inter service network communication optimization
US20170085488A1 (en) * 2015-09-22 2017-03-23 Brocade Communications Systems, Inc. Intelligent, load adaptive, and self optimizing master node selection in an extended bridge
CN106209621A (en) * 2016-06-17 2016-12-07 中国人民解放军空军工程大学 The link failure recovery method of qos constraint
CN106656598A (en) * 2016-12-22 2017-05-10 云南电网有限责任公司 Method and system for configuring alternative route of key service of electric power communication network

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
A.J.GONZALEZ等: "GEARSHIFT: Guaranteeing availability requirements in SLAs using hybrid fault tolerance", 《2015 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM)》 *
孙严智等: "遗传算法电力通信网关键业务备选路由配置", 《云南电力技术》 *
许浩伟: "基于业务的光传送网路由优化", 《中国优秀硕士学位论文全文数据库信息科技辑》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110225540A (en) * 2019-01-30 2019-09-10 北京中科晶上科技股份有限公司 A kind of fault detection method towards centralization access net
CN110060179A (en) * 2019-04-24 2019-07-26 国网山东省电力公司济南供电公司 Multi-voltage grade Maintenance Schedule Optimization method and device based on risk degree of overlapping
CN110060179B (en) * 2019-04-24 2023-04-18 国网山东省电力公司济南供电公司 Multi-voltage-level maintenance plan optimization method and device based on risk overlapping degree
CN111404727A (en) * 2020-03-02 2020-07-10 国网浙江省电力有限公司信息通信分公司 Route analysis method based on standby route potential risk assessment model

Also Published As

Publication number Publication date
CN109242242B (en) 2022-04-15

Similar Documents

Publication Publication Date Title
CN108924673A (en) A kind of optical channel multipoint fault based on power telecom network carries out the method and system of self-healing
CN109242242A (en) A kind of method and system modeled for determining system protection private network business risk
EP1903725B1 (en) Packet communication method and packet communication device
US20030095500A1 (en) Methods for distributed shared mesh restoration for optical networks
Kumar et al. Notice of Violation of IEEE Publication Principles: Restoration of the network for next generation (5G) optical communication network
EP2169876A1 (en) Method for restoring connections in a network
Agraz et al. Experimental demonstration of centralized and distributed impairment-aware control plane schemes for dynamic transparent optical networks
CN104521192A (en) Techniques for flooding optimization for link state protocols in a network topology
EP1993223A1 (en) Method and device of group broadcast protection in wdm optical network
US7423995B1 (en) Criteria for tearing down network links
CN103001879A (en) Method and equipment for reducing of link state advertisement flooding frequency
WO2015070435A1 (en) Service deployment method, apparatus and network device
CN101800913B (en) Realization method for protecting and restoring multiplex section of automatically switched optical network
EP2312792A1 (en) Protection protocol device for network node and method for processing protection switching thereof
JP5056097B2 (en) Main transmission apparatus and method having in-device alarm suppression function
WO2012088978A1 (en) Method for establishing path in wavelength division network, communication node and communication system
CN107733681A (en) A kind of scheduling scheme collocation method and device
CN101248630A (en) Method for implementing automatic exchange optical network fast heavy route
Shen et al. Performance of protected working capacity envelopes based on p-cycles: Fast, simple, and scalable dynamic service provisioning of survivable services
CN1845516A (en) Optical burst switched network performance and fault monitoring method
Ben‐Ameur Multi‐hour design of survivable classical IP networks
CN103051374B (en) Protect restoration methods and device
Wang et al. Research on the virtual topology design methods in grid-computing-supporting IP/DWDM-based NGI
Sohn et al. A spare bandwidth sharing scheme based on network reliability
Ušćumlić et al. The cost of traffic protection in bidirectional optical packet switching rings

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant