CN116346701A - Power communication network key link identification method - Google Patents
Power communication network key link identification method Download PDFInfo
- Publication number
- CN116346701A CN116346701A CN202310329039.7A CN202310329039A CN116346701A CN 116346701 A CN116346701 A CN 116346701A CN 202310329039 A CN202310329039 A CN 202310329039A CN 116346701 A CN116346701 A CN 116346701A
- Authority
- CN
- China
- Prior art keywords
- service
- traffic
- link
- edge
- importance
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 109
- 238000004891 communication Methods 0.000 title claims abstract description 101
- 230000005540 biological transmission Effects 0.000 claims abstract description 23
- 230000008569 process Effects 0.000 claims description 36
- 230000003287 optical effect Effects 0.000 claims description 25
- 238000004364 calculation method Methods 0.000 claims description 4
- 230000008439 repair process Effects 0.000 claims description 3
- 238000012545 processing Methods 0.000 claims description 2
- 230000001105 regulatory effect Effects 0.000 claims description 2
- 230000007423 decrease Effects 0.000 abstract 1
- 238000004422 calculation algorithm Methods 0.000 description 12
- 238000010586 diagram Methods 0.000 description 6
- 102100020786 Adenylosuccinate synthetase isozyme 2 Human genes 0.000 description 3
- 239000003086 colorant Substances 0.000 description 3
- 238000011156 evaluation Methods 0.000 description 3
- 230000008859 change Effects 0.000 description 2
- 238000005065 mining Methods 0.000 description 2
- 238000011160 research Methods 0.000 description 2
- 206010063385 Intellectualisation Diseases 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000002457 bidirectional effect Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000002474 experimental method Methods 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000035945 sensitivity Effects 0.000 description 1
- 238000004088 simulation Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/22—Alternate routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention relates to a key link identification method of a power communication network, which relates to the technical field of power communication and aims to solve the problem of inaccurate identification results caused by less consideration of standby routes in the existing identification of key links of a power communication gateway. Finally, a set of critical links in the power communication network is mined. The method calculates the reliability of the service layer and the reliability of the transmission layer by considering the condition of the main and standby route paths of the service and fusing a circuit model formula, and identifies the key link according to the reliability of the service layer and the degree of decline of the reliability of the transmission layer.
Description
Technical Field
The invention relates to the technical field of power communication, in particular to a power communication gateway key link identification method.
Background
The power communication network is an indispensable important component of the power system and is an important support for power dispatching automation, power grid operation marketization, power grid management informatization and operation, maintenance and management intellectualization. The power communication network provides multidimensional service in the aspects of operation, management, construction, marketization and other business aspects of a power system. With the current increase of the scale of the power communication network, the number of service types of the power system is increased, and data processing is more complex. At present, the purpose of building the power communication network is not only to meet the real-time and reliable upgrading and optimizing of the service transmission, but also to meet the current and future service demands, and the reliability improvement of the overall anti-fault and anti-risk capacity of the network is considered.
Current research mainly identifies key links to optical cable links by multi-dimensional factors such as network topology, traffic, failure impact, etc. On one hand, key links are identified in a comprehensive weight calculation mode by adopting different angles; on the other hand, the weight of each index is determined by adopting a more reasonable weight calculation method, so that the recognition accuracy is improved.
Considering the influence of factors such as network topology, load service and the like of each optical cable link in an electric power communication network, the prior research proposes a comprehensive evaluation mode based on subjective, objective, and combination of subjective and objective. These methods are based on some main index of the link, and the consideration is still not comprehensive. In some evaluation methods, indexes for reducing the overall performance of the network after the link failure, such as network connectivity, are added in a multidimensional index system, but in order to fully consider business factors, after the entity failure is caused, the numerical value of the index of the network topology class is reduced more rapidly, and the effect in the business aspect is unsatisfactory. The power communication network is an important carrier for carrying power business, and can also highlight the network topology property of the power communication network. However, in the process of considering the power service, a standby route factor of the service is often not considered, so in the process of identifying the key link, the standby route of the service carried by the link needs to be fully considered, so that the identification accuracy is improved.
Disclosure of Invention
The invention provides a key link identification method of an electric power communication network, which aims to solve the problem that the existing key link identification method of the electric power communication network is inaccurate in identification result due to less consideration of standby routes.
A key link identification method of an electric power communication network is realized by the following steps:
step one, constructing a power communication network model T= (G, B) according to a power communication network topological structure G= { V, E, D, W } and a power communication network service set B;
node sequence number set v= { V i I=1, 2, …, N }, where V i N is the total number of nodes for communication stations in the network;
edge set e= { E ij },e ij For station V i To site V j E when there is no cable connection between the stations ij Take the value of 0, otherwise e ij Take the value of 1, e ij =e ji ;
Optical cable length set d= { D ij When e ij When=1, d ij The value is the actual optical cable length between the station i and the station j, otherwise d ij The value is 0;
optical cable bandwidth capacity set w= { W ij When e ij When=1, w ij Take the value as site V i To site V j Actual cable bandwidth capacity between, otherwise w ij The value is 0;
service set b= { B of power communication network k I k=1, 2, …, K }, where b k =(U k ,S k ,T k ,I k ,L k ) K is the total number of services; u (U) k Is the kth power service; s is S k Is the kth power service source node, S k ∈V;U k For the kth power service sink node, T k ∈V;I k The service importance of the kth power service; l (L) k Is the fundamental bandwidth of the kth power service.
Step two, defining an edge e in the topological structure G of the power communication network ij Link failure of R (e) ij );
Setting p (e) ij ) For edge e ij Per unit length link availability and edge e ij An exponential representation of the actual length, and comprehensively measuring each edge e ij Link availability of (2), respectivelyRepresented by the formula;
wherein A is a side e ij Per unit length of link availability, d ij The actual optical cable length from station i to station j;
wherein MTTF is edge e ij The average on time before link failure of MTTR is edge e ij Link failure average repair time of (a);
setting lambda (e) ij ) For edge e ij The ratio of the occupied bandwidth value to the total bandwidth capacity value of the system is measured comprehensively ij Is expressed as:
in the method, in the process of the invention,for edge e ij Occupied bandwidth, w ij Take the value as site V i To site V j Actual cable bandwidth capacity between;
according to p (e ij ) And lambda (e) ij ) To obtain the link reliability P (e ij ) The method comprises the following steps:
according to P (e ij ) Obtain edge e ij Link failure E (E) ij ) The method comprises the following steps:
R(e ij )=1-P(e ij )
step three, defining service layer reliability TBA (G) of a power communication network topological structure G;
setting the x b Service availability of individual unconfigured protection path servicesX is the ratio of the importance of the traffic to the failure of the traffic flowing through the main routing path b =1,2,…,X b ,X b The total number of traffic for which protection is not configured is expressed by the following formula:
in the method, in the process of the invention,is the x th b Service importance of individual unconfigured protection path services, < >>Is the x th b Main routing path of individual traffic, +.>Is the x th b Source site of individual services->Is the x th b Sink site for personal traffic->R(e ij ) The sum of the link invalidity of all links in the main routing path;
setting service availabilityIs the y b The ratio of the service importance of each configuration route 1:1 protection path service to the service invalidity of the parallel circuit formed by the service flowing through the main and standby route paths, y b =1,2,…,Y b ,Y b To configure the total number of route 1:1 protection path traffic, the following formulas are used to represent:
in the method, in the process of the invention,is the y b The service importance of the individual configuration route 1:1 protection path service, +.>Is the y b Service invalidity of individual services;
in the method, in the process of the invention,is the y b Main routing path of individual traffic, +.>Is the y b Alternate routing path for individual traffic, +.>Is the y b Source site of individual services->Is the y b Sink sites for individual traffic;
setting service availabilityIs z < th b The ratio of the service importance of each configuration segment 1:1 protection path service to the service invalidity of the service flowing through the main and standby routing path forming circuit, z b =1,2,…,Z b ,Z b To configure the total number of segment 1:1 protection path traffic, it is expressed as:
in the method, in the process of the invention,is z < th b The service importance of the individual configuration segment 1:1 protection path service,/for>Is z < th b Service invalidity of individual services;
setting upSum of the link failures protected in the primary route +.>Sum of unprotected link failure +.>The sum of (2) is expressed by the following formula:
in which the sum of the link failures protected in the primary routeExpressed by the following formula:
in the method, in the process of the invention,for unprotected links in the segment 1:1 protection path, denoted as z-th by the following equation b Main routing Path of personal traffic->And alternate route path->Is used for the intersection operation of (a),is z < th b Source site of individual services->Is z < th b Sink site for individual traffic:
in which the sum of unprotected link failures in the primary routeExpressed by the following formula:
according toAnd->The service layer reliability TBA (G) of the power communication network topology structure G is obtained by the following formula:
defining the reliability TTA (G) of a transmission layer of the topological structure G of the power communication network;
setting the x t Bandwidth availability for individual unconfigured protection path trafficX is the ratio of the traffic bandwidth value of the traffic to the traffic invalidity of the traffic flowing through the main routing path t =1,2,…,X t ,X t The total number of the non-configured protection path services is expressed as follows:
in the method, in the process of the invention,is the x th t Bandwidth value of individual unconfigured protection path traffic, < >>Is the x in the third step t The sum of the link invalidity of all links in the main routing path of each service;
setting service availabilityIs the y t The ratio of the service importance of each configuration route 1:1 protection path service to the service invalidity of the parallel circuit formed by the service flowing through the main and standby route paths, y t =1,2,…,Y t ,Y t To configure the total number of route 1:1 protection path traffic, the following formulas are used to represent:
in the method, in the process of the invention,is the y t Bandwidth value of individual configuration route 1:1 protection path traffic,/for the protection path traffic>Is the y t Service invalidity of individual services;
setting service availabilityIs z < th t Ratio of bandwidth value of each configuration segment 1:1 protection path service to service invalidity of the service flowing through the main and standby routing path forming circuit, z t =1,2,…,Z t ,Z t To configure the total number of segment 1:1 protection path traffic, it is expressed as:
in the method, in the process of the invention,is z < th t Bandwidth value of individual configuration segment 1:1 protection path traffic,/->Is z < th t Service invalidity of individual services;
setting upSum of the link failures protected in the primary route +.>Sum of unprotected link failure +.>The sum of (2) is expressed by the following formula:
in which the sum of the link failures protected in the primary routeExpressed by the following formula:
in the method, in the process of the invention,for unprotected links in the segment 1:1 protection path, denoted as z-th by the following equation t Main routing Path of personal traffic->And alternate route path->Intersection operation of->Is z < th t Source site of individual services->Is z < th t Sink site for individual traffic:
in which the sum of unprotected link failures in the primary routeExpressed by the following formula:
according toAnd->The transmission layer reliability TTA (G) of the power communication network topology G is obtained as follows:
step five, defining an edge e in the topological structure G of the power communication network ij Link importance LI (e) ij );
Step six, for each edge e obtained in the step five ij Link importance LI (e) ij ) And the values are arranged from large to small, so that the electric power communication gateway key link is obtained.
The invention has the beneficial effects that: the method of the invention is a key link identification method based on the main and standby routes, and identifies key links in the municipal power communication network. The method of the invention solves the problem that when links are identified according to the main routing path, some links bear less service quantity, but are positioned at key positions of service transmission in a network, so that an identification result is inaccurate. According to experimental analysis, the failure rate of the service importance is increased by 55.96%, 25.88% and 184.53% respectively by destroying the identified key links. The bandwidth failure rate is respectively improved by 60.03%, 26.04% and 222.31%.
Drawings
Fig. 1 is a flowchart of a method for identifying a key link of a power communication network according to the present invention.
Fig. 2 is an inner mongolian eastern city level power communication network model.
Fig. 3 is a schematic diagram showing a situation that a service importance loss rate LSI changes with an adjustment factor α in the method for identifying a key link of an electric power communication gateway according to the present invention.
Fig. 4 is a schematic diagram illustrating a situation that a bandwidth loss rate LTF varies with an adjustment factor α in a method for identifying a key link of an electric power communication network according to the present invention.
Fig. 5 is a schematic diagram showing a change of the service importance loss rate LSI of the electric power communication network in the eastern part of inner mongolia with the removal of the critical link.
Fig. 6 is a schematic diagram illustrating a change of the bandwidth loss rate LTF of a certain municipal power communication network in the eastern part of inner mongolia with the removal of a critical link.
Fig. 7 is a schematic diagram of a power communication network model of a certain city level in Jiangsu province.
Detailed Description
The first embodiment describes the present embodiment with reference to fig. 1 and 2, and a method for identifying a key link of an electric power communication network is implemented by the following steps:
1. constructing a power communication network model according to a physical topological structure of the power communication network;
constructing a power communication network model T= (G, B) according to the power communication network topological structure G and the power communication network service set B; the method is based on the calculation of an electric power communication network of a certain city in the eastern part of the inner Mongolia autonomous region, namely: constructing a power communication network model according to the physical topological structure and the service condition of a power communication network in a certain city of the eastern part of inner Mongolia;
because the existing power communication network is huge in scale, and the power communication network serves as a bearing network for different power services. In order to manage the power communication network and different power services, the corresponding power communication network model is analyzed and built, and the following assumptions are made in this embodiment:
(1) Each communication station is considered a node in the communication network. The system comprises a 500kV transformer substation, a 220kV transformer substation, a 110kV transformer substation, a wind power plant, a thermal power plant and a traction station, wherein the abstraction is a standard node, the lightest site in FIG. 2 is the 500kV transformer substation, the 220kV transformer substation is the next time, and other transformer substations including the 110kV transformer substation are other transformer substations;
(2) The fiber optic cable links between the various communication sites are abstracted to one side of the communication network. The edges are nondirectional in a topological model of the communication network, the factors of the length and the core number of each link are considered, the voltage level of each link is ignored, the bidirectional transmission of information is supported, the information of the links in fig. 2 is shown in a table 1, the types, the core numbers and the actual lengths of the optical cables are marked in the table 1, wherein O represents that the links are OPGW optical cables, the availability of the links in unit length is 99.84%, A represents that the links are ADSS optical cables, and the availability of the links in unit length is 99.5%;
TABLE 1
(3) Combining a plurality of edges with the same communication sites at two ends together, namely eliminating the factors of heavy edges and self-looping edges;
(4) The power communication network carries different kinds of power services, and the different power services are distinguished according to the name, base bandwidth, time delay, bit error rate and importance of each power service as shown in table 2.
TABLE 2
Thus, one power communication network model T can be constructed as follows.
T=(G,B)
The topology of the power communication network g= { V, E, D, W }; node sequence number set V={V i I=1, 2, …, N being the total number of nodes; edge set e= { E ij },e ij For station V i To site V j Edge e of (2) ij =e ji The method comprises the steps of carrying out a first treatment on the surface of the Optical cable length set d= { D ij },d ij For station V i To site V j Actual cable length between, otherwise d ij The value is 0; optical cable bandwidth capacity set w= { W ij },w ij Take the value as site V i To site V j Actual cable bandwidth capacity between, otherwise w ij The value is 0;
service set b= { B of power communication network k I k=1, 2, …, K }, where b k =(U k ,S k ,T k ,I k ,L k ) K is the total number of services; u (U) k Is the service name; s is S k S is a service source node k ∈V;;T k As a service sink node, T k ∈V;I k The business importance value is the business importance value; l (L) k Is the basic bandwidth value of the service.
2. Measure edge e in G ij Link failure of R (e) ij );
According to the power communication network model T= (G, B) constructed in the step one, and according to the service set B= { B k The main and standby route paths of each service of the I k=1, 2, …, K are endowed in the topological structure G of the power communication network, and each edge e is measured according to the condition of the main route paths ij Bandwidth occupancy lambda (e ij ). And according to each edge e ij Link availability a per unit length, actual length d ij And bandwidth occupancy lambda (e ij ) Obtaining the link failure R (e ij ) The global failure level of each edge is measured. The specific process is as follows:
setting p (e) ij ) For edge e ij Is based on the unit length link availability of (2), edge e ij Calculating each edge e in an exponential function form with the actual length being an index ij Is expressed by the following formula;
wherein A is a side e ij Per unit length of link availability, d ij For station V i To site V j Actual cable length between;
wherein MTTF is edge e ij The average on time before link failure of MTTR is edge e ij Link failure average repair time of (a);
setting lambda (e) ij ) For edge e ij The ratio of the occupied bandwidth value to the total bandwidth capacity value of the frame and according to each edge e ij Is expressed as:
in the method, in the process of the invention,for edge e ij Occupied bandwidth, w ij Take the value as site V i To site V j Actual cable bandwidth capacity between;
according to p (e ij ) And lambda (e) ij ) To obtain the link reliability P (e ij ) The method comprises the following steps:
according to P (e ij ) Obtain edge e ij Link failure of R (e) ij ) The method comprises the following steps:
R(e ij )=1-P(e ij )。
3. calculating the service layer reliability TBA (G) of G;
according to each service B in service set B k The main and standby routing cases of (a) are divided into three typesThe case is:
(1) If the x is b The individual service does not configure a protection path, and the service availability of the service is calculated
Setting the x b Service availability of individual unconfigured protection path servicesX is the ratio of the importance of the traffic to the failure of the traffic flowing through the main routing path b =1,2,…,X b ,X b The total number of traffic for which protection is not configured is expressed by the following formula:
in the method, in the process of the invention,is the x th b Service importance of individual unconfigured protection path services, < >>Is the x th b Main routing path of individual traffic, +.>Is the x th b Source site of individual services->Is the x th b The sink site of the individual traffic is provided,is the sum of the link failures of all links in the primary routing path.
(2) If the y is b The individual services configure a route 1:1 protection path, and the service availability of the service is calculated
Setting service availabilityIs the y b The ratio of the service importance of each configuration route 1:1 protection path service to the service invalidity of the parallel circuit formed by the service flowing through the main and standby route paths, y b =1,2,…,Y b ,Y b To configure the total number of route 1:1 protection path traffic, the following formulas are used to represent:
in the method, in the process of the invention,is the y b The service importance of the individual configuration route 1:1 protection path service, +.>Is the y b Service invalidity of individual services;
in the method, in the process of the invention,is the y b Main routing path of individual traffic, +.>Is the y b Alternate routing path for individual traffic, +.>Is the y b Source site of individual services->Is the y b A sink site for each service.
(3) If z < th) b The individual service configuration segments 1:1 protection paths, and the service availability of the service is calculated
Setting service availabilityIs z < th b The ratio of the service importance of each configuration segment 1:1 protection path service to the service invalidity of the service flowing through the main and standby routing path forming circuit, z b =1,2,…,Z b ,Z b To configure the total number of segment 1:1 protection path traffic, it is expressed as:
in the method, in the process of the invention,is z < th b The service importance of the individual configuration segment 1:1 protection path service,/for>Is z < th b Service invalidity of individual services;
setting upSum of the link failures protected in the primary route +.>Sum of unprotected link failure +.>The sum of (2) is expressed by the following formula:
in which the sum of the link failures protected in the primary routeExpressed by the following formula:
in the method, in the process of the invention,for unprotected links in the segment 1:1 protection path, denoted as z-th by the following equation b Main routing Path of personal traffic->And alternate route path->Is used for the intersection operation of (a),is z < th b Source site of individual services->Is z < th b Sink site for individual traffic:
in which the sum of unprotected link failures in the primary routeExpressed by the following formula:
according toAnd->The service layer reliability TBA (G) of the power communication network topology structure G is obtained by the following formula:
4. calculating the transmission layer reliability TTA (G) of G;
according to each service B in service set B k The main and standby routing cases of (a) are divided into three cases:
(1) If the x is t The individual service does not configure a protection path, and the bandwidth availability of the service is calculated
Setting the x t Bandwidth availability for individual unconfigured protection path trafficX is the ratio of the traffic bandwidth value of the traffic to the traffic invalidity of the traffic flowing through the main routing path t =1,2,…,X t ,X t The total number of the non-configured protection path services is expressed as follows:
in the method, in the process of the invention,is the x th t Bandwidth value of individual unconfigured protection path traffic, < >>Is the x in the third step t The sum of the link failures of all links in the primary routing path of the individual traffic.
(2) If the y is t The individual services configure a route 1:1 protection path, and the bandwidth availability of the service is calculated
Setting service availabilityIs the y t The ratio of the service importance of each configuration route 1:1 protection path service to the service invalidity of the parallel circuit formed by the service flowing through the main and standby route paths, y t =1,2,…,Y t ,Y t To configure the total number of route 1:1 protection path traffic, the following formulas are used to represent:
in the method, in the process of the invention,is the y t Bandwidth value of individual configuration route 1:1 protection path traffic,/for the protection path traffic>Is the y t Service invalidity of individual services.
(3) If z < th) t The service configuration segments 1:1 protection path, and the service availability BAPBS of the service is calculated z And bandwidth availability
Setting service availabilityIs z < th t Ratio of bandwidth value of each configuration segment 1:1 protection path service to service invalidity of the service flowing through the main and standby routing path forming circuit, z t =1,2,…,Z t ,Z t To configure the total number of segment 1:1 protection path traffic, it is expressed as:
in the method, in the process of the invention,is z < th t Bandwidth value of individual configuration segment 1:1 protection path traffic,/->Is z < th t Service invalidity of individual services;
setting upSum of the link failures protected in the primary route +.>Sum of unprotected link failure +.>The sum of (2) is expressed by the following formula:
in which the sum of the link failures protected in the primary routeExpressed by the following formula:
in the method, in the process of the invention,for unprotected links in the segment 1:1 protection path, denoted as z-th by the following equation t Main routing Path of personal traffic->And alternate route path->Intersection operation of->Is z < th t Source site of individual services->Is z < th t Sink site for individual traffic:
in which the sum of unprotected link failures in the primary routeExpressed by the following formula:
according toAnd->The transmission layer reliability TTA (G) of the power communication network topology G is obtained as follows:
5. sequentially attack edge e ij Obtain attack e ij Post service layer reliability TBA (G-e) ij ) And transport layer reliability TTA (G-e) ij ) The method comprises the steps of carrying out a first treatment on the surface of the The method comprises the following steps:
51. attack edge e ij All passing edges e in the previous active/standby routing paths ij Is adjusted again;
52. according to the second step, obtaining the edge e ij Link failure of the outer remaining edges;
53. according to the third step, the service layer reliability TBA (G-e ij ) And transport layer reliability TTA (G-e) ij );
54. Recording service layer reliability value TBA (G-e) ij ) And a transport layer reliability value TTA (G-e ij ) If all sides are attacked, proceeding to step five to continue the step.
6. Obtaining edge e ij Is (e) ij ) And the transmission layer link importance Δtta (e ij ) Expressed by the following formula:
ΔTBA(e ij )=TBA(G)-TBA(G-e ij )
ΔTTA(e ij )=TTA(G)-TTA(G-e ij )
7. according to the result obtained in the step six, comprehensively measuring each edge e ij Link importance LI (e) ij ) Numerical values, expressed by the following formula:
wherein alpha is a regulating factor, alpha is [0,1 ]];And->Respectively edge e ij Normalized values of importance in the service layer and importance in the transport layer are expressed as follows;
wherein ΔTBA (e) ij ) min For the minimum importance of the business layer in all edges of edge set E, ΔTBA (E ij ) max The service layer importance degree maximum value in all edges of the edge set E;
wherein ΔTTA (e ij ) min For the minimum transmission layer importance among all edges of edge set E, ΔTTA (E ij ) max The transmission layer importance maximum value in all edges of the edge set E;
8. each edge e obtained according to step seven ij Link importance LI (e) ij ) And the values are arranged from large to small, so that the electric power communication gateway key link is obtained.
And a specific embodiment II: referring to fig. 3 to 6, an embodiment of a method for identifying a key link of an electric power communication network according to a specific embodiment will be described. The rationality and the effectiveness of the key link identification method in the first embodiment are verified by adopting the embodiment, and experiments are carried out on the basis of the electric power communication network and the business of certain city in the eastern part of inner Mongolia. And (3) using the obtained key links to perform targeted simulation attack on edges in the municipal power communication network model, and verifying the rationality and the effectiveness of the method through the service importance loss rate LSI and the bandwidth loss rate LTF.
As shown in fig. 3 and 4, the trends of the traffic importance loss rate LSI and the bandwidth loss rate LTF after sequentially attacking the key links of the electric power communication network T in the eastern part of inner mongolia according to the edge ranks obtained under different adjustment factors α.
In fig. 3 and 4, the adjustment factor α of the CM-KLIA algorithm takes α=0.3, α=0.6, and α=0.9, respectively, and when deliberately attacking the 3 rd, 4 th, and 5 th links, respectively, the values of the traffic importance loss rate LSI rise to 0.6806, 0.6864, and 0.6922, respectively, and the values of the bandwidth loss rate LTF rise to 0.8272, 0.8308, and 0.8342, respectively. It is explained that when α=0.3, a deliberate attack of a smaller number of links can cause LSI and LTF values to rise greatly in advance compared to other adjustment factors. And when α=0.3 and the 4 th link is intentionally attacked, LSI performance improves by 0.8% and LTF performance improves by 0.4% compared to LSI and LTF curves of α=0. So the value of the adjusting factor alpha is alpha=0.3, and alpha is 0.3 for amplifying the influence on the service level after the link fails.
Fig. 5 and 6 show the trends of the service importance loss rate LSI and the bandwidth loss rate LTE of the electric power communication network T in the eastern part of inner mongolia after the edge ordering according to the different methods of the sequential attack obtained in table 2.
As can be seen from the trend of the business importance loss rate LSI of the 4 methods in fig. 5, the LSI trend of the CM-KLIA algorithm is significantly higher than the other three algorithms in terms of overall trend. Wherein the LSI values of CM-KLIA, KLIA, WBR-LIEA and DEL are 0.7759, 0.4975, 0.6164 and 0.2727, respectively, when attacking to link 20. Compared with the LSI of the service importance loss rate of the other three methods, the LSI of the CM-KLIA algorithm is respectively improved by 55.96%, 25.88% and 184.53%.
From the trends of the LTFs of the bandwidth loss rates of the four methods in fig. 6, the trend of the LTF increase of the CM-KLIA algorithm is significantly higher than the other three algorithms from the overall trend. Wherein the CM-KLIA, KLIA, WBR-LIEA and DEL have LTF values of 0.8944, 0.552, 0.7096, and 0.2775, respectively, when attacking the 20 th link. Compared with the bandwidth loss rate LTFs of the other three methods, the LTFs of the CM-KLIA algorithm are respectively improved by 60.03%, 26.04% and 222.31%.
A third embodiment is described with reference to fig. 7, where the third embodiment is an example of the method for identifying a key link of a power communication gateway according to the first embodiment. In order to illustrate the process of the key link identification algorithm of the power communication gateway based on the main and standby routes, an example description is made by adopting the link mining of the power communication network in certain city of Jiangsu province:
1. constructing a power communication network model;
abstracting a dispatching center, a 500kV transformer substation and a 220kV transformer substation in a power communication network of a certain city of Jiangsu province into indiscriminate stations, wherein the shallowest color in the diagram 7 is the dispatching center, the 500kV transformer substation is the next time, and the rest is the 220kV transformer substation;
abstracting optical cable links among all communication stations into undirected edges, and considering the actual types, lengths and core numbers of all the chain sides, wherein the colors of the links are the types of the optical cables, namely the lightest colors are common optical cables, the secondary colors are ADSS optical cables, the rest are OPGW optical cables, the core numbers and the actual lengths of the optical cables are marked in a table 3, wherein in the types, O represents the links are OPGW optical cables, the link availability per unit length is 99.84%, A represents the links are ADSS optical cables, the link availability per unit length is 99.5%, P represents the links are common optical cables, and the link availability per unit length is 99%;
TABLE 3 Table 3
And abstracting the heavy edge in the topological structure of the power communication network into a single edge, and eliminating the self-loop edge factor.
A power communication network model t= (G, B) is constructed. As shown in fig. 7, wherein the number of nodes is 29 and the number of links is 38.
2. Computing edge e in G ij Link failure of R (e) ij );
According to the second step of the first embodiment, the link availability A per unit length is determined according to the type of the link, and then the link e is used ij Is of the actual length a and bandwidth occupancyλ(e ij ) Calculate e ij Link failure of R (e) ij )。
3. Calculating the service layer reliability TBA (G) of G;
according to the third step in the first embodiment, the protection path condition of each service is counted, and the service availability is calculatedAnd->And sums to calculate the traffic layer reliability TBA (G) of G.
4. Calculating the transmission layer reliability TTA (G) of G;
according to the third step in the first embodiment, the protection path condition of each service is counted, and the service availability is calculatedAnd->And sums the calculated transport layer reliability TTA (G) for G.
5. Calculating the actual e ij Link importance LI (e) ij );
Attack edge e by adopting a physical attack mode ij And will flow through e ij Is to redistribute the primary and backup routes for all traffic of the network;
again executing 3 and 4, resulting in attack e ij post-G service layer reliability TBA (G-e ij ) And transport layer reliability TTA (G-e) ij );
According to step five of embodiment one, TBA (G), TTA (G), TBA (G-e) ij ) And TTA (G-e) ij ) Calculate e ij Is (e) ij ) And the transmission layer link importance Δtta (e ij );
According to step five in embodiment one, the service layer importance Δtba (e ij ) And the transmission layer link importance Δtta (e ij ) The final link importance LI (e ij ) Restoring G to an initial state, and repeating the steps of 3-5 to obtain the link importance of all sides;
the link importance of all sides is arranged in descending order to obtain the first 40% of sides, so that a key link set in the power communication network is mined.
In the power communication network in Jiangsu province of this embodiment, four methods of a main-standby route-based power communication gateway key link identification algorithm (CM-KLIA), a main-standby route-considered power communication gateway Key Link Identification Algorithm (KLIA), a main-standby route-considered data link importance evaluation algorithm (WBR-LIEA), and a shortest path sensitivity-based optical network key link identification (DEL) are respectively applied to compare key link mining results. Top 10 of ranking results are as in table 4, table 4 mines key link comparison results for 4 methods:
TABLE 4 Table 4
As can be seen from the key link identification results of the other 3 methods in table 4, e 19,20 、e 20,25 、e 20,21 、e 18,19 、e 20,24 And e 5,20 All are mined under different recognition algorithms, and the four methods are proved to have certain rationality in the aspect of key link recognition. And remove e 18,19 In addition, the rest 9 links are directly connected with the dispatching center and the 500kV transformer substation, and the links connected with the dispatching center and the 500kV transformer substation in the power communication network are proved to be higher in ranking. But e 18,19 When the traffic flowing through the link is re-routed, the load of the network part link is increased, and the communication delay of part of traffic is increased.
The technical features of the above-described embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above-described embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The above examples illustrate only a few embodiments of the invention, which are described in detail and are not to be construed as limiting the scope of the invention. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the invention, which are all within the scope of the invention. Accordingly, the scope of protection of the present invention is to be determined by the appended claims.
Claims (3)
1. A key link identification method for an electric power communication network is characterized by comprising the following steps: the method is realized by the following steps:
step one, constructing a power communication network model T= (G, B) according to a power communication network topological structure G= { V, E, D, W } and a power communication network service set B;
wherein v= { V i I=1, 2, …, N } is the set of nodes, V i N is the total number of nodes for communication stations in the network;
E={e ij and } is an edge set, e ij For station V i To site V j E when there is no cable connection between the stations ij =0, otherwise e ij =1,e ij =e ji ;
D={d ij And the optical cable length is set, when the station V i To site V j D when the optical cable is connected ij Take the value as site V i To site V j Actual cable length between, otherwise d ij The value is 0;
W={w ij and is the collection of the bandwidth capacity of the optical cable, when the station V i To site V j When the optical cable is connected, w ij Take the value as site V i To site V j Actual cable bandwidth capacity between, otherwise w ij The value is 0;
B={b k i k=1, 2, …, K } is the power communication network traffic set, where b k =(U k ,S k ,T k ,I k ,L k ) K is the total number of services; u (U) k Is the kth power service; s is S k Is the kth power service source node, S k ∈V;T k For the kth power service sink node, T k ∈V;I k The service importance of the kth power service; l (L) k A base bandwidth for a kth power service;
step two, calculating the edge e in the topological structure G of the power communication network ij Link failure of R (e) ij );
Step three, calculating the service layer reliability TBA (G) of the power communication network topological structure G;
setting the x b Service availability of individual unconfigured protection path servicesX is the ratio of the importance of the traffic to the failure of the traffic flowing through the main routing path b =1,2,…,X b ,X b The total number of traffic for which protection is not configured is expressed by the following formula:
in the method, in the process of the invention,is the x th b Service importance of individual unconfigured protection path services, < >>Is the x th b Main routing path of individual traffic, +.>Is the x th b Source site of individual services->Is the x th b Sink site for personal traffic->The sum of the link invalidity of all links in the main routing path;
setting service availabilityIs the y b The ratio of the service importance of each configuration route 1:1 protection path service to the service invalidity of the parallel circuit formed by the service flowing through the main and standby route paths, y b =1,2,…,Y b ,Y b To configure the total number of route 1:1 protection path traffic, the following equations are used to represent:
in the method, in the process of the invention,is the y b Service importance of individual configuration route 1:1 protection path service, < >>Is the y b Service invalidity of individual services;
in the method, in the process of the invention,is the y b Main routing path of individual traffic, +.>Is the y b Alternate routing path for individual traffic, +.>Is the y b Source site of individual services->Is the y b Sink sites for individual traffic;
setting service availabilityIs z < th b The ratio of the importance of the service of each configuration segment 1:1 protection path service to the failure of the service flow main and standby route path forming circuit, z b =1,2,…,Z b ,Z b To configure the total number of segment 1:1 protection path traffic, it is expressed as:
in the method, in the process of the invention,is z < th b The service importance of the individual configuration section 1:1 protection path service,/for>Is z < th b Service invalidity of individual services;
setting upSum of the link failures protected in the primary route +.>Sum of unprotected link failure +.>The sum of (2) is expressed by the following formula:
in which the sum of the link failures protected in the primary routeExpressed by the following formula:
in the method, in the process of the invention,for unprotected links in the segment 1:1 protection path, denoted by the following formula z b Main routing Path of personal traffic->And alternate route path->Intersection operation of->Is z < th b Source site of individual services->Is z < th b Sink site for individual traffic:
in which the sum of unprotected link failures in the primary routeExpressed by the following formula:
according toAnd->The service layer reliability TBA (G) of the power communication network topology structure G is obtained by the following formula:
calculating the reliability TTA (G) of a transmission layer of the topological structure G of the power communication network;
setting the x t Bandwidth availability for individual unconfigured protection path trafficX is the ratio of the traffic bandwidth value of the traffic to the traffic invalidity of the traffic flowing through the main routing path t =1,2,…,X t ,X t The total number of the non-configured protection path services is expressed as follows:
in the method, in the process of the invention,is the x th t Bandwidth value of individual unconfigured protection path traffic, < >>Is the x th t The sum of the link invalidity of all links in the main routing path of each service;
setting service availabilityIs the y t The ratio of the service importance of each configuration route 1:1 protection path service to the service invalidity of the parallel circuit formed by the service flowing through the main and standby route paths, y t =1,2,…,Y t ,Y t To configure the total number of route 1:1 protection path traffic, the following equations are used to represent:
in the method, in the process of the invention,is the y t Bandwidth value of the individual configuration route 1:1 protection path traffic,/for the protection path traffic>Is the y t Service invalidity of individual services;
setting service availabilityIs z < th t Ratio of bandwidth value of each configuration segment 1:1 protection path service to service invalidity of the service flowing through main/standby route path forming circuit, z t =1,2,…,Z t ,Z t To configure the total number of segment 1:1 protection path traffic, it is expressed as:
in the method, in the process of the invention,is z < th t Bandwidth value of individual configuration section 1:1 protection path traffic,/->Is z < th t Service invalidity of individual services;
setting upSum of the link failures protected in the primary route +.>Sum of unprotected link failure +.>The sum of (2) is expressed by the following formula:
in which the sum of the link failures protected in the primary routeExpressed by the following formula:
in the method, in the process of the invention,for unprotected links in the segment 1:1 protection path, denoted by the following formula z t Main routing Path of personal traffic->And alternate route path->Intersection operation of->Is z < th t Source site of individual services->Is z < th t Sink site for individual traffic:
in which the sum of unprotected link failures in the primary routeExpressed by the following formula:
according toAnd->The transmission layer reliability TTA (G) of the power communication network topology G is obtained as follows:
step five, calculating the edge e in the topological structure G of the power communication network ij Link importance LI (e) ij );
Step six, according to each edge e obtained in the step five ij Link importance LI (e) ij ) And the values are arranged from large to small, so that the electric power communication gateway key link is obtained.
2. The method for identifying a key link of a power communication gateway according to claim 1, wherein: in step two, the link failure R (e ij ) The specific calculation process of (1) is as follows:
setting p (e) ij ) For edge e ij Is based on the unit length link availability of (2), edge e ij Calculating each edge e in an exponential function form with the actual length being an index ij Is expressed by the following formula;
wherein A is a side e ij Per unit length of link availability, d ij For station V i To site V j Actual cable length between;
wherein MTTF is edge e ij The average on time before link failure of MTTR is edge e ij Link failure average repair time of (a);
setting lambda (e) ij ) For edge e ij The ratio of the occupied bandwidth value to the total bandwidth capacity value of the frame and according to each edge e ij Is expressed as:
in the method, in the process of the invention,for edge e ij Occupied bandwidth, w ij Take the value as site V i To site V j Actual cable bandwidth capacity between;
according to p (e ij ) And lambda (e) ij ) To obtain the link reliability P (e ij ) The method comprises the following steps:
according to P (e ij ) Obtain edge e ij Link failure of R (e) ij ) The method comprises the following steps:
R(e ij )=1-P(e ij )。
3. the method for identifying a key link of a power communication gateway according to claim 1, wherein: the specific process of the fifth step is as follows:
fifthly, obtaining service layer reliability TBA (G) of the power communication network topological structure G and transmission layer reliability TTA (G) obtained in the fourth step according to the third step;
step five, each edge E in the edge set E ij Attack processing is carried out to flow through the edge e ij The main and standby route path selection is carried out again on all the services of the network node, and the attack edge e is calculated again ij New service layer reliability TBA (G-e) ij ) And new transport layer reliability TTA (G-e) ij );
Step five and three, according to TBA (G), TTA (G), TBA (G-e ij ) And TTA (G-e) ij ) Obtaining edge e ij Is (e) ij ) And the transmission layer link importance Δtta (e ij );
Step five, according to the business layer obtained in step fiveImportance ΔTBA (e) ij ) And the transmission layer link importance Δtta (e ij ) As a result, each edge e is comprehensively measured ij Link importance LI (e) ij ) Numerical values, expressed by the following formula:
wherein, alpha and 1-alpha are weights of the importance of the service layer and the importance of the transmission layer respectively; alpha is the regulating factor, alpha is 0,1];And->Respectively edge e ij Normalized values of importance in the service layer and importance in the transport layer are expressed as follows;
wherein ΔTBA (e) ij ) min For the minimum importance of the business layer in all edges of edge set E, ΔTBA (E ij ) max The service layer importance degree maximum value in all edges of the edge set E;
wherein ΔTTA (e ij ) min For the minimum transmission layer importance among all edges of edge set E, ΔTTA (E ij ) max Is the maximum value of the importance of the transmission layer in all edges of the edge set E.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202310329039.7A CN116346701B (en) | 2023-03-30 | 2023-03-30 | Power communication network key link identification method |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202310329039.7A CN116346701B (en) | 2023-03-30 | 2023-03-30 | Power communication network key link identification method |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN116346701A true CN116346701A (en) | 2023-06-27 |
| CN116346701B CN116346701B (en) | 2024-07-26 |
Family
ID=86887623
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202310329039.7A Active CN116346701B (en) | 2023-03-30 | 2023-03-30 | Power communication network key link identification method |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN116346701B (en) |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6711171B1 (en) * | 1995-11-15 | 2004-03-23 | Enterasys Networks, Inc. | Distributed connection-oriented services for switched communications networks |
| CN110266566A (en) * | 2019-07-16 | 2019-09-20 | 华北电力大学(保定) | A method for evaluating transmission performance of power communication network |
| CN113225215A (en) * | 2021-05-19 | 2021-08-06 | 华北电力大学 | Method and system for identifying differentiated service network key link under SDN architecture |
-
2023
- 2023-03-30 CN CN202310329039.7A patent/CN116346701B/en active Active
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6711171B1 (en) * | 1995-11-15 | 2004-03-23 | Enterasys Networks, Inc. | Distributed connection-oriented services for switched communications networks |
| CN110266566A (en) * | 2019-07-16 | 2019-09-20 | 华北电力大学(保定) | A method for evaluating transmission performance of power communication network |
| CN113225215A (en) * | 2021-05-19 | 2021-08-06 | 华北电力大学 | Method and system for identifying differentiated service network key link under SDN architecture |
Non-Patent Citations (2)
| Title |
|---|
| JULIE A.MCCANN等: "a survey of potential security issues in existing wireless sensor network protocols", IEEE, 7 September 2017 (2017-09-07) * |
| 林文钦等: "考虑主备路由的电力通信网关键链路识别算法", 电力信息与通信技术, vol. 19, no. 9, 30 September 2021 (2021-09-30) * |
Also Published As
| Publication number | Publication date |
|---|---|
| CN116346701B (en) | 2024-07-26 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN110474806B (en) | Power communication network key node identification method | |
| CN102724071B (en) | The power communication fault pre-alarming analytical method of model Sum fanction model Network Based and system thereof | |
| CN110971525B (en) | Service routing and addressing method for service operation of power communication network | |
| CN101588263B (en) | Method for evaluating reliability of electric force communication network | |
| CN105553843B (en) | A kind of relay protection of transmission line control service channel method for configuring route and device | |
| CN106506357A (en) | A kind of double route collocation method of power telecom network and device | |
| CN114025264B (en) | A route planning method for power communication SDH optical transmission network | |
| CN109344975A (en) | A method and system for checking and optimizing a single point of failure for power communication services | |
| CN107025524B (en) | Equipment overload auxiliary decision-making method considering load power supply reliability requirement | |
| CN110991913B (en) | Busy airport peak time congestion risk analysis method | |
| CN112118176A (en) | A Service Reliability-Oriented Routing Load Optimization Method for Integrated Data Network Channels | |
| CN112887207B (en) | Service route distribution method and device for power IP-optical communication network | |
| CN105703973A (en) | Composite-measurement-based reliability research method for power communication fiber network | |
| CN102868563B (en) | Cross layer mapping management method of share risk link group | |
| CN111092827B (en) | Power communication network resource allocation method and device | |
| CN111147288B (en) | Power dispatching communication network node importance identification and evaluation method | |
| CN117955900A (en) | Power communication network control service routing twin planning method and device | |
| CN109861855B (en) | A method and device for determining the importance of nodes in a power communication network | |
| CN116346701A (en) | Power communication network key link identification method | |
| CN116667881A (en) | A Fast Density Clustering-Based Evaluation Method for Critical Links in Power Communication Networks | |
| CN117692380A (en) | Power communication private network routing optimization method and system based on risk balancing | |
| CN118764900A (en) | Key node identification method and system for power wireless private network based on complex network | |
| Yang et al. | Vulnerability analysis of urban rail transit network by considering the station track layout and passenger behavior | |
| Wang et al. | Critical node identification for electric power communication network based on topology and services characteristics | |
| CN115660340A (en) | Urban rail system important station and line identification method considering time-varying requirements |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |