Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A cluster-based traffic grooming and differentiation importance protection method

A technology of importance and business volume, which is applied in the field of cluster-based traffic grooming and differentiation of importance protection. It can solve problems such as excessive consumption of protection resources, failure of shared protection to achieve complete protection, and failure to consider different quantities. Achieve the effect of improving network resource utilization, reducing protection resource overhead, and fast and effective dredging

Active Publication Date: 2017-05-31
CHONGQING UNIV OF POSTS & TELECOMM
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In "Probabilistic Differentiated Availability Services inWDMNetworks Protected by Shared Protection Schemes", Alshaer H et al., aimed at diverting IP services, differentiated the needs of high-level and low-level services and selected shared protection channels with different reliability, which can reduce the network congestion rate, but it does not Considering that the number of services at each level in each wavelength is different after grooming, simply protecting services at all levels may consume too much protection resources, and shared protection cannot achieve the effect of complete protection
In short, the traditional ILP grooming model takes too long, group grooming is only for static services, and the efficiency of global pathfinding is still not high with the help of auxiliary graph grooming, and the existing grooming protection generally only differentiates and protects services at all levels. Conservation resources may be too expensive

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A cluster-based traffic grooming and differentiation importance protection method
  • A cluster-based traffic grooming and differentiation importance protection method
  • A cluster-based traffic grooming and differentiation importance protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings.

[0029] figure 1It is a flow chart of traffic grooming based on clustering and differentiated importance level protection. As shown in the figure, a business grooming module and a differentiated protection module are adopted in this method. Among them, in the business grooming module, the intra-cluster business is directly guided by the hierarchical auxiliary graph, and the inter-cluster business first uses the virtual cluster convergence layer to find the shortest path between clusters, and then maps it to the hierarchical auxiliary graph for grooming. The distinguishing protection module first perceives the proportion of each priority service in the wavelength link, evaluates its importance level, and then uses the P circle to perform single and double link fault protection respectively, and the wavelength link protected by the single link...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a traffic grooming and distinction importance protection method based on clustering, and belongs to the technical field of communication networks. The method includes the following steps that a network is divided into clusters, and services in the clusters are directly groomed through a layered auxiliary picture; the shortest paths between the clusters are looked for by means of a cluster convergence layer for the services between the clusters and then are mapped onto the layered auxiliary picture for grooming; according to the situation of multiple priority services in an independent wavelength after grooming, importance of wavelength links is distinguished; by means of an intelligent telescopic P ring, grading protection is effectively carried out. By means of the method, dynamic services are quickly and efficiently groomed, and the utilization rate of network resources is greatly improved; meanwhile, different service quality guarantees are achieved through distinction of the importance of the link wavelengths, the situation that resources are seriously wasted due to the fact that the services are protected one by one in a traditional method is avoided by means of P-Cycle comprehensive protection, arriving and leaving of the services can be perceived, the P ring is dynamically extended and retracted, current network intelligent requirements are met, protection resource cost is greatly reduced, and the network capacity of bearing the services is improved.

Description

technical field [0001] The invention belongs to the technical field of communication networks, and relates to a clustering-based service flow grooming and importance degree protection method in a WDM network. Background technique [0002] At present, the data rate of WDM network services generally ranges from 155Mbps (OC-3) to 622Mbps (OC-12), but the wavelength rate is dozens or even hundreds of times of that. In traditional routing, one low-speed service occupies one wavelength exclusively, which wastes a lot of bandwidth resources. In order to effectively utilize resources, traffic grooming technology emerges as the times require. After grooming, each wavelength carries a larger amount of business data. Once a fault occurs, the loss will be serious, and it must be properly protected. Since the number of services with different priorities in the converged flow after grooming is different, protection should be differentiated. Strength can be more reasonable and effective....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24H04J14/02
Inventor 熊余赵莹姚浩王汝言
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products