1. Field
This application relates to communication networks and, more particularly, to extensible resource messaging between user applications and network elements in a communication network.
2. Description of the Related Art
Data communication networks may include various computers, servers, routers, switches, hubs, proxies, and other devices coupled to and configured to pass data to one another. These devices will be referred to herein as “network elements,” and may provide a variety of network resources including physical resources such as communication links and bandwidths, and logical resources such as VPN (Virtual Private Network) and AAA (Authentication, Authorization and Accounting) services. Conventionally, data has been transported through the data communication networks by passing protocol data units (such as cells, frames, packets, or segments) between the network elements while utilizing one or more type of network resources. A particular protocol data unit may be handled by multiple network elements and cross multiple communication links as it travels between its source and its destination over the network.
Many user-end applications, such as grid computing, streaming media, and storage on demand, require extensive network capability to obtain access to data, computational resources, storage resources, and other types of resources that are connected in a communication network. As communication networks have evolved, the type of applications designed to run on the network have also evolved and are expected to continue to evolve. To secure access to the resources connected by the network, the applications therefore communicate with network elements to obtain network resources to meet their requirements.
Numerous protocols have been developed to allow network elements to communicate with each other and to allow applications to communicate with network elements, several of which may be used by user applications to access resources on the networks. For example, Reservation Protocol (RSVP) may be used by Internet Protocol (IP) applications in a communication network, such as a statistical multiplexing packet based network, to reserve a portion of the available bandwidth on the data transferring route through the network. Similarly, User to Network Interface (UNI) allows an application to set up a traffic path, such as an ATM virtual circuit or an optical lightpath, over an ATM or optical transport network. However, those protocols are actual network signaling protocols, and thus are defined to be used for pre-designated purposes such as to set up a network route and/or to perform link setup and teardown. Additionally, these protocols are generally defined by one or more standard bodies to enable interaction between the network elements, and are not specifically designed to handle interactions between networks and applications. As new types of network resources continue to emerge on communication networks, the manner in which resource information is obtained and the manner in which resource utilization is obtained are important aspects to fulfilling application requests.
According to an embodiment of the invention, extensible resource messaging in a communication network is provided through the creation of a flexible, extensible and secure messaging environment between user applications and network elements. User applications are represented by resource clients that request information and/or the utilization of network resources. Network elements are represented by resource agents that manage and control access to and utilization of network resources. The messaging environment is flexible, according to one embodiment of the invention, because it may be implemented as an XML-based messaging mechanism. This mechanism contains a defined XML format that can provide flexible message contexts for resource requests and responses. Thus, applications can send XML messages to request network resource reservations and network discovery queries, and networks can send XML messages to respond to the application requests.
The messaging environment is extensible, according to one embodiment of the invention, because it can introduce network resource semantics in terms of XML schemas. With the semantics, network resources can be added or removed through updating XML schemas. Thus, applications can easily use new network resources or avoid outdated network resources.
The messaging environment is secure, according to one embodiment of the invention, because it may be built using secure transport technologies, including for example, the exchange of digital signatures and certificates to authenticate the participating applications and networks or network agents. Through secure transport, messages from applications and networks may be encrypted and decrypted. Through digital identifications and certificates, applications can verify whether the networks have provided trustable information, while networks can authorize and even account resource utilization according to applications' authentication.
The messaging environment may be implemented using a client-server computer architecture in which one or more messaging servers are implemented on the network to accept requests from applications and one or more messaging clients are created for resource applications requiring access to network resources. One or more resource agents may be associated with the messaging servers to realize network resource allocations on underlying networks or network domains. Optionally, one or more of the resource agents may also work with another resource agents to allow resource allocations and information to be. obtained from other networks, with resource optimization when possible.
Aspects of the present invention are pointed out with particularity in the claims. The following drawings disclose one or more embodiments for purposes of illustration only and are not intended to limit the scope of the invention. In the following drawings, like references indicate similar elements. For purposes of clarity, not every element may be labeled in every figure. In the figures:
The following detailed description sets forth numerous specific details to provide a thorough understanding of the invention. However, those skilled in the art will appreciate that the invention may be practiced without these specific details. In other instances, well-known methods, procedures, components, protocols, algorithms, and circuits have not been described in detail so as not to obscure the invention.
The messaging client and the messaging stub use the same message format for communications. The message format will be discussed in greater detail below, but according to one embodiment of the invention, the message format is configured to implement an extensible language such as eXtensible Markup Language (XML), to enable communications between the applications and communication network to be able to adapt with changes to the applications and changes to the network, without the creation of interdependence between these participants.
The messaging environment may include multiple messaging clients and multiple messaging stubs and the invention is not limited to an implementation of the messaging environment having any set number of clients and stubs. For example, multiple messaging stubs may be associated with a given network or network domain, or a given messaging stub may serve multiple network domains. Optionally, inter-domain exchanges may implement additional messaging environments 18′ such that the messaging stub of one messaging environment is able to participate through an associated messaging client 14′ to interface other messaging stubs 16′.
The communication network may include multiple network elements 20 connected together in a predefined or ad-hoc manner and configured to provide network services such as bandwidths over communication links to applications and network users. The invention is not limited to the particular manner in which the network elements are interconnected, the type of protocols they use to implement exchanges, route data through the network, or otherwise enable communications to take place. The invention is also not limited to the particular types of services the network elements are configured to provide on the network. For example, the communication links may be optical links, copper links, wireless links, or formed in other manners. The network elements may likewise be configured to provide optical transport services, wired data services, or wireless data services. The invention is thus not limited to use with a particular type of network element or to a particular network architecture.
One or more resource agents 22 on the network are configured to receive requests for network resources and fulfill the requests. One such resource agent is described in greater detail in a related U.S. patent application Ser. No. 10/719,225, filed Nov. 21, 2003, and entitled Method and Apparatus for Scheduling Resources on a Switched Underlay Network, the content of which is hereby incorporated by reference. As described in greater detail in that patent application, the resource agent is able to receive requests for resource allocations, interface with the network elements using native protocols in use on the network(s), and schedule resource allocations to fulfill the requests. Since the details of how resources may be obtained from a resource agent system are disclosed in greater detail in this related application, those details will not be described in greater detail herein. The messaging environment discussed in connection with embodiments of the invention herein may work with the referenced resource agent or other resource agents and the invention is not limited to an embodiment that is configured to work with the referenced resource agent.
The resource agent may be associated with a single network domain or may be associated with multiple network domains. Optionally, a messaging environment according to an embodiment of the invention may be established between resource agents of multiple domains to secure cross-domain (referred to herein as inter-domain) resource allocations. Similarly, multiple resource agents may be instantiated for the same domain to provide redundancy and to enable load sharing to take place across the several resource agents on the domain. Optionally, messaging environments may be established between these resource agents to enable allocations to be communicated between the several resource agents to maintain synchronization between the resource agents and to allow the resource agents to delegate resource requests to other resource agents with greater availability or capacity. To prevent the drawings from becoming too complicated, only one resource agent has been shown in each domain 12, 12′. The invention is not limited in this manner, however, as additional resource agents may be provided as well. Each resource agent may be associated with all network elements in the domain, with a subset of network elements in the domain, with particular types of network elements in the domain, or may be allocated network elements on another basis, depending on the desired topography of the network.
The messaging channel may be implemented using a Transport Control Protocol (TCP) stream socket, an Hyper Text Transfer Protocol (HTTP) session, or an enhanced XML communication such as Simple Object Access Protocol (SOAP), Data Web Transfer Protocol (DWTP) or another conventional protocol. Communications on the messaging channel may be secured using a secure communication protocol such as Transport Layer Security (TLS) or Secure Socket Layer (SSL), or a secure XML messaging protocol such as SOAP with XML signatures and encryption. Additionally, the messages may be configured to contain the identities of the applications and network agents, optionally digitally signed by the applications and agents or containing a certificate provided by the agents or applications, to ensure that the communications have not be altered during transmission. Other forms of security may be implemented as well and the invention is not limited to an embodiment that implements this particular security scheme. For example, the messaging channel between the messaging client and messaging stub may be established using a public key exchange protocol such as Internet Key Exchange version two (IKEv2) or an equivalent, although the invention is not limited in this manner as numerous. procedures may be used to exchange keys or otherwise allow the participants to authenticate the communication channel.
The resource agent, as discussed in greater detail in U.S. patent application Ser. No. 10/719,225, is configured to perform network topology discovery, consolidation, route creation, path allocation, and scheduling, as well as other functions, and to ascertain availability of network resources and effect reservation of those network resources. The resource agent may be extended with the messaging stub, according to one embodiment of this invention. The resource agent has access to network protocol interfaces 30 to allow it to communicate with network elements 20 using one or more network communications protocols when applicable. Examples of protocols that may be used with conventional networks include:
The resource agent can serve multiple resource requests from multiple resource applications at the same time. The resource agent returns inquiry results and reservation information as a resource response for each resource request. A resource agent can be implemented at a network management station, as a network service, or as a network process in the network control plane. The resource application can be an user end application, a middleware agent, a resource broker, or another resource agent. The invention is not limited to the type of resource agent or resource application chosen to exploit the messaging environment described herein.
The messaging stub 16 and resource agent 22 can be instantiated in many forms on the network. Optionally, the messaging stub and resource agent may be implemented as a stand-alone Web Service, or as a Web Services configured to interact with other Web Services, although the invention is not limited to this environment. For example, the messaging stub 16 may be a web service configured as a server to host sessions with messaging clients, and configured as a web service to interact with resource agents. In one embodiment, the messaging stub and resource agents are instantiated using the Globus Toolkit, such that components are configured with Open Grid Services Interface (OGSI) compliant application interfaces within the Open Grid Services Architecture (OGSA). The invention is not limited to this embodiment, however, as the messaging stub and resource agents may be instantiated in other ways on the network. The messaging stub 16 and resource agent 22 may be collocated on a network element on the communication network or may be instantiated on separate network elements and communicate using a proprietary or open forum protocol. The invention is not limited to the manner in which the messaging stub is instantiated on the network relative to the resource agent, although in a preferred embodiment the two components are tightly integrated to avoid security or other communication lapses between the two components. A given messaging stub 16 may thus serve one or more resource agents 22.
According to an embodiment of the invention, the messaging environment is configured to implement a flexible and secure messaging mechanism between user applications and network elements. The messaging environment, according to one embodiment of the invention, may be implemented as an XML-based messaging mechanism with XML-based resource semantics through which applications can send request messages for network resource reservations and network discovery queries, and through which networks send response messages back to the applications. By causing the message context to be defined by XML, a network resource can be represented by an XML element in the resource schema. As a result, adding new XML elements to the resource schema can easily allow new network resources and services to be made available to applications without requiring the applications to be modified to take advantage of the new resources or services. Similarly, removing old XML elements from the resource XML schemas can delete outdated network resources and services as the networks evolve and as services and resources are phased out.
The actual communication between user applications and network elements may include resource requests and responses. User applications send their resource requests in terms of resource request messages while network elements (through resource agents) send their resource feedback in terms of resource response messages. These messages are formatted and must be consistent with the resource XML schemas so that they can be understood by the two resource peers.
The resource agent, upon receipt of the XML message 38, parses the XML message 40 using the XML schema 36 to verify the definition of fields in the XML message to extract operable information from the resource request 42. The same procedure is followed to generate a resource response, as shown in
As discussed above, messages carried on the messaging channel 18 are defined by the resource XML schemas. Thus, adding or deleting XML elements in the XML schemas can add or delete network resources and services to affect the availability of those services on the network. This enables the messaging environment to be extensible to accommodate new resources and services without requiring applications to be modified to take advantage of the new services. Additionally, new types of resource messaging operations can also be added or deleted by XML schema updates. Thus, not only can the messaging change with time, but new types of messaging can be added simply by adding new schemas that may then be used by the applications to take advantage of the new messaging abilities. XML schema updates may be provided by the resource agent or a third party, and the invention is not limited to the particular manner in which the XML schema is updated.
A resource request may be used to obtain a network resource allocation, to obtain information about the network, and for other operations. A resource application may use a network resource allocation request to reserve a particular allocation of network resources and/or services, to modify or release a previous reservation, or for many other purposes. The resource application may use a network information query request to obtain general information about the network, to find out what resources and services are available to it, and to query a particular network resource or service that it wants to use. Correspondingly, a resource agent may return a resource response with a network resource allocation, information, query results, and other results.
As shown in
The request schema includes an allocation field which indicates the type of action to be performed, and may be used by a request if the request is intended to affect the allocation of network resources. For example, the allocation field may contain an allocate tag indicating that resources should be allocated to the client, a re-allocate tag indicating that resources should be allocated in a different manner, or a release tag indicating that allocated resources are not required and should be released. Other tags may be used as well and the invention is not limited to these particular tags.
In addition to the allocation tags, the allocation field may include resource specific allocation information indicative of the types of resources to be allocated/affected by the request. For example, the allocation information may include an identification of particular resources, the resource type, resource name or title, the action to be performed, the status of the application or resource to be affected, the start time of the requested allocation, the end time of the allocation, the bandwidth profile desired for the intended allocation, the type of traffic route desired for the allocation, and many other types of allocation specific information. The invention is not limited to the particular types of allocation information that may be provided using the allocation field.
The request schema also includes an information field that may be used to obtain information about the network resources from the resource agent. For example, the information field may include a discovery tag to enable the resource request to be used to discover available network resources, a refresh tag to enable the resource request to be used to update its list of available resources, and a query tag to enable the resource request to be used to query the availability or status of specific identified network resources. Since the query tag is directed to specific resources, the schema enables additional information to be included to allow specific resources to be identified. For example, the query information may include resource identification information, client information, or resource type information, although the invention is not limited to these particular types of query information.
The header field may enable information to be included to enable the XML message to be parsed, and may include items such as the schema version that was used to generate the response and the location of the schema, to enable the XML parser to correctly parse the XML response. The header field may also enable a response ID tag to be included to enable the response to be identifiable to the messaging client. For example, the response ID tag may allow response identification information to be included, such as the response serial number, the request serial number to which the response pertains, the agent identification information, and any required agent key information such as certificates or signatures to enable the response to be verified to the messaging client and/or application. Fields for other types of information may be included as well as desired.
The response schema includes an allocation field configured to contain allocation tags such as an allocate tag, a reallocate tag, and a release tag indicative of the particular resources to be allocated, reallocated, or released on the network. In addition, the schema may enable the allocation tags to specify additional information about the resources, such as the resource identification, the type of resource, the title of the resource if it has a common name, the action to be performed on the resource, the current status of the resource, the start and end times associated with the resource allocation, the bandwidth profile associated with the resources, and the traffic route profile. Tags for other information may be provided as well, and the invention is not limited to a schema including tags for these particular types of resource allocation information. For example, the schema may be developed to enable the allocation of particular VPN resources or to enable usage information, such as label information or required header information, to be passed using resource response messages in connection with the allocation information.
The response schema also includes an information field containing one or more tags which may be used to transmit network resource information to the resource client. For example, the information field may include a discover tag enabling a list of all resources to be provided, a refresh tag enabling a list of updated resources to be provided, and a query response enabling a list of resources to be provided in response to a particular resource query. The resources may be identified by resource ID, client ID, type, or in another manner, and the invention is not limited to the manner in which the schema is configured to identify the resources.
Once the messaging channel is established, such that the messaging stub is listening on the messaging channel, resource applications may make requests over the messaging channel for access to network resources or for information about the underlying networks (108). To do so, the application will generate a resource request (110) and invoke a messaging client (112). The resource request will be formatted into an XML message using the messaging client in a manner as discussed above in connection with
When the messaging stub receives the XML message (118) it will extract the resource request from the XML message using the procedure discussed above in connection with
Interfacing between domains may occur in many different ways. In one embodiment, the messaging stub is configured to interface with a particular resource agent, and may cause that resource agent to interface other resource agents as necessary. In another embodiment, the messaging stub is provided with direct access to multiple resource agents and may interface with these resource agents directly. The invention is not limited to the manner in which inter-domain resources are obtained.
Once the resources have been obtained, the resource responses from the resource agent(s) are processed to generate one or more resource responses, as discussed in greater detail above in connection with
The resource application, upon sending a resource request over the messaging channel, will listen on the messaging channel for a resource response message. Upon receipt of a resource response message, the resource application will extract the resource response using the process described above in connection with
As shown in
It should be understood that all functional statements made herein describing the functions to be performed by the methods of the invention may be performed by software programs implemented utilizing subroutines and other programming techniques known to those of ordinary skill in the art. Alternatively, the functions may be implemented in hardware, firmware, or a combination of hardware, software, and firmware. The invention is thus not limited to a particular implementation.
The control logic 72, 82, may be implemented as a set of program instructions that are stored in a computer readable memory within the network element and executed on a microprocessor, such as processor 70, 80. However, in this embodiment as with the previous embodiments, it will be apparent to a skilled artisan that all logic described herein can be embodied using discrete components, integrated circuitry, programmable logic used in conjunction with a programmable logic device such as a Field Programmable Gate Array (FPGA) or microprocessor, or any other device including any combination thereof. Programmable logic can be fixed temporarily or permanently in a tangible medium such as a read-only memory chip, a computer memory, a disk, or other storage medium. Programmable logic can also be fixed in a computer data signal embodied in a carrier wave, allowing the programmable logic to be transmitted over an interface such as a computer bus or communication network. All such embodiments are intended to fall within the scope of the present invention.
It should be understood that various changes and modifications of the embodiments shown in the drawings and described herein may be made within the spirit and scope of the present invention. Accordingly, it is intended that all matter contained in the above description and shown in the accompanying drawings be interpreted in an illustrative and not in a limiting sense. The invention is limited only as defined in the following claims and the equivalents thereto.
What is claimed is: