Preset network protection method capable of sharing bandwidth

A technology for network protection and bandwidth sharing, applied in data exchange networks, digital transmission systems, electrical components, etc., can solve problems such as complex signaling and inability to achieve protection and recovery, and achieve the effect of simplifying network operations

Inactive Publication Date: 2007-02-28
SHANGHAI JIAO TONG UNIV
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the shared path protection method requires complex signaling during fault recovery, and when a fault occurs, the switche

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Preset network protection method capable of sharing bandwidth
  • Preset network protection method capable of sharing bandwidth

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] In order to better understand the technical solutions of the present invention, the implementation manners will be described in detail below in conjunction with the accompanying drawings and examples.

[0020] Fig. 1 is an example of the network topology adopted by the present invention, and there are 25 nodes in Fig. 1, numbered from 0 to 24. Assume that all network nodes have wavelength conversion capability, and each link has a pair of unidirectional optical fibers with opposite directions, and each optical fiber has 16 wavelengths. Each wavelength request in the network arrives at the network according to an independent Poisson distribution, and the average arrival rate is λ. The hold time of each connection follows a negative exponential distribution, and the average hold time of a connection is 1 / μ=1 unit time. Without loss of generality, it is assumed that all time units are "seconds", that is, 1 / μ=1s. The load of the network can be expressed by ρ=λ / μ, because 1...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a preformed network protective method which can share bandwidth. Wherein, it comprises: first using traditional shortest path algorism to build one working path to each new service; then projecting present all preformed protective paths to the logic chain between source-host nodes; then based on the jump number of each protective path, the preformed bandwidth, and the bandwidth of new service request, fixing the cost of each logic chain, then using traditional shortest path algorism to build one shortest protective path for new service. When the network is accident, the fail service can be switched to preformed protective path, to quickly protect and return. The invention has the return-protect speed as 1+1 special protective method, while its network resource utilization rate reaches share path protective method.

Description

technical field [0001] The invention relates to a network protection method, in particular to a preset network protection method capable of sharing bandwidth. Used in the field of network communication technology. Background technique [0002] With the continuous development of the Internet and network technology, higher and higher requirements are put forward for the survivability of the network, the utilization rate of resources, and the scalability of the network. Many protection and recovery strategies have been proposed based on the ring topology and mesh topology of the network. Fast protection recovery (about 50ms) can be achieved in a ring network (such as BLSR), but at least 100% of backup resources need to be reserved. In a mesh network, using the 1+1 dedicated protection method can achieve a fast protection recovery of less than 50ms, but the reserved backup resources are at least more than 100%. [0003] After searching the literature of the prior art, it was ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/24H04B1/74H04L1/22
Inventor 许田曹庄琪沈启舜祝国龙朱琨
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products