1. Field of the Invention
The present invention is related to a bridge/router and a method for avoiding packet replication during a failure in a network. In one embodiment, the network is a video hub office which is associated with the distribution of IP television to homes.
2. Description of Related Art
The following abbreviations are herewith defined, at least some of which are referred to in the ensuing description of the prior art and the present invention.
Referring to
Referring to
In
In
The present invention includes a bridge/router and a method that are capable of avoiding packet replication at layer 2 when there is a failure in a network. In one embodiment, the bridge/router is informed about a fault which occurred within the network. Then, the bridge/router makes a determination about whether or not multiple LSPs would be used to flood/carry the same IP traffic out off a single port. If yes, the first bridge/router chooses one of the LSPs to carry the IP traffic out the single port and then prevents the IP traffic from being carried on the remaining LSP(s) out the single port which avoids the packet replication on a link which is associated with the single port. If no, then the first bridge/router allows the IP traffic to be carried on the LSPs out off more than one port.
A more complete understanding of the present invention may be obtained by reference to the following detailed description when taken in conjunction with the accompanying drawings wherein:
Referring to
In
In
The first bridge/router 306a (and the second bridge/router 306a) has a memory 324 which stores instructions that are processable by a processor 326 to facilitate the various steps of the VPLS optimization method 400 (see
The first bridge/router 306a (and the second bridge/router 306b) has two different ways it can use to implement step 406 and choose which LSP(s) should be prevented to carry the IP multicast traffic 320 out the single port and which LSP should be allowed to carry the IP multicast traffic 320 out the signal port. The two different ways are described next:
1. Solution 1—Architecture Specific: Knowing a given network topology, it is possible to list all of the failure scenarios and identify in advance which LSP is to be used to send IP multicast traffic out a single port towards the first router 310a (if it is the PIM designated router) or the second router 310b (if it is the PIM designated router). In one embodiment, the failure scenarios are characterized within tables in a VPLS virtual bridge FDB, and the rules to determine the specific LSP(s) on which the IP multicast traffic 320 need to be suppressed are hard-coded in the first bridge/router 306a (and the second router/bridge 306b). There is no need for the first bridge/router 306a (and the second bridge/router 306b) to know which router 310a or 310b is the PIM designated router because this information is located in the hard-coded rules (see discussion below for more details about the PIM designated router).
2. Solution 2—Generic Architecture (based on PIM-Snooping): This solution is not limited to a particular network topology, but requires the first bridge/router 306a and the second bridge/router 306b to implement PIM snooping of the PIM-Hello messages sent by the first router 310a and the second router 310b (see
In both solutions, the LSPs are not affected (i.e., torn down) which is an advantage since creating an LSP requires resources (a human network administrator, or the existence and deployment of a protocol). Instead, the IP multicast traffic 320 is not sent on the suppressed LSPs that do not lead to the PIM designated router 310a or 310b. Also, the first bridge/router 306a and the second bridge/router 306b do not need to remember any state information because when the original LSP becomes active again, then new LSP/interfaces conditions are created and the same rules associated with the VPLS optimization method 400 would still apply, i.e. if no suppression is needed to avoid replicating traffic, then there will not be any suppression.
A discussion is provided next to describe in detail each fault scenario that could occur within the exemplary VHO 300 and to describe in detail how the VPLS optimization method 400 would address each of those fault scenarios to prevent the duplication of IP multicast traffic 320. To help explain how the VPLS optimization method 400 addresses the various fault scenarios within the enhanced VHO 300, reference is made to the description below that is associated with
As can be seen, the first bridge/router 306a resolves these three fault scenarios by: (1) inspecting the VPLS FDB; and (2) determining which LSP(s) needs to have the IP multicast suppressed thereon by referring to these hard-coded rules:
A discussion is provided next to help explain how the first bridge/router 306a can implement the VPLS optimization method 400 and the aforementioned solution no. 2 so that failure nos. 1-3 will not cause traffic replication on a single link 308, 312 or 314. In this case, the first bridge/router 306a (and the second bridge/router 306b) need to perform PIM-Snooping to ascertain whether the first router 310a or the second router 310b is the current PIM designated router.
The first bridge/router 306a can ascertain the current PIM designated router based on whether or not it receives PIM-Hellos from the first router 310a and the second router 310b. For instance, if the first bridge/router 306a receives PIM-Hellos from both the first router 310a or the second router 310b then it ascertains which one is the PIM designated router by looking at the IP address or the priority of the received PIM-Hellos (i.e., the router that sends the PIM-Hello with the lowest IP address or the highest priority is the PIM designated router). If the first bridge/router 306a receives PIM-Hellos from only the second router 310b then it ascertains that the second router 310b is the PIM designated router. In contrast, the first router 310a and the second router 310b exchange PIM-Hellos between themselves so they can elect which of them is actually going to be the PIM designated router.
How the first bridge/router 306a (and the second bridge/router 306b) performs PIM-Snooping to ascertain the PIM designated router will become even more apparent after reading the description that is provided below with respect to
As can be seen, the first bridge/router 306a resolves these three fault scenarios by: (1) snooping the PIM-Hellos to ascertain whether the first router 310a or the second router 310b is the PIM designated router; (2) inspecting the VPLS FDB; and (3) determining which LSP(s) should have the IP multicast traffic 320 suppressed thereon by using the following rules:
Note: to perform solution 2, the VPLS instance 318 needs to be deployed with enough LSPs and protection LSPs so that the first bridge/router 306a and the second bridge/router 306b always receive the PIM-Hellos as an end-point (or LER: Label Edge Router) of an LSP (no PIM snooping in intermediate LSP nodes, or LSR: Label Switching Routers). In this way, the first bridge/router 306a and the second bridge/router 306b can always reach the same conclusion as the one made by the first and second routers 310a and 310b as to which of those routers 310a or 310b is going to be the PIM designated router.
The following TABLE 1 identifies the actions to be taken at the first bridge/router 306a (1st B/R) and the second bridge/router 306b (2nd B/R) upon implementing the VPLS optimization method 400 for each of the eight possible failures that can occur in the enhanced VHO 300 (see
Referring to
To implement solution no. 1, the first bridge/router 306a can resolve fault nos. 1-3 and the second bridge/router 306b can resolve fault nos. 4-5 by using these hard-coded rules:
And, to implement solution no. 2, the first bridge/router 306a can resolve fault nos. 1-3 and the second bridge/router 306b can resolve fault nos. 4-5 by using these rules:
From the foregoing, it should be appreciated that the VPLS optimization method 400 can be implemented quickly and at a minimal cost within existing bridges/routers. Plus, the VPLS optimization method 400 can be implemented without having to revise existing standards. Solution No. 1 is the quickest to implement, but is limited to a specific/known architecture of the network (including bridges/routers and routers). In contrast, solution no. 2 can handle many more architectures and topologies, but requires the use of PIM Snooping. Both solutions can be applied to networks which have architectures that are different than the ones shown herein with respect to VHO 300 and VHO 300′. In fact, both solutions can be applied to networks which have nothing to do with a VHO or an IPTV transport network.
Although two embodiments of the present invention have been illustrated in the accompanying drawings and described in the foregoing detailed description, it should be understood that the invention is not limited to the embodiments disclosed, but is capable of numerous rearrangements, modifications and substitutions without departing from the spirit of the invention as set forth and defined by the following claims.
Number | Name | Date | Kind |
---|---|---|---|
6879594 | Lee et al. | Apr 2005 | B1 |
7447167 | Nadeau et al. | Nov 2008 | B2 |
20030026209 | Katz | Feb 2003 | A1 |
20050018668 | Cheriton | Jan 2005 | A1 |
20060045007 | Huck | Mar 2006 | A1 |
20060120396 | Hasegawa et al. | Jun 2006 | A1 |
20060218262 | Abeta et al. | Sep 2006 | A1 |
20080031130 | Raj et al. | Feb 2008 | A1 |
20090028044 | Windisch et al. | Jan 2009 | A1 |
Number | Date | Country | |
---|---|---|---|
20080049763 A1 | Feb 2008 | US |