CN109242242A - A kind of method and system modeled for determining system protection private network business risk - Google Patents
A kind of method and system modeled for determining system protection private network business risk Download PDFInfo
- Publication number
- CN109242242A CN109242242A CN201810837438.3A CN201810837438A CN109242242A CN 109242242 A CN109242242 A CN 109242242A CN 201810837438 A CN201810837438 A CN 201810837438A CN 109242242 A CN109242242 A CN 109242242A
- Authority
- CN
- China
- Prior art keywords
- business
- node
- network
- path
- link
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0635—Risk analysis of enterprise or organisation activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F30/00—Computer-aided design [CAD]
- G06F30/20—Design optimisation, verification or simulation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/12—Computing arrangements based on biological models using genetic models
- G06N3/126—Evolutionary algorithms, e.g. genetic algorithms or genetic programming
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
- G06Q50/06—Electricity, gas or water supply
Abstract
The present invention provides a kind of for determining the method and system of the business risk of system protection private network network, belongs to the communications field of system protection private network network.The method of the present invention includes: step 1, carries out fault location to system protection private network network, determines fault type and alerted according to fault type;Step 2 creates the rerouting mechanism based on business risk and constructs routing optimality mathematical model;Step 3 constructs Route Optimization Model according to the stability contorting business carried on the communication link of the routing optimality mathematical model of the above-mentioned rerouting mechanism building based on business risk and the automatic heavy-route of triggering.The present invention realizes the delay of business average transmission and the weighted sum of the whole network traffic balancing degree is minimum.The present invention is effectively reduced the operation risk of business, avoids traffic lost, further enhances robustness and the flexibility of real-time system protection private network network communicating system.
Description
Technical field
The present invention relates to the communications fields of system protection private network network, and relate more specifically to a kind of for determining system
Protect the method and system of private network business risk modeling.
Background technique
Compared with traditional WDM network, main networking mode one of of the Mesh networking as ASON network has flexibly, easily
The characteristics of extension.Under this networking mode, restoration path can have many items, improve the safety of network, and maximum journey
Whole network resource is utilized on degree.In Mesh networking, to enable interrupting service to reclose, except adopting traditional dedicated guarantor
Shield and shared protection are outer, additionally it is possible to the instant recovery of business is realized by means of rerouting mechanism.
Dynamic heavy-route is one of GMPLS/ASON bring central characteristics, is that one kind takes into account protective capability and the utilization of resources
The protected mode of efficiency, and to the revolutionary supplement of traditional protection mode and improvement.There is it, anti-fine protection of repeatedly breaking/
It reverts in order to possible.
Summary of the invention
It is an object of the invention to can be effectively reduced the operation risk of business, real-time system protection private network is further enhanced
The robustness and stability of network, it is ensured that the reliable and stable operation of communication network and network system proposes a kind of for determining
The method of the business risk of system protection private network network, comprising:
Step 1 carries out fault location to system protection private network network, determines fault type and alerted according to fault type;
Step 2 creates the rerouting mechanism based on business risk and constructs routing optimality mathematical model, specifically:
Wherein,For the average communication duration of business, Ti is the time delay of business i, and L is business number, and BD is traffic balancing
Degree, Li are the business number of i-th chain road carrying, and m is network link number, and Tmax is maximum traffic time delay, and Lmax is chain
The maximum traffic number of road carrying, α and β are two constant coefficients, and constraint portions indicate service delay constraint and link traffic number
Constraint;
Step 3,
According to the routing optimality mathematical model of the above-mentioned rerouting mechanism building based on business risk and the automatic weight road of triggering
By communication link on the stability contorting business that carries, construct Route Optimization Model, it is specific as follows:
It to the stability contorting business initializtion in system protection private network network, constructs network topology G (V, E, W), industry is set
It is engaged in list S (vs, vd);
Wherein V is node set, and E is link set, and W is weight-time delay of each of the links, and vs is business start node,
Vd is business purpose node;
Broken link X is deleted in network topology G, obtains new network topology G ';
K time delay shortest path before finding for every business in collection of services S forms business optional path collection Sk;
Every business is regarded to a gene of chromosome as, chromosome length is business number, and gene coding uses nature
The fitness function of number encoder, chromosome i is
Initial population is randomly generated, selects function for roulette wheel selection, the probability that chromosome i is selected for
Crossover process uses location-based hybridization operation method, and mutation process is to change 1 base in some chromosome at random
The position of cause, based on certain the number of iterations, filters out one from the optional path of business concentration using traditional genetic algorithm
Optimum combination;
Obtained service path combination, average traffic communication delay and traffic balancing degree is exported, according to output judgement business
Path risk, average traffic communication delay is smaller and traffic balancing degree is passed through in 0 business road, and service path value-at-risk is lower.
Optionally, step 1 is specifically to construct network topology G, collection of services S and fault warning set A, when in network with
Chain road Li break down Fi when, business Si generates abnormal in destination node, determines fault type and generates warning information Ai, is formed
The bigraph (bipartite graph) of fault warning set A and suspected malfunctions link set F, pre-process bigraph (bipartite graph), simplify bigraph (bipartite graph), set F
In, remove must not failure set FN, leaving must the set FY of the failure and set FS of suspected malfunctions;Utilize fault location
Algorithm, the final failure element determined in FS, so that it is determined that faulty link set FF in network.
Optionally, rerouting mechanism passes through the LSP of node D and node G to node K, node from first node A configured with one
The interruption of D and node G are fine, heavy-route process are as follows:
After the FIU or OTU of node D detects alarm, master control GMPLS module is reported;
The impacted IN service of node D master control GMPLS module check sends Notify message to first node A;
After the GMPLS module of first node A receives Notify message, an end-to-end restoration path is calculated, then along meter
Good path sends PATH message to the direction end-node K through intermediate node, and on the way, each node establishes reversed interconnection;
After the GMPLS module of end-node K receives PATH message, RESV is sent to the direction first node A via intermediate node and is disappeared
Breath establishes positive interconnection in each node on the way;
After first node A receives the RESV message that end-node is sent, alarm monitoring is opened, node transmission is swum still further below and opens announcement
Alert PATH message.Downstream node receives the alarm monitoring opened after the message to new business path, the alarm prison of whole LSP
After opening, old road diameter is then deleted if it is non-revertive mode business.
The invention also provides a kind of systems for determining the business risk of system protection private network network, comprising:
Fault location and warning unit carry out fault location to system protection private network network, determine fault type and basis
Fault type alarm;
Mathematical model unit is constructed, the rerouting mechanism based on business risk is created and constructs routing optimality mathematical model, tool
Body are as follows:
Wherein,For the average communication duration of business, Ti is the time delay of business i, and L is business number, and BD is traffic balancing
Degree, Li are the business number of i-th chain road carrying, and m is network link number, and Tmax is maximum traffic time delay, and Lmax is chain
The maximum traffic number of road carrying, α and β are two constant coefficients, and constraint portions indicate service delay constraint and link traffic number
Constraint;
Optimized model unit is constructed, according to the routing optimality mathematical modulo of the above-mentioned rerouting mechanism building based on business risk
The stability contorting business carried on the communication link of type and the automatic heavy-route of triggering, constructs Route Optimization Model, specific as follows:
It to the stability contorting business initializtion in system protection private network network, constructs network topology G (V, E, W), industry is set
It is engaged in list S (vs, vd);
Wherein V is node set, and E is link set, and W is weight-time delay of each of the links, and vs is business start node,
Vd is business purpose node;
Broken link X is deleted in network topology G, obtains new network topology G ';
K time delay shortest path before finding for every business in collection of services S forms business optional path collection Sk;
Every business is regarded to a gene of chromosome as, chromosome length is business number, and gene coding uses nature
The fitness function of number encoder, chromosome i is
Initial population is randomly generated, selects function for roulette wheel selection, the probability that chromosome i is selected for
Crossover process uses location-based hybridization operation method, and mutation process is to change 1 base in some chromosome at random
The position of cause, based on certain the number of iterations, filters out one from the optional path of business concentration using traditional genetic algorithm
Optimum combination;
Obtained service path combination, average traffic communication delay and traffic balancing degree is exported, according to output judgement business
Path risk, average traffic communication delay is smaller and traffic balancing degree is passed through in 0 business road, and service path value-at-risk is lower.
Optionally, fault location and warning unit are specifically to construct network topology G, collection of services S and fault warning set
A, when link Li random in network breaks down Fi, business Si generates exception in destination node, determines fault type and generates announcement
Alert information Ai, forms the bigraph (bipartite graph) of fault warning set A and suspected malfunctions link set F, pre-processes to bigraph (bipartite graph), simplifies
Bigraph (bipartite graph), in set F, remove must not failure set FN, leaving must the set FY of the failure and set FS of suspected malfunctions;
Using fault location algorithm, the final failure element determined in FS, so that it is determined that faulty link set FF in network.
Optionally, rerouting mechanism passes through the LSP of node D and node G to node K, node from first node A configured with one
The interruption of D and node G are fine, heavy-route process are as follows:
After the FIU or OTU of node D detects alarm, master control GMPLS module is reported;
The impacted IN service of node D master control GMPLS module check sends Notify message to first node A;
After the GMPLS module of first node A receives Notify message, an end-to-end restoration path is calculated, then along meter
Good path sends PATH message to the direction end-node K through intermediate node, and on the way, each node establishes reversed interconnection;
After the GMPLS module of end-node K receives PATH message, RESV is sent to the direction first node A via intermediate node and is disappeared
Breath establishes positive interconnection in each node on the way;
After first node A receives the RESV message that end-node is sent, alarm monitoring is opened, node transmission is swum still further below and opens announcement
Alert PATH message.Downstream node receives the alarm monitoring opened after the message to new business path, the alarm prison of whole LSP
After opening, old road diameter is then deleted if it is non-revertive mode business.
The present invention has the advantages that
(1) present invention realizes the delay of business average transmission and the weighted sum of the whole network traffic balancing degree is minimum.
(2) present invention is effectively reduced the operation risk of business, avoids traffic lost, further enhances real-time system
Protect robustness and the flexibility of private network network communicating system.
Detailed description of the invention
Fig. 1 is that the present invention is a kind of for determining the method rerouting mechanism process of the business risk of system protection private network network
Figure;
Fig. 2 is that the present invention is a kind of for determining the method fault location and warning of the business risk of system protection private network network
Model structure;
Fig. 3 is that the present invention is a kind of for determining the method bigraph (bipartite graph) schematic diagram of the business risk of system protection private network network;
Fig. 4 is that the present invention is a kind of for determining the method fault location and warning of the business risk of system protection private network network
Flow chart;
Fig. 5 is that a kind of method active blending algorithm for determining the business risk of system protection private network network of the present invention is former
Reason figure;
Fig. 6 is that the present invention is a kind of for determining the method flow diagram of the business risk of system protection private network network;
Fig. 7 is that the present invention is a kind of for determining the system construction drawing of the business risk of system protection private network network.
Specific embodiment
Exemplary embodiments of the present invention are introduced referring now to the drawings, however, the present invention can use many different shapes
Formula is implemented, and is not limited to the embodiment described herein, and to provide these embodiments be at large and fully disclose
The present invention, and the scope of the present invention is sufficiently conveyed to person of ordinary skill in the field.Show for what is be illustrated in the accompanying drawings
Term in example property embodiment is not limitation of the invention.In the accompanying drawings, identical cells/elements use identical attached
Icon note.
Unless otherwise indicated, term (including scientific and technical terminology) used herein has person of ordinary skill in the field
It is common to understand meaning.Further it will be understood that with the term that usually used dictionary limits, should be understood as and its
The context of related fields has consistent meaning, and is not construed as Utopian or too formal meaning.
The present invention provides a kind of method for determining the business risk of system protection private network network, as shown in fig. 6, packet
It includes:
Step 1 carries out fault location to system protection private network network, determines fault type and alerted according to fault type;
As shown in figure 4, fault location detailed process is to construct network topology G as shown in Figure 2, collection of services S, failure
Set A is alerted as input, bigraph (bipartite graph) as shown in Figure 3 is established, finds related to faulty link set F, determine failure
Type is simultaneously alerted according to fault type;Secondly, pre-processed, simplify bigraph (bipartite graph), in set F, removing must not failure collection
FN is closed, leaving must the set FY of the failure and set FS of suspected malfunctions;Using fault location algorithm, the final event determined in FS
Hinder element, so that it is determined that faulty link set FF in network.
If Fig. 2 network topology G has business S0, S1 and S2, when link L (5,10) generate failure, business S0 and S2 are generated
Alert A0 and A2.Then suspected malfunctions link set is { F (7,6), F (6,5), F (2,5), F (5,10), F (10,13) }, and basis
Business S1 is good, exclusion link { F (7,6), F (6,5) }.Bigraph (bipartite graph) as shown above is ultimately formed, if it is single-stranded
Road fault scenes, then faulty link is necessarily (5,10);If it is multilink fault scene, since A2 can only be drawn by F (5,10)
It rises, then inevitable faulty link is (5,10), and suspected malfunctions link is (2,5) and (10,13), then the set of faulty link may be
{ F (2,5), F (5,10) }, { F (10,13), F (5,10) } or { F (2,5), F (5,10), F (10,13) }.
Wherein fault location principle is as shown in Figure 5.Fig. 5 refers to a simple scenario of fault location, first to alarm
Information is pre-processed, and bigraph (bipartite graph) as shown in Figure 5 is obtained, and determines the range of suspected malfunctions link;According to pretreated letter
Breath, the determining routing for needing to send detection business, and detection business is sent, as shown in Figure 5;The alarm generated according to detection business
Information is accurately positioned the position 1 of faulty link.For example, link e12 and link e23 failure in figure, cause business spw1 and
Spw2 is interrupted, and generates bigraph (bipartite graph), and by proving, possible failure path set is { e12, e23 } and { e23 }.Then again in chain
Detection business is sent in road e12 and link e23, determines the combination of final faulty link.Active blending algorithm is only in local transmission
Detection business, business are only 1 jump, and occupancy resource is less, and detection time is shorter.
Step 2 creates the rerouting mechanism based on business risk and constructs routing optimality mathematical model, specifically:
Wherein,For the average communication duration of business, Ti is the time delay of business i, and L is business number, and BD is traffic balancing
Degree, Li are the business number of i-th chain road carrying, and m is network link number, and Tmax is maximum traffic time delay, and Lmax is chain
The maximum traffic number of road carrying, α and β are two constant coefficients, and constraint portions indicate service delay constraint and link traffic number
Constraint;
Wherein, as shown in Figure 1, rerouting mechanism passes through node D and node G to node K from first node A configured with one
LSP, node D and node G interruption it is fine, heavy-route process are as follows:
After the FIU or OTU of node D detects alarm, master control GMPLS module is reported;
The impacted IN service of node D master control GMPLS module check sends Notify message to first node A;
After the GMPLS module of first node A receives Notify message, an end-to-end restoration path is calculated, then along meter
Good path sends PATH message to the direction end-node K through intermediate node, and on the way, each node establishes reversed interconnection;
After the GMPLS module of end-node K receives PATH message, RESV is sent to the direction first node A via intermediate node and is disappeared
Breath establishes positive interconnection in each node on the way;
After first node A receives the RESV message that end-node is sent, alarm monitoring is opened, node transmission is swum still further below and opens announcement
Alert PATH message.Downstream node receives the alarm monitoring opened after the message to new business path, the alarm prison of whole LSP
After opening, old road diameter is then deleted if it is non-revertive mode business.
Step 3,
According to the routing optimality mathematical model of the above-mentioned rerouting mechanism building based on business risk and the automatic weight road of triggering
By communication link on the stability contorting business that carries, construct Route Optimization Model, it is specific as follows:
Initialization constructs network topology G (V, E, W), is arranged service lists S (vs, vd);
Wherein V is node set, and E is link set, and W is weight-time delay of each of the links, and vs is business start node,
Vd is business purpose node;
Broken link X is deleted in network topology G, obtains new network topology G ';
K time delay shortest path before finding for every business in collection of services S forms business optional path collection Sk;
Every business is regarded to a gene of chromosome as, chromosome length is business number, and gene coding uses nature
The fitness function of number encoder, chromosome i is
Initial population is randomly generated, selects function for roulette wheel selection, the probability that chromosome i is selected for
Crossover process uses location-based hybridization operation method, and mutation process is to change 1 base in some chromosome at random
The position of cause, based on certain the number of iterations, filters out one from the optional path of business concentration using traditional genetic algorithm
Optimum combination;
Export obtained service path combination and average traffic communication delay and traffic balancing degree.
The present invention also provides a kind of systems for determining the business risk of system protection private network network, as shown in fig. 7, being
System 200 specifically includes:
Fault location and warning unit 201 carry out fault location to system protection private network network, determine fault type and root
It is alerted according to fault type, specially building network topology G, collection of services S and fault warning set A, when link random in network
Li break down Fi when, business Si generates abnormal in destination node, determines fault type and generates warning information Ai, forms failure and accuse
The bigraph (bipartite graph) of alert set A and suspected malfunctions link set F, pre-process bigraph (bipartite graph), simplified bigraph (bipartite graph), in set F, remove
Go must not failure set FN, leaving must the set FY of the failure and set FS of suspected malfunctions;Using fault location algorithm,
The final failure element determined in FS, so that it is determined that faulty link set FF in network.
Mathematical model unit 202 is constructed, the rerouting mechanism based on business risk is created and constructs routing optimality mathematical model,
Specifically:
Wherein,For the average communication duration of business, Ti is the time delay of business i, and L is business number, and BD is traffic balancing
Degree, Li are the business number of i-th chain road carrying, and m is network link number, and Tmax is maximum traffic time delay, and Lmax is chain
The maximum traffic number of road carrying, α and β are two constant coefficients, and constraint portions indicate service delay constraint and link traffic number
Constraint;
Wherein, rerouting mechanism passes through the LSP, node D of node D and node G to node K configured with one from first node A
Fine, the heavy-route process with the interruption of node G are as follows:
After the FIU or OTU of node D detects alarm, master control GMPLS module is reported;
The impacted IN service of node D master control GMPLS module check sends Notify message to first node A;
After the GMPLS module of first node A receives Notify message, an end-to-end restoration path is calculated, then along meter
Good path sends PATH message to the direction end-node K through intermediate node, and on the way, each node establishes reversed interconnection;
After the GMPLS module of end-node K receives PATH message, RESV is sent to the direction first node A via intermediate node and is disappeared
Breath establishes positive interconnection in each node on the way;
After first node A receives the RESV message that end-node is sent, alarm monitoring is opened, node transmission is swum still further below and opens announcement
Alert PATH message.Downstream node receives the alarm monitoring opened after the message to new business path, the alarm prison of whole LSP
After opening, old road diameter is then deleted if it is non-revertive mode business.
Optimized model unit 203 is constructed, according to the routing optimality number of the above-mentioned rerouting mechanism building based on business risk
The stability contorting business carried on model and the communication link of the automatic heavy-route of triggering is learned, constructs Route Optimization Model, specifically such as
Under:
It to the stability contorting business initializtion in system protection private network network, constructs network topology G (V, E, W), industry is set
It is engaged in list S (vs, vd);
Wherein V is node set, and E is link set, and W is weight-time delay of each of the links, and vs is business start node,
Vd is business purpose node;
Broken link X is deleted in network topology G, obtains new network topology G ';
K time delay shortest path before finding for every business in collection of services S forms business optional path collection Sk;
Every business is regarded to a gene of chromosome as, chromosome length is business number, and gene coding uses nature
The fitness function of number encoder, chromosome i is
Initial population is randomly generated, selects function for roulette wheel selection, the probability that chromosome i is selected for
Crossover process uses location-based hybridization operation method, and mutation process is to change 1 base in some chromosome at random
The position of cause, based on certain the number of iterations, filters out one from the optional path of business concentration using traditional genetic algorithm
Optimum combination;
Obtained service path combination, average traffic communication delay and traffic balancing degree is exported, according to output judgement business
Path risk, average traffic communication delay is smaller and traffic balancing degree is passed through in 0 business road, and service path value-at-risk is lower.
The present invention realizes the delay of business average transmission and the weighted sum of the whole network traffic balancing degree is minimum.
The present invention is effectively reduced the operation risk of business, avoids traffic lost, further enhances real-time system guarantor
Protect robustness and the flexibility of private network network communicating system.
Claims (6)
1. a kind of method for determining the business risk of system protection private network network characterized by comprising
Step 1 carries out fault location to system protection private network network, determines fault type and alerted according to fault type;
Step 2 creates the rerouting mechanism based on business risk and constructs routing optimality mathematical model, specifically:
Wherein,For the average communication duration of business, Ti is the time delay of business i, and L is business number, and BD is traffic balancing degree, Li
For the business number of i-th chain road carrying, m is network link number, and Tmax is maximum traffic time delay, and Lmax is link carrying
Maximum traffic number, α and β are two constant coefficients, and constraint portions indicate service delay constraint and the constraint of link traffic number;
Step 3,
According to the routing optimality mathematical model of the above-mentioned rerouting mechanism building based on business risk and trigger automatic heavy-route
The stability contorting business carried on communication link constructs Route Optimization Model, specific as follows:
It to the stability contorting business initializtion in system protection private network network, constructs network topology G (V, E, W), setting business arranges
Table S (vs, vd);
Wherein V is node set, and E is link set, and W is weight-time delay of each of the links, and vs is business start node, and vd is
Business purpose node;
Broken link X is deleted in network topology G, obtains new network topology G ';
K time delay shortest path before finding for every business in collection of services S forms business optional path collection Sk;
Every business is regarded to a gene of chromosome as, chromosome length is business number, and gene coding is compiled using natural number
Code, the fitness function of chromosome i are as follows:
Initial population is randomly generated, selects function for roulette wheel selection, the probability that chromosome i is selected for
Crossover process uses location-based hybridization operation method, and mutation process is to change 1 gene in some chromosome at random
Position, using traditional genetic algorithm, based on certain the number of iterations, from the optional path of business concentration filter out one it is optimal
Combination;
Obtained service path combination, average traffic communication delay and traffic balancing degree is exported, service path is judged according to output
Risk, average traffic communication delay is smaller and traffic balancing degree is passed through in 0 business road, and service path value-at-risk is lower.
2. according to the method described in claim 1, it is characterized by: the step one is specifically to construct network topology G, business
Set S and fault warning set A, when link Li random in network breaks down Fi, business Si generates exception in destination node, really
Determine fault type and generate warning information Ai, the bigraph (bipartite graph) of fault warning set A and suspected malfunctions link set F is formed, to two
Portion's figure is pre-processed, and bigraph (bipartite graph) is simplified, in set F, removing must not failure set FN, leave must failure set FY
With the set FS of suspected malfunctions;Using fault location algorithm, the final failure element determined in FS, so that it is determined that failure in network
Link set FF.
3. according to the method described in claim 1, it is characterized by: the rerouting mechanism is configured with one from first node A
By the LSP of node D and node G to node K, the interruption of node D and node G are fine, heavy-route process are as follows:
After the FIU or OTU of node D detects alarm, master control GMPLS module is reported;
The impacted IN service of node D master control GMPLS module check sends Notify message to first node A;
After the GMPLS module of first node A receives Notify message, an end-to-end restoration path is calculated, then edge calculates
Path, through intermediate node to the direction end-node K send PATH message, on the way, each node establishes reversed interconnection;
After the GMPLS module of end-node K receives PATH message, RESV message is sent to the direction first node A via intermediate node,
Each node establishes positive interconnection on the way;
After first node A receives the RESV message that end-node is sent, alarm monitoring is opened, node transmission is swum still further below and opens alarm
PATH message.Downstream node receives the alarm monitoring opened after the message to new business path, and the alarm monitoring of whole LSP is beaten
After opening, old road diameter is then deleted if it is non-revertive mode business.
4. a kind of business risk Optimization Modeling system of system protection private network network characterized by comprising
Fault location and warning unit carry out fault location to system protection private network network, determine fault type and according to failure
Type alarm;
Mathematical model unit is constructed, the rerouting mechanism based on business risk is created and constructs routing optimality mathematical model, specifically:
Wherein,For the average communication duration of business, Ti is the time delay of business i, and L is business number, and BD is traffic balancing degree, Li
For the business number of i-th chain road carrying, m is network link number, and Tmax is maximum traffic time delay, and Lmax is link carrying
Maximum traffic number, α and β are two constant coefficients, and constraint portions indicate service delay constraint and the constraint of link traffic number;
Construct Optimized model unit, according to it is above-mentioned based on business risk rerouting mechanism building routing optimality mathematical model and
The stability contorting business carried on the communication link of automatic heavy-route is triggered, Route Optimization Model is constructed, specific as follows:
It to the stability contorting business initializtion in system protection private network network, constructs network topology G (V, E, W), setting business arranges
Table S (vs, vd);
Wherein V is node set, and E is link set, and W is weight-time delay of each of the links, and vs is business start node, and vd is
Business purpose node;
Broken link X is deleted in network topology G, obtains new network topology G ';
K time delay shortest path before finding for every business in collection of services S forms business optional path collection Sk;
Every business is regarded to a gene of chromosome as, chromosome length is business number, and gene coding is compiled using natural number
Code, the fitness function of chromosome i are as follows:
Initial population is randomly generated, selects function for roulette wheel selection, the probability that chromosome i is selected for
Crossover process uses location-based hybridization operation method, and mutation process is to change 1 gene in some chromosome at random
Position, using traditional genetic algorithm, based on certain the number of iterations, from the optional path of business concentration filter out one it is optimal
Combination;
Obtained service path combination, average traffic communication delay and traffic balancing degree is exported, service path is judged according to output
Risk, average traffic communication delay is smaller and traffic balancing degree is passed through in 0 business road, and service path value-at-risk is lower.
5. system according to claim 4, it is characterised in that: the fault location and warning unit is specifically to construct net
Network topology G, collection of services S and fault warning set A, when link Li random in network breaks down Fi, business Si is in Su Jie
Point generates exception, determines fault type and generates warning information Ai, forms fault warning set A and suspected malfunctions link set F
Bigraph (bipartite graph), bigraph (bipartite graph) is pre-processed, bigraph (bipartite graph) is simplified, in set F, removing must not failure set FN, leaving must
Determine the set FY of failure and the set FS of suspected malfunctions;Using fault location algorithm, the final failure element determined in FS, thus
Determine faulty link set FF in network.
6. system according to claim 4, it is characterised in that: the rerouting mechanism is configured with one from first node A
By the LSP of node D and node G to node K, the interruption of node D and node G are fine, heavy-route process are as follows:
After the FIU or OTU of node D detects alarm, master control GMPLS module is reported;
The impacted IN service of node D master control GMPLS module check sends Notify message to first node A;
After the GMPLS module of first node A receives Notify message, an end-to-end restoration path is calculated, then edge calculates
Path, through intermediate node to the direction end-node K send PATH message, on the way, each node establishes reversed interconnection;
After the GMPLS module of end-node K receives PATH message, RESV message is sent to the direction first node A via intermediate node,
Each node establishes positive interconnection on the way;
After first node A receives the RESV message that end-node is sent, alarm monitoring is opened, node transmission is swum still further below and opens alarm
PATH message.Downstream node receives the alarm monitoring opened after the message to new business path, and the alarm monitoring of whole LSP is beaten
After opening, old road diameter is then deleted if it is non-revertive mode business.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810837438.3A CN109242242B (en) | 2018-07-26 | 2018-07-26 | Method and system for determining risk modeling of system protection private network business |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810837438.3A CN109242242B (en) | 2018-07-26 | 2018-07-26 | Method and system for determining risk modeling of system protection private network business |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109242242A true CN109242242A (en) | 2019-01-18 |
CN109242242B CN109242242B (en) | 2022-04-15 |
Family
ID=65072616
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810837438.3A Active CN109242242B (en) | 2018-07-26 | 2018-07-26 | Method and system for determining risk modeling of system protection private network business |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109242242B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110060179A (en) * | 2019-04-24 | 2019-07-26 | 国网山东省电力公司济南供电公司 | Multi-voltage grade Maintenance Schedule Optimization method and device based on risk degree of overlapping |
CN110225540A (en) * | 2019-01-30 | 2019-09-10 | 北京中科晶上科技股份有限公司 | A kind of fault detection method towards centralization access net |
CN111404727A (en) * | 2020-03-02 | 2020-07-10 | 国网浙江省电力有限公司信息通信分公司 | Route analysis method based on standby route potential risk assessment model |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106209621A (en) * | 2016-06-17 | 2016-12-07 | 中国人民解放军空军工程大学 | The link failure recovery method of qos constraint |
US20170085488A1 (en) * | 2015-09-22 | 2017-03-23 | Brocade Communications Systems, Inc. | Intelligent, load adaptive, and self optimizing master node selection in an extended bridge |
CN106656598A (en) * | 2016-12-22 | 2017-05-10 | 云南电网有限责任公司 | Method and system for configuring alternative route of key service of electric power communication network |
US9800474B1 (en) * | 2014-10-21 | 2017-10-24 | Amazon Technologies, Inc. | Inter service network communication optimization |
-
2018
- 2018-07-26 CN CN201810837438.3A patent/CN109242242B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9800474B1 (en) * | 2014-10-21 | 2017-10-24 | Amazon Technologies, Inc. | Inter service network communication optimization |
US20170085488A1 (en) * | 2015-09-22 | 2017-03-23 | Brocade Communications Systems, Inc. | Intelligent, load adaptive, and self optimizing master node selection in an extended bridge |
CN106209621A (en) * | 2016-06-17 | 2016-12-07 | 中国人民解放军空军工程大学 | The link failure recovery method of qos constraint |
CN106656598A (en) * | 2016-12-22 | 2017-05-10 | 云南电网有限责任公司 | Method and system for configuring alternative route of key service of electric power communication network |
Non-Patent Citations (3)
Title |
---|
A.J.GONZALEZ等: "GEARSHIFT: Guaranteeing availability requirements in SLAs using hybrid fault tolerance", 《2015 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM)》 * |
孙严智等: "遗传算法电力通信网关键业务备选路由配置", 《云南电力技术》 * |
许浩伟: "基于业务的光传送网路由优化", 《中国优秀硕士学位论文全文数据库信息科技辑》 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110225540A (en) * | 2019-01-30 | 2019-09-10 | 北京中科晶上科技股份有限公司 | A kind of fault detection method towards centralization access net |
CN110060179A (en) * | 2019-04-24 | 2019-07-26 | 国网山东省电力公司济南供电公司 | Multi-voltage grade Maintenance Schedule Optimization method and device based on risk degree of overlapping |
CN110060179B (en) * | 2019-04-24 | 2023-04-18 | 国网山东省电力公司济南供电公司 | Multi-voltage-level maintenance plan optimization method and device based on risk overlapping degree |
CN111404727A (en) * | 2020-03-02 | 2020-07-10 | 国网浙江省电力有限公司信息通信分公司 | Route analysis method based on standby route potential risk assessment model |
Also Published As
Publication number | Publication date |
---|---|
CN109242242B (en) | 2022-04-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108924673A (en) | A kind of optical channel multipoint fault based on power telecom network carries out the method and system of self-healing | |
CN109242242A (en) | A kind of method and system modeled for determining system protection private network business risk | |
EP1903725B1 (en) | Packet communication method and packet communication device | |
US20030095500A1 (en) | Methods for distributed shared mesh restoration for optical networks | |
Kumar et al. | Notice of Violation of IEEE Publication Principles: Restoration of the network for next generation (5G) optical communication network | |
EP2169876A1 (en) | Method for restoring connections in a network | |
Agraz et al. | Experimental demonstration of centralized and distributed impairment-aware control plane schemes for dynamic transparent optical networks | |
CN104521192A (en) | Techniques for flooding optimization for link state protocols in a network topology | |
EP1993223A1 (en) | Method and device of group broadcast protection in wdm optical network | |
US7423995B1 (en) | Criteria for tearing down network links | |
CN103001879A (en) | Method and equipment for reducing of link state advertisement flooding frequency | |
WO2015070435A1 (en) | Service deployment method, apparatus and network device | |
CN101800913B (en) | Realization method for protecting and restoring multiplex section of automatically switched optical network | |
EP2312792A1 (en) | Protection protocol device for network node and method for processing protection switching thereof | |
JP5056097B2 (en) | Main transmission apparatus and method having in-device alarm suppression function | |
WO2012088978A1 (en) | Method for establishing path in wavelength division network, communication node and communication system | |
CN107733681A (en) | A kind of scheduling scheme collocation method and device | |
CN101248630A (en) | Method for implementing automatic exchange optical network fast heavy route | |
Shen et al. | Performance of protected working capacity envelopes based on p-cycles: Fast, simple, and scalable dynamic service provisioning of survivable services | |
CN1845516A (en) | Optical burst switched network performance and fault monitoring method | |
Ben‐Ameur | Multi‐hour design of survivable classical IP networks | |
CN103051374B (en) | Protect restoration methods and device | |
Wang et al. | Research on the virtual topology design methods in grid-computing-supporting IP/DWDM-based NGI | |
Sohn et al. | A spare bandwidth sharing scheme based on network reliability | |
Ušćumlić et al. | The cost of traffic protection in bidirectional optical packet switching rings |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |