This application relates to methods and apparatus for establishing diverse paths of switched connections across a network of nodes.
Primary paths through PNNI (Private Network to Network Interface) networks may require backup connections. In order to reduce the risk of a backup connection failing, the backup connection should be routed over a diverse path.
For PVC (Permanent Virtual) connections, backup connections can be created with the involvement of a Network Management system (NMS) because the NMS has information on the path traversed by the main connection. The NMS can set up a primary and a backup path when commissioning an end to end connection. In this model, the NMS is the single point of processing.
For SPVC (Switched PVCs) connections, backup connections can be created with the involvement of a Network Management system (NMS) by configuring routing information that restricts which nodes/ports the main connection can use and which nodes/ports the backup connection can use. This, however, is very error prone, restrictive and operator intensive. In general, for switched connections (e.g. SPVCs (Switched PVCs) the NMS does not have any involvement in the routing decisions made when routing calls as connections are source routed, i.e. the source node of the connection determines its path.
RAPID (Reserved Alternate Path with Immediate Diversion) and ODR (Operator Directed Routing) are examples of methods that can be used by an NMS for setting up diverse connections for PVCs and SPVCs, respectively. RAPID switches to a reserved back-up path when there is a failure in the main connection. An alternative set of cross-connects are established for the back-up connection which do not use the same port and/or node as the main connection. The NMS sets up the primary and the back-up connections when commissioning the end to end connection. This is possible in PVC networks because the NMS knows every component and connection in the network. The NMS is in communication with each node on a management plane. RAPID is inadequate for switched connections due to lack of information about the traversed path, as previously mentioned.
In ODR, the NMS must commission each node that sources an SPVC with DTLs (Designated Transit Lists) that can be used when routing calls. Each SPVC that uses a backup connection would require information specifying which DTLs to use for the main connection and which DTLs to use for the backup connection. As previously mentioned, the configuration is error prone, restrictive and operator intensive.
For switched connections that do not use ODR in a PNNI network, the source node determines the entire path to be taken by a call. In a flat PNNI network, the source node has a view of all physical nodes in the network and can create a diverse route by analyzing the DTL used for the main connection. However, this diverse route may be more restrictive than required. For example, if only Node Identities and not Port Identities are specified in the DTL used by the main connection, then the backup connection must avoid entire nodes in order to ensure that it does not transit a port used by the main connection. In fact, since the source and terminating nodes cannot be avoided there can be no guarantee of a completely diverse path. If the Port Identities are specified in the DTL used by the main connection, a diverse route can be generated.
In a hierarchical PNNI network, portions of the network are identified only by LGNs (Logical Group Nodes). The source node can create a diverse path that avoids the LGNs used by the main connection but this could exclude potentially large collections of nodes. In addition, the last LGN can not be avoided as that LGN contains the termination point of the call. Accordingly, there is no guarantee of diversity in that LGN.
Another method of creating a diversely routed backup connection in hierarchical PNNI networks involves using policy based routing, such as that defined in af-cs-0195.000, which is incorporated herein by reference. This method of diverse routing requires that every link in the network has a unique identifier tag (Network Entity Network Service Category (Ne-NSC) in Policy routing nomenclature). In order to setup a diverse backup connection, the tags must be collected for the main connection. Furthermore, a policy constraint specifying a list of all links traversed by the main connection and a requirement to avoid those links must be included in a setup message for the backup connection. The main disadvantage of this method is the overhead of configuring unique tags on all network links. These tags must be distinguishable from other functional tags that exist in the system. Another disadvantage is that if the tags were not collected during call establishment, there is no way to create a diversely routed backup connection, i.e. NSC Report Lists that can be used to determine which links are traversed by a connection can only be returned during initial call establishment.
Without tagging every link in the network or tracing every call during call establishment, it is not currently possible for a source node to route a diverse connection in a PNNI hierarchical network.
In view of the foregoing, a means of efficiently establishing a diversely routed backup connection in a PNNI hierarchical network is required.
Embodiments of the invention are directed to providing secondary paths of diversely routed switched connections, used as backup connections in, for example, a hierarchical ATM network. Currently, this can only be done using ODR or policy-based routing. The main disadvantage of ODR is the time required for an operator to manually configure the DTLs. The disadvantage with policy-based routing is that each link in the network must be uniquely tagged. Conversely, embodiments of the present invention require no extra configuration in the network.
Embodiments of the invention trace a connection either as it is being set up (using, for example, a Path Trace) or after it has been established (using, for example, Connection Trace) and include the resulting list of traversed nodes and/or ports in a connection setup message for a backup connection. An entry border node of each peer group that receives the setup message for a backup connection can establish a diverse route through its peer group by avoiding the nodes and/or ports specified in the list. Advantages of this method are that it requires no extra configuration in the network and can be applied to connections that have already been set up.
Accordingly, in one aspect of the invention, there is provided a method of establishing a secondary path of switched connections across a network of nodes, the method comprising: generating a setup signal for enabling the nodes to setup the secondary path, the setup signal containing one or more connection identifications obtained from a trace of a primary path.
In another aspect of the invention, there is provided a method of establishing a secondary path of switched connections through a network of nodes, the method comprising: receiving a signal to establish the secondary path through the network, the signal comprising one or more connection identifications obtained from a trace of the primary path; detecting the connection identification(s), and establishing the secondary path based on the connection identifications in the setup signal.
In another aspect of the invention, there is provided a network element configured to establish a secondary path of switched connections across a network of nodes, the network element comprising: a processing functionality configured to setup the secondary path based on a setup signal, the setup signal comprising one or more connection identifications obtained from a trace of a primary path.
In some embodiments, the network element is a node.
In a further aspect of the invention, there is provided a network element comprising means for requesting from one or more resources of a primary path in a communication network an identification of the resource, means for receiving each identification, and signal generating means for generating a setup signal for establishing a secondary path and for including in the setup signal one or more received identification(s).
In some embodiments said means for requesting is adapted to request an identification from a resource other than its nearest neighbour network element on the primary path.
In some embodiments said means for requesting comprises means for generating and transmitting at least one of a path trace and a connection trace on the primary path.
One embodiment of the invention includes an indicator in the setup message to indicate whether the backup path must be diverse at only the port level or at the node and port level.
Other aspects and features of the present invention will become apparent, to those ordinarily skilled in the art, upon review of the following description of the specific embodiments of the invention.
Embodiments of the invention will now be described in greater detail with reference to the accompanying drawings, in which:
Embodiments of the present invention use a trace to determine the connection identifications of a primary path through a network. Examples of the trace include path trace and connection trace in a PNNI network. The results from the trace for the main connection are included in a setup message used to establish a diverse path. The trace results are used by nodes when determining the path for the backup connection in order to ensure its diversity from the primary path.
A path trace is presently used in switched networks to trace calls comprising switched connections. The setup message for the call includes a TTL IE (Trace Transit List Information Element). The TTL IE is used to record the Node Ids and Port Ids of the nodes and ports traversed by the connection being setup. This information is transported back to the source node in the Connect message.
A connection trace is used to trace a connected call. Presently, it is used by operators to determine the Node Ids and Port Ids of the nodes and ports that a specific call traverses. The operator selects an end point, which causes the launch of a Trace Connection Message. The Trace Connection Message traces the path through the network recording the Node Ids and Port Ids of the nodes and ports traversed by the connection being traced. A Trace Connection Acknowledge Message including the recorded information is generated by the terminating node and sent back to the originating node.
Details of path and connection traces may be found in The ATM Forum Technical Committee Publication af-cs-0141.002 entitled PNNI Addendum for Path and Connection Trace Version 1.1. (PACT 1.1) dated February 2004, which is incorporated herein by reference.
Embodiments of the present invention include methods and nodes for setting up secondary paths of switched connections through a network. FIGS. 4 to 6 are flowcharts of examples of methods in accordance with embodiments of the invention.
By way of example, in the network 100 referred to with reference to
In another example, referring to
In some embodiments, more than one border node is available at an LGN. In those cases, if a border node receives a setup signal for a secondary path that includes its own node identification as part of the primary path, it is adapted to crank-back the setup signal to the exit border node of the previous LGN. The border node of the previous LGN will then crankback the setup signal to the source node or the entry border node of its LGN to select an alternate exit border node for its LGN. The network described with reference to
The above described methods are implemented by nodes configured in accordance with embodiments of the present invention.
FIGS. 7 to 9 are block diagrams of examples of nodes configured in accordance with embodiments of the invention.
A setup signal 150 for a secondary path, generated in accordance with an embodiment of the present invention, will now be described with reference to
In the example of
What has been described is merely illustrative of the application of the principles of the invention. Other arrangements and methods can be implemented by those skilled in the art without departing from the spirit and scope of the present invention.