Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network protective method based on multiple volume preset protective ring

A network protection and protection circle technology, applied in the direction of data exchange network, digital transmission system, electrical components, etc., can solve the problem of resource redundancy and achieve the effect of improving the utilization rate of network resources

Inactive Publication Date: 2005-03-02
SHANGHAI JIAO TONG UNIV
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These three preset protection circles are collectively referred to as traditional preset protection circles. They have one thing in common, that is, the same backup resources must be configured on each circle link of each preset protection circle. This limitation brings certain resource redundancy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network protective method based on multiple volume preset protective ring
  • Network protective method based on multiple volume preset protective ring
  • Network protective method based on multiple volume preset protective ring

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0038] Below, a six-node ring network is used as an example to compare the difference between the preset protection circle of the present invention and the traditional preset protection circle, as figure 1 shown. figure 1 Middle 1 is the circle link of the preset protection circle; figure 1 Middle 2 is work business. Suppose there are two services in the ring network, one is B-A-F-E-D and the other is B-C-D-E, and the bandwidth of both services is 10.

[0039] The preset protection circle in the traditional preset protection circle method is A-B-C-D-E-F-A. The backup resources of all links on the preset protection circle are the same, 20.

[0040] exist figure 1 In , if the recovery path adopts B-C-D when the service flow B-A-F-E-D fails, it means that the link k (ie B-C or C-D) in circle j is used to protect the failed link i (ie B-A, or A-F, or F-E, or E-D), that is, when k is B-C or C-D, δ i,j,k r is 1, and is 0 when k is other sides. Similarly, if the service flow ...

example 2

[0042] Assume that the backup resource capacity of each circle link in the preset protection circle has been obtained by the linear programming method, such as figure 2 shown. figure 2 3 in is the preset protection path in the preset protection circle. exist figure 2In , circle link D-E is a virtual link, while circle link A-B is a link with the minimum capacity. In order to ensure the preset characteristics of the preset protection circle, the backup resource capacity on the circle link needs to be adjusted using a correction algorithm. That is, all circle links between the preset protection circle segments A-F-E are configured with a backup resource capacity of 2 units, and all circle links between the preset protection circle segments B-C-D are configured with a backup resource capacity of 3 units. The backup resource configuration of the finally obtained multi-capacity preset protection ring is as follows: image 3 As shown, compared with the traditional network pro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for providing protection to network with preset protect loops based on multiple volumes is to first of all adopt a linear mapping model to minimum the general volume or total cost of the network backup resource in terms of 100% recovery of the network to optimize the network resource configuration, then to adopt a modified algorithm to adjust the backup resource of each loop link to protect the preset property of loop, among which, the said preset protection loop based on multiple volumes means the preset protection rate of two or over backup resources are permitted on each loop link.

Description

technical field [0001] The invention relates to a network protection method, in particular to a network protection method based on multi-capacity preset protection circles. Used in the field of network communication technology. Background technique [0002] With the continuous development of Internet and network technology, higher and higher requirements are put forward for the survivability and reconfigurability of the network. Many protection and recovery strategies have been proposed based on the ring topology and mesh topology of the network. Fast protection recovery (about 50ms) can be achieved in a ring network (such as BLSR), but at least 100% of backup resources need to be reserved. In a mesh network, using the shared path protection method can achieve high resource utilization (for example, less than 70%), but complex signaling is required for fault recovery, and when a fault occurs, the switches of the intermediate nodes Real-time configuration is required, so p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/24
Inventor 祝国龙曾庆济许田叶通杨俊杰
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products