The present application relates generally to protection switching and, more specifically, to facilitating automatic protection switching for a Provider Backbone network.
Provider Backbone Transport (PBT) offers a mechanism to permit scalable point-to-point tunnels to be configured or signaled in an Ethernet subnetwork. Advantageously, PBT provides a set of enhancements to Ethernet technology that allow use of Ethernet in a carrier class transport network. PBT uses concepts of Virtual Local Area Network (VLAN) tagging as provided in the Institute for Electrical and Electronics Engineers (IEEE) standard 802.1Q, stacked VLANs as provided in the IEEE standard 802.1ad and Provider Backbone Bridges as provided in IEEE 802.1ah. Additionally, PBT does without known Ethernet aspects such as flooding or broadcasting and the spanning tree protocol. Beneficially, the set of Ethernet standards is enhanced for use in connection-oriented networks.
A bridge operating according to PBT, forwards a given frame based on an outer VLAN ID (VID) and a Media Access Control Destination Address (i.e., a MAC DA) as identified in a header of the given frame. The aspect of Ethernet known as MAC learning is disabled in bridges operating according to PBT so that the forwarding of a received frame is based on a Filter Database (FDB) that is configured via a management plane or a control plane.
Path protection is provided by using one “working”, or “primary”, path and one “protection”, or “secondary”, path between a pair of end point bridges. There may be zero or more transit bridges in between the end point bridges. For each traffic direction, one VID is associated with the primary path and a distinct VID is associated with the secondary path. The primary path VID is included in the header of each Ethernet frame that is to be transmitted between the end point bridges over the primary path. Similarly, the secondary path VID is included in the header of each Ethernet frame that is to be transmitted between the end point bridges over the secondary path. According to the IEEE standard 802.1ag, continuity check messages (CCMs) are periodically transmitted between the end point bridges over both the primary and secondary paths. These CCMs help detect failures along the paths. When one end point bridge stops receiving CCMs from the other end point bridge along one of the two paths for a given period of time then that path is deemed failed. When a primary path fails and this path was currently active, i.e., carrying all Ethernet traffic, then the end point bridge that detects the failure negotiates a protection switch with the other end point bridge. When such negotiation succeeds, then both bridges start transmitting all Ethernet traffic along the secondary path, i.e., the secondary path becomes the active path.
An existing protection switching mechanism is enhanced through an extension to the automatic protection switching protocol data unit (APS PDU). Alternatively, an existing protection switching mechanism is enhanced by encapsulating the existing APS PDU with an I-SID that permits the receiving end point bridge to differentiate such an encapsulated APS PDU from data frames belonging to customer flows being transported. In conjunction with transmitting Ethernet frames over the primary path or the secondary path, the end point bridges also exchange APS PDUs over the secondary path. The APS PDUs provide the receiving end point bridge with protection switching status present at the transmitting end point bridge. This information enables the end point bridges to make a symmetric decision as to whether all customer flow traffic should be transported over the primary path or the secondary path in both directions.
According to an aspect of the present invention, there is provided, at a first bridge at a first end point of a trunk, a method of facilitating protection switching. The method includes composing an automatic protection switching protocol data unit (APS PDU), the APS PDU including an indication of an identity for the trunk and transmitting the APS PDU to a second bridge at a second end point of the trunk over a secondary path to the second bridge. In other aspects of the present application, a first bridge at a first end point of a trunk is provided for carrying out this method and a computer readable medium is provided for adapting a processor in a first bridge at a first end point of a trunk to carry out this method.
According to another aspect of the present invention, there is provided, at a first bridge at a first end point of a trunk, the trunk having a primary path and a secondary path to a second bridge at a second end point of the trunk, a method of facilitating protection switching. The method includes composing an automatic protection switching protocol data unit (APS PDU), the APS PDU including an indication of the primary path and transmitting the APS PDU to the second bridge over the secondary path.
According to a further aspect of the present invention, there is provided, at a first bridge at a first end point of a trunk, a method of facilitating protection switching. The method includes composing an automatic protection switching protocol data unit (APS PDU), encapsulating the APS PDU with a Service Instance Tag, thereby creating an encapsulated APS PDU, where the Service Instance Tag includes an indication of an identity for the trunk and transmitting the encapsulated APS PDU to a second bridge at a second end point of the trunk over a secondary path to the second bridge.
According to a still further aspect of the present invention, there is provided, at a first bridge at a first end point of a trunk, the trunk having a primary path and a secondary path to a second bridge at a second end point of the trunk, a method of facilitating protection switching. The method includes composing an automatic protection switching protocol data unit (APS PDU), encapsulating the APS PDU with a Service Instance Tag, thereby creating an encapsulated APS PDU, where the Service Instance Tag includes an indication of an identity for the primary path and transmitting the encapsulated APS PDU to a second bridge at a second end point of the trunk over a secondary path to the second bridge.
Other aspects and features of the present invention will become apparent to those ordinarily skilled in the art upon review of the following description of specific embodiments of the invention in conjunction with the accompanying figures.
Reference will now be made to the drawings, which show by way of example, embodiments of the invention, and in which:
The end points 102X, 104A, 104B, 106A, 106B and 108X, indeed all the end points used in networks described herein, are expected to physically or virtually have components typical in such networks. That is, a generic bridge comprising end points 102X, 104A, 104B or 106A, 106B, 108X has at least one input port, at least one output port, a processor for directing traffic between the input and the output ports and a memory for storing instructions and data used by the processor in operation. The instructions may be loaded on the memory from a disk, a tape, a chip or a random access memory containing a file downloaded from a remote source.
Similarly,
The telecommunication standardization sector of the International Telecommunications Union (ITU) has published Recommendation G.8031/Y.1342, which specifies linear protection switching mechanisms to be applied to VLAN-based Ethernet networks as described in ITU-T Recommendation G.8010/Y.1306. Protection switching is a fully allocated survivability mechanism. It is fully allocated in the sense that the route and bandwidth of the protection entity is reserved for a selected working entity. Protection switching provides a fast and simple survivability mechanism. It is easier for the network operator to grasp the status of the network (e.g., active network topology) with a protection switching mechanism than with other survivability mechanisms such as the known Rapid Spanning Tree Protocol.
ITU-T Recommendation Y.1731 provides definitions for each Protocol Data Unit (PDU) that may be employed for Ethernet Operation, Administration, and Maintenance (OAM), thereby providing a suite of Ethernet OAM PDUs. In a network employing protection switching, OAM PDUs are sent along the secondary path. For instance, in
Among the PDUs in the Ethernet OAM suite of PDUs is a PDU specific to Automatic Protection Switching (APS) 200 (see
The APS PDU, which may also be called an “EthAPS frame”, is identified by a specific Ethernet OAM OpCode (0x39). APS-specific information is carried in the APS PDU 200 in the APS information field 212, which, as illustrated in
For other fields, such as the Version field 202, the Flags field 208 and the END TLV field 214, the following values shall be used, as defined in ITU-T Recommendation Y.1731: Version, 0x00; Flags, 0x00; and END TLV, 0x00.
An example format of the APS-specific information in the APS information field 212 of each APS PDU 200 is illustrated in
Where
The format for APS PDUs described above provides no mechanism to identify a 1:1 protected trunk. That is, in the case of the network 400 of
In overview, the frame format for APS PDUs may be extended so that the frames carry the identity of a 1:1 protected trunk.
In particular, in one embodiment, APS PDUs are configured to carry the identity of the 1:1 protected trunk (trunk X or trunk Y) for easy correlation of APS PDUs to trunks.
An extended APS PDU 500 is illustrated in
The WorkingID TLV field 516 may, for instance, carry enough information to identify the trunk to which the extended APS PDU 500 relates.
Steps of an example method of facilitating protection switching in the network 400 of
As part of composing the extended APS PDU, the trunk end point sets the WorkingID TLV of the extended APS PDU to identify the trunk. The trunk end point then transmits (step 606) the extended APS PDU to the far end trunk end point over the trunk's secondary path. The trunk identifier that is set in the WorkingID TLV could be some user configured 32-bit identifier for the trunk. Note that such trunk identifiers would have to be the same on both ends of the trunk.
While identifying the trunk in the extended APS PDU may be suitable in the 1:1 protection case, it has been contemplated that identifying the trunk is insufficient in the 1:N protection case 1:N protection may be implemented in more than one configuration. For example, in a network 700 illustrated in
In particular,
Reviewing the suitability of the identification of trunks, in the WorkingID TLV field 516 of the APS PDU as proposed above, in view of the network 700 of
Consider
Reviewing the suitability of the identification of trunks, in the WorkingID TLV field 516 of the APS PDU as proposed above, in view of the network 800 of
In an alternative embodiment, the contents of the WorkingID TLV field 516 identify the primary path. For example, consider the receipt, by the second trunk X end point 808X from the second path B end point 806B, of an APS PDU that identifies path A1 in the WorkingID TLV field 516. The received APS PDU may, for example, include the code 1011 in the request/state field 302 indicating a Signal Failure. Since the contents of the WorkingID TLV field 516 identifies path A1, it is clear to the second trunk X end point 808X that path A1 traffic is to be switched to path B.
For PBT, a particular primary path may be identified using a combination of Backbone Media Access Control Destination Address (B-MAC DA) and Backbone VLAN ID (B-VID). Since B-MAC DA for all paths A1 to AN and B is the same, then identification for these paths must differ in the B-VID and, thus, B-VID is a good choice for path identifier within WorkingID TLV.
In a distinct approach, rather than extending the APS PDU as illustrated in
A format for an I-TAG 900 is illustrated in
Steps of an example method of facilitating protection switching in the network 400 of
In view of future requirements for 1:N protection switching, rather than identifying a trunk by way of a special I-SID, a primary path may be identified by way of a special I-SID. For example, the first trunk X end point 802X of
In another embodiment, when a trunk end point encapsulates the APS PDU (step 1004), the trunk end point sets the I-TAG to include a combination of a real service I-SID in the I-SID field 910, a special MAC DA in the MAC DA field 912 and a special MAC SA in the MAC SA field 914. The real service I-SID, the special MAC DA and the special MAC SA combine to distinctly identify, in one embodiment, the trunk X. Alternatively, in another embodiment, the real service I-SID, the special MAC DA and the special MAC SA combine to distinctly identify the primary path for trunk X.
Note that the difference between the real service I-SID and a special I-SID is that a special I-SID, once configured for protection switching purposes for a particular trunk, cannot then be used for transport of a real customer flow traffic. That is, the special I-SID can solely be used to identify APS PDUs. In contrast, when a real service I-SID is used, then a special MAC DA and SA need to be used to differentiate trunk level APS PDUs from service level APS PDUs.
The above-described embodiments of the present application are intended to be examples only. Alterations, modifications and variations may be effected to the particular embodiments by those skilled in the art without departing from the scope of the application, which is defined by the claims appended hereto.
The present application claims priority to U.S. Provisional Patent Application Ser. No. 60/917,124, filed May 10, 2007, the contents of which are hereby incorporated herein by reference.
Number | Date | Country | |
---|---|---|---|
60917124 | May 2007 | US |