Font Size: a A A

Research Of Double Routing Configuration Strategy For Electric Power Communication Networks

Posted on:2016-01-23Degree:MasterType:Thesis
Country:ChinaCandidate:H F WangFull Text:PDF
GTID:2272330470475581Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
Important services of the electric power communication network need double routes. Traditional routing algorithms focusing on "single-route" is unable to meet the security requirement, therefore, manually configured mode still counts. However, manual approach is time-consuming and error-prone. On the one hand, it is not conducive to data management, on the other hand, it cannot take full advantage of the power communication network resources. In this paper, the double routing configuration strategy has been studied, which will solve the problem of manual mode and traditional single routing algorithms.Firstly, the main rules of the existing power communication network double routing configuration methods have been analyzed, and then their difficulties and characteristics have been summarized. According to the graph theory and actual situation, the power communication networks have been mapped to two level network topologies, cable-level network topology and link-level network topology. Besides, power communication network is in strict requirement of security, which can represent the security state of services, compared with the traditional reliability. So it is rational for the routing goal while the weight in a graph means the s ecurity. Furthermore, it will reduce the security risk ensuring a single-optic cable being not overloaded. Based on the above points, the dual objective function for power communication network has been set. Secondly, security weights of power communication network elements such as PCM, SDH, and optical cable have been quantitative computed, using the Bayesian network modeling approach. Thirdly, the classic D algorithm, RF algorithm, and an optimal algorithm ODR have been achieved, using the C language. D algorithm is the basis of many algorithms. RF algorithm is simple but may fail in searching the second path in some cases. ODR algorithm is able to avoid the defects of RF. Finally, instances verify the feasibility of ODR, and a dual routing configuration policy for the power communication network has been formed.
Keywords/Search Tags:power communication network services, double route, security, security risk
PDF Full Text Request
Related items