PROTECTION METHOD AND SYSTEM IN FLEXIBLE BANDWIDTH OPTICAL NETWORKS WITH MULTI-CORE FIBER
20210409112 · 2021-12-30
Inventors
- Bowen CHEN (Suzhou, CN)
- Qingcheng ZHU (Suzhou, CN)
- Gangxiang SHEN (Suzhou, CN)
- Lian XIANG (Suzhou, CN)
- Mingyi GAO (Suzhou, CN)
Cpc classification
H04J14/0291
ELECTRICITY
International classification
Abstract
The present invention provides a protection method and system in flexible bandwidth optical networks with multi-core fiber. The method includes steps of: selecting an appropriate working path for a connection request, and selecting a working core as a transmission channel on the working path; allocating, on the selected working path and working core, a spectrum resource that satisfies spectral continuity, spectral consistency, and a crosstalk threshold constraint; selecting, for the connection request, a dedicated protection path that does not intersect a link of the working path, and selecting a protection core as a transmission channel on the protection path; and finally, allocating, on the selected protection path and protection core, the spectrum resource that satisfies the spectral continuity, the spectral consistency, and the crosstalk threshold constraint.
Claims
1. A protection method in a flexible bandwidth optical network with multi-core fiber, comprising: S1. generating a group of connection requests CRs (s, d, FS); S2. for each connection request from the group of connection requests CRs (s, d, FS), calculating a working path from a source node s to a destination node d and K protection paths that do not intersect a link of the working path; S3. setting a maximum crosstalk threshold A.sub.max of an optical fiber link according to a modulation format of a connection request, searching an optical fiber link l.sub.w␣p.sub.i for a candidate spectrum block that satisfies spectral continuity and spectral consistency, wherein S.sup.c.sup.
2. The method according to claim 1, wherein S1 comprises: initializing a flexible bandwidth optical network with multi-core fiber G(L,N,C,F), generating the group of connection requests CRs (s, d, FS), setting the maximum crosstalk threshold A.sub.max of theoptical fiber link in different modulation formats, and setting a maximum modulation order threshold M.sub.max.
3. The method according to claim 1, wherein a K-shortest path method is used in S2 to calculate the working path from the source node s to the destination node d and the K protection paths that do not intersect the link of the working path.
4. The method according to claim 1, wherein First Formula (1) is used in S3 to calculate a crosstalk impact value M.sub.f.sub.
5. The method according to claim 1, wherein compressing the transmission bandwidth of a connection request in S5 comprises: keeping a modulation order unchanged, and reducing a line rate, wherein the adjusted line rate needs to be greater than or equal to a data rate of a connection request; or keeping a line rate unchanged, and increasing a modulation order, wherein the adjusted modulation order needs to be less than or equal to a maximum modulation order threshold M.sub.max; or adjusting both a line rate and a modulation order, wherein the adjusted line rate needs to be greater than or equal to a data rate of a connection request, and the adjusted modulation order needs to be less than or equal to a maximum modulation order.
6. A protection system inflexible bandwidth optical networks with multi-core fiber, comprising: a network initialization module, configured to generate a group of connection requests CRs (s, d, FS); a threshold setting module, configured to set a maximum crosstalk threshold A.sub.max of an optical fiber link in different modulation formats, and set a maximum modulation order threshold M.sub.max; a connection request generation module, configured to generate a connection request according to uniform distribution of source nodes and destination nodes, and set a quantity of connection requests, source nodes and destination nodes of different connection requests, a bandwidth requirement, a line rate, and a modulation format; a path calculation module, configured to calculate, according to source nodes and destination nodes of the connection requests CRs (s, d, FS), K candidate working paths and K corresponding candidate protection paths from the source nodes to the destination nodes, to find optimal paths as a working path and a protection path, wherein the working path and a link of the protection path do not intersect; a core selection module, configured to number cores, and when the connection request arrives, sequentially traverse cores, until a spectrum resource that satisfies a requirement is found; a crosstalk evaluation module, configured to search a specified core for all available spectrum blocks that satisfy double constraint conditions of spectral continuity and spectral consistency, and calculate a crosstalk value A.sub.f.sub.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0044]
[0045]
[0046]
[0047]
[0048]
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
[0049] To enable a person skilled in the art to better understand the technical solutions of the present invention, the present invention is further described below in more detail with reference to the accompanying drawings and specific embodiments.
[0050] The present invention is further described below in detail with reference to the accompanying drawings. In various accompanying drawings, the same elements are represented by using similar reference numerals. For clarity, various parts are not drawn to scale in the accompanying drawings. In addition, some commonly known parts may be not shown in the drawings.
[0051] Many specific details such as the structures, materials, sizes, and treatment process and technologies of members of the present invention are described below to make the present invention more comprehensible. However, as can be seen by a person skilled in the art, the present invention may be not implemented according to these specific details.
[0052] In a dedicated protection method in a flexible bandwidth optical network with multi-core fiber in the present invention, the process of establishing a connection request includes: first, selecting an appropriate working path for a connection request, and selecting a working core as a transmission channel on the working path; next, allocating, on the selected working path and working core, a spectrum resource that satisfies spectral continuity, spectral consistency, and a crosstalk threshold constraint; then, selecting, for a connection request, a dedicated protection path that does not intersect a link of the working path, and selecting a protection core as a transmission channel on the protection path; and finally, allocating, on the selected protection path and protection core, the spectrum resource that satisfies the spectral continuity, the spectral consistency, and the crosstalk threshold constraint.
[0053] There are the following two cases for a bandwidth size of a reserved spectrum resource: 1) the bandwidth size is equal to the size of a bandwidth requirement of the connection request, and this case is referred to as a normal protection state; and 2) the bandwidth size is less than a size of the bandwidth requirements of a connection request, and this case is referred to as a bandwidth compression protection state. A condition for the normal protection state to occur is that a spectrum resource that has a size equal to that of a bandwidth requirement of a connection request and satisfies the spectral continuity, the spectral consistency, and the crosstalk threshold constraint can be found on the protection path and the protection core. A condition for the bandwidth compression protection state to occur is that a crosstalk value corresponding to every candidate spectrum block that is on the protection path and the protection core and is equal to the bandwidth requirements of a connection request in size is greater than a crosstalk threshold, or a spectrum resource that has a size equal to that of the bandwidth requirements of the connection request and satisfies the spectral continuity and the spectral consistency fails to be found. A manner of implementing the bandwidth compression protection state is adjusting a line rate and a modulation format of the connection request, to ensure that under the premise that the transmission quality of optical signals is satisfied, reliable protection is provided for the transmission of each connection request by using fewer spectrum resources, and the spectrum resource that satisfies the conditions of the spectral continuity, the spectral consistency, and the crosstalk threshold constraint is reserved again for the connection request on the protection path and a protection core.
Embodiment 1
[0054] As shown in
[0055] Step 1. Generating a group of connection requests CRs (s, d, FS).
[0056] In the step, a flexible bandwidth optical network with multi-core fiber G(L,N,C,F) is initialized, the group of connection requests CRs (s, d, FS) is generated, a maximum crosstalk threshold A.sub.max of an optical fiber link in different modulation formats is set, and a maximum modulation order threshold M.sub.max is set.
[0057] Step 2. For each connection request in a group of connection requests CRs (s, d, FS), calculating a working path from a source node s to a destination node d and K protection paths that do not intersect a link of the working path.
[0058] In the step, a K-shortest path method is used to calculate the working path from the source node s to the destination node d and the K protection paths that do not intersect the link of the working path.
[0059] In the step, first, the flexible bandwidth optical network with multi-core fiber G.sub.s=(L, N, C, F) is initialized. Next, a group of connection requests CRs (s, d, FS) are generated, including source nodes, destination nodes, and a bandwidth requirement size. Third, a working path and a protection path are calculated for each connection request, and cores are sequentially selected. Fourth, the working path and the protection path of the connection request are searched for a spectrum resource, and the spectrum resource is allocated. The connection request is established in a flexible bandwidth optical network with multi-core fiber. Spectral continuity, spectral consistency, and a crosstalk threshold constraint need to be considered in the process. In a case that spectrum resources on the protection path are insufficient or there is no resource that satisfies the crosstalk threshold constraint on the protection path, a bandwidth compression control module is triggered, and the transmission bandwidths of a connection request is carried by reducing spectrum resources occupied. Fifth, according to a state of a spectrum resource occupied by each optical fiber link, spectrum utilization and blocking probability are calculated. A specific embodiment is as follows:
[0060]
TABLE-US-00001 TABLE 1 Correspondence table among a line rate, a modulation format, and a channel width Line Modulation Crosstalk rate Modulation order Channel threshold Relative [Gb/s] format [b/symbol] width[GHz] [dB] cost 40 DP-BPSK 1 50.0 −16 1.0 40 DP-QPSK 2 25.0 −18 1.2 100 DP-QPSK 2 50.0 −18 2.0 400 DP-16-QAM 4 75.0 −24 7.2
[0061] Three connection requests CR1 (1, 4, 4), CR2 (1, 4, 6), and CR3 (1, 4, 2) are generated. The connection requests are all from a source node 1 to a destination node 4, and bandwidth requirements of the connection requests are respectively four spectral gaps, six spectral gaps, and two spectral gaps.
[0062] For the first connection request CR1 (1, 4, 4), a data rate is 30 Gb/s, a quantity of required spectral gaps is 4, a corresponding channel width is 50 GHz, a line rate is 100 Gb/s, a modulation format is DP-QPSK, a corresponding crosstalk threshold is A.sub.max=−18 dB, and in K shortest paths, K=2. Two shortest working paths are calculated from the source node 1 to the destination node 4. The first working path is 1-2-3-4 (1600 km), and the second working path is 1-6-5-4 (2000 km). The first working path is first selected to inspect resources. A shortest dedicated protection path corresponding to a working path 1 is 1-6-5-4 (2000 km), and the path does not intersect the link of the working path 1.
[0063] Step 3. Setting a maximum crosstalk threshold A.sub.max of an optical fiber link according to a modulation format of the connection request, searching an optical fiber link l.sub.w∈p.sub.g for a candidate spectrum block that satisfies spectral continuity and spectral consistency, where S.sup.c.sup.
[0064] if a candidate spectrum block that satisfies a crosstalk threshold constraint is found, this working candidate spectrum block S.sub.f.sub.
[0065] if a candidate spectrum block that satisfies a crosstalk threshold constraint is not found, the connection request is blocked.
[0066] In the step, the first-hit method is used in combination to search for a candidate spectrum block with a crosstalk value less than or equal to the set crosstalk threshold A.sub.max, that is, A.sub.f.sub.
[0067] In the embodiment, S.sub.f.sub.
[0068] To calculate a crosstalk value, First Formula (1) is used to calculate a crosstalk impact value M.sub.f.sub.
[0069] where τ.sub.0 and τ.sub.1 are crosstalk weight value adjustment factors, τ.sub.0∈[0,1], and τ.sub.1∈[2,3];
h is an average increase in crosstalk in each unit of length, n is a quantity of adjacent cores, L is the length of optical fiber, and κ, r, β, and ω.sub.th are all physical parameters of the optical fiber, and respectively represent a coupling coefficient, a radius of curvature, a propagation constant, and a centre-to-centre distance. M.sub.f.sub.
[0070] Step 4. Setting the maximum crosstalk threshold A.sub.max of the optical fiber link according to the modulation format of the connection request, and searching an optical fiber link l.sub.p∈q.sub.i for a candidate spectrum block S.sup.c.sup.
[0071] if the candidate spectrum block S.sup.c.sup.
[0072] if the candidate spectrum block S.sup.c.sup.
[0073] starting from an f.sub.0.sup.th candidate spectrum block in S.sup.c.sup.
[0074] if a candidate spectrum block that satisfies the crosstalk threshold requirement is found, this protection candidate spectrum block S.sub.f.sub.
[0075] if a candidate spectrum block that satisfies the crosstalk threshold requirement is not found, Step 5 is performed.
[0076] In the step, a protection path q.sub.i and a protection core c.sub.p are selected, a crosstalk value is calculated on the protection path q.sub.i and the protection core c.sub.p, and a reserved protection spectrum resource is recorded.
[0077] Step 5. Compressing a transmission bandwidths on a protection path q.sub.i and a protection core c.sub.p, and performing Step 4 after a compressed state of bandwidth is reached, where if a spectrum resource that satisfies the spectral continuity, the spectral consistency, and the crosstalk threshold constraint fails to be found, the connection request is blocked.
[0078] Transmission bandwidths of a connection request are compressed on the protection path q.sub.i and the protection core c.sub.p. A combination of a modulation format and a line rate of a connection request is adjusted, to implement the transmission bandwidths of a connection request in the compressed state of bandwidth. There are three methods for implementing the transmission bandwidths of a connection request in the compressed state of bandwidth: 1) keeping a modulation order unchanged, and reducing a line rate, where the adjusted line rate needs to be greater than or equal to a the data rate of a connection request; 2) keeping a line rate unchanged, and increasing a modulation order, where the adjusted modulation order needs to be less than or equal to a maximum modulation order threshold M.sub.max; and 3) adjusting both a line rate and a modulation order, where the adjusted line rate needs to be greater than or equal to the data rate of a connection request, and the adjusted modulation order needs to be less than or equal to a maximum modulation order. In the process of bandwidth compression, in consideration of the cost, the first bandwidth compression method is preferentially selected, the second bandwidth compression method is selected next, and the third bandwidth compression method is finally selected. After the compressed state of bandwidth is reached, Step 4 is performed again. If the spectrum resource that satisfies the spectral continuity, the spectral consistency, and the crosstalk threshold constraint finally fails to be found, the connection request is blocked.
[0079] Step 6. Establishing a group of connection requests based on Step 1 to Step 5.
[0080] Spectrum resource allocation on a working path for CR1 (1, 4, 4) is specifically described.
[0081] On the selected working path 1-2-3-4 (1600 km), the minimum spectral gap number to the maximum spectral gap number are first searched on a working core c=0 to find all spectrum blocks that satisfy constraint conditions of the spectral continuity and the spectral consistency.
[0082] The core 0 has three adjacent cores: 1, 5, and 6. Therefore, n=3, and n={1, 5, 6}. In
[0083] A crosstalk value at a spectrum block S.sub.00.sup.0l.sup.
[0084] A crosstalk value at a spectrum block S.sub.0.sup.0l.sup.
[0085] Spectrum resource allocation on a protection path for CR1 (1, 4, 4):
[0086] On the selected dedicated protection path 1-6-5-4 (2000 km), a spectrum block with a spectrum width of four spectral gaps is first found for the connection request CR1 (1, 4, 4). The minimum spectral gap number to the maximum spectral gap number are first searched on the protection core c.sub.p=0, to find all spectrum blocks that satisfy the constraint conditions of the spectral continuity and the spectral consistency. As shown in
[0087] In the bandwidth compression control module, for the connection request CR1 (1, 4, 4), while a modulation order is kept unchanged, a line rate is first reduced to 40 Gb/s, which is greater than a data rate of 30 Gb/s. A quantity of spectral gaps required for a connection request on the protection path is reduced to 2, and a corresponding crosstalk threshold is still A.sub.max=−18 dB. First, the minimum spectral gap number to the maximum spectral gap number are searched on the protection core c.sub.p=0, to find all spectrum blocks that satisfy the constraint conditions of the spectral continuity and the spectral consistency and have a bandwidth of two spectral gaps. As shown by a spectrum resource of the protection path in
[0088] For the connection requests CR2 (1, 4, 6) and CR3 (1, 4, 2), according to the steps of establishing a connection for the connection request CR1 (1, 4, 4), a working route and a protection route are calculated, a core is selected, and a working spectrum resource and a protection spectrum resource are allocated. When a crosstalk value corresponding to every candidate spectrum block that is on the protection path and the protection core and has a size equal to that of a bandwidth requirement of a connection request is greater than the crosstalk threshold, or a spectrum resource that has a size equal to that of a bandwidth requirement of the connection request and satisfies the spectral continuity and the spectral consistency fails to be found, the bandwidth compression control module is triggered. The bandwidth compression control module is used to carry the bandwidth requirements of a connection request on the protection path and the protection core by using fewer bandwidth resources, so that a connection request is protected as much as possible, the blocking probability is reduced, the degree of redundancy of spectrum resources is reduced, and the utilization of spectrum resources is increased.
[0089] In this embodiment, in a flexible bandwidth optical network with multi-core fiber, a bandwidth compression method and a crosstalk-aware method are combined, and a condition of triggering a bandwidth compression mechanism is changed, so that a conventional bandwidth compression dedicated protection method is optimized, the blocking probability is reduced, the utilization of spectrum resources is increased, and the degree of redundancy of spectrum resources is reduced.
[0090] When a crosstalk value corresponding to every candidate spectrum block that is on the protection path and the protection core and has a size equal to that of a bandwidth requirement of the connection request is greater than the crosstalk threshold, or a spectrum resource that has a size equal to that of a bandwidth requirement of the connection request and satisfies the spectral continuity and the spectral consistency fails to be found, the bandwidth compression control module is triggered, so that under the premise that particular signal quality is ensured, a bandwidth required for a connection request is reduced, and reliable protection is provided for a connection request as much as possible.
Embodiment 2
[0091] As shown in
[0092] a network initialization module, configured to set, in a flexible bandwidth optical network with multi-core fiber G.sub.s=(L,N,C,F), topology information of this flexible bandwidth optical network with multi-core fiber, an optical fiber connection status, a quantity of network switching nodes, a quantity of optical fiber links, a quantity of cores of each optical fiber, a quantity of spectral gaps of each optical fiber link, and a bandwidth size of each spectral gap;
[0093] a threshold setting module, configured to set a maximum crosstalk threshold A.sub.max of an optical fiber link in different modulation formats, and set a maximum modulation order threshold M.sub.max;
[0094] a connection request generation module, configured to generate a connection request according to uniform distribution of source nodes and destination nodes, and set information such as a quantity of connection requests, source nodes and destination nodes of different connection requests, a bandwidth requirement, a line rate, and a modulation format;
[0095] a path calculation module, configured to calculate, according to source node s and destination node d of each connection request CR (s, d, FS) and by using a K-shortest path algorithm, K candidate working paths and K corresponding candidate protection paths from the source node s to the destination node d, to find optimal paths as a working path and a protection path, where the working path and a link of the protection path do not intersect; and
[0096] a core selection module, configured to select, for each connection request, an appropriate working core and protection core, where after cores are numbered, when a connection request arrives, a core 0 is first selected, if a spectrum resource that satisfies a requirement can be found on the core 0, the core 0 is selected as the working core or protection core, or otherwise, a core 1 is selected, to search for the spectrum resource that satisfies a requirement, and the rest is deduced by analogy, until all cores are traversed;
[0097] a crosstalk evaluation module, configured to: in the selected working path or protection path, first, search a specified core according to a bandwidth requirement of a connection request for all available spectrum blocks that satisfy double constraint conditions of spectral continuity and spectral consistency, where the spectrum blocks are represented by a set S.sup.cl={S.sub.f.sub.
[0098] a bandwidth compression control module, configured to: when a crosstalk value corresponding to every candidate spectrum block that is reserved on the protection path and a protection core and has a size equal to that of a bandwidth requirement of the connection request is greater than the crosstalk threshold or a spectrum resource that has a size equal to that of a bandwidth requirement of the connection request and satisfies the spectral continuity and the spectral consistency fails to be found, the bandwidth compression control module is triggered; in the module, adjust the line rate and the modulation format of a connection request, so that under the premise that particular signal transmission quality is ensured, reliable protection is provided for each connection request by using fewer spectrum resources; and
[0099] a spectrum resource allocation module, configured to search the selected working path and protection path for a spectrum block that satisfies the spectral continuity and the spectral consistency and satisfies the crosstalk threshold requirement, and if an available spectrum block is found, allocate the spectrum resource for the connection request.
[0100] It should be noted that, the relational terms herein such as first and second are used only to differentiate an entity or operation from another entity or operation, and do not require or imply any actual relationship or sequence between these entities or operations. Moreover, the terms “include”, “comprise”, and any variation thereof are intended to cover a non-exclusive inclusion. Therefore, in the context of a process, method, object or device that includes a series of elements, the process, method, object or device not only includes such elements, but also includes other elements not specified expressly, or may include inherent elements of the process, method, object or device. If no more limitations are made, an element limited by “include a/an . . . ” does not exclude other same elements existing in the process, method, object or device which includes the element.
[0101] As discussed above according to the embodiments of the present invention, all details are not described in detail in these embodiments, and the present invention is not merely limited to the specific embodiments. Apparently, many changes and variations may be made according to the foregoing description. These embodiments are selected and described in detail in the specification for better explanation of the principle and actual application of the present invention, so that a person skilled in the art can adequately make use of the present invention and make changes based on the present invention for use. The present invention is only limited by the claims and the full scope and equivalents thereof.