This application is a 35 U.S.C. §371 national stage application of PCT International Application No. PCT/EP2012/053763, filed on 5 Mar. 2012, the disclosure and content of which is incorporated by reference herein in its entirety. The above-referenced PCT International Application was published in the English language as International Publication No. WO 2013/131554 A1 on 12 Sep. 2013.
The present invention relates to a method for handling, by a ring node of a network having a ring topology, a data transfer of data packets, to the ring node of the network with the ring topology, to a central control entity controlling a topology change in the network with the ring topology and to a method for controlling a topology change by the central control entity.
Today's Mobile Backhaul (MBH) networks are usually structured into two parts, the High-RAN (Radio Access Network) and Low-RAN sections in order to provide connectivity and traffic aggregation for mobile packet data from the cell sites to the core network.
As can be seen from
A ring topology is a standard topology used in current transport network design. In this topology multiple transport nodes are interconnected to each other in the shape of a ring. As show in
Ring topologies are used with various transport technologies, by way of example optical transport networks (OTN) or electrical transport networks based on SDH (Synchronous Digital Hierarchy), ATM (Asynchronous Transfer Mode) or Ethernet standards.
Furthermore, a split router architecture is known, a concept which is currently being discussed and under development in various groups, for example in the Forwarding and Control Entity Separation (ForCes) Working Group in IETF (http://datatracker.ietf.org/wg/forces/), the group developing the OpenFlow Protocol, OpenFlow Switch Specification, Version 1.1.0, http://www.openflow.org/ or the recently created Open Network Foundation group, Open Network Foundation website, http://www.opennetworkfoundation.org/.
The split router architecture proposes to split a common router in two elements: a control element (CE) responsible for managing the routing protocol and the connectivity of the data plane. A control element controls the data plane connectivity through a forwarding element (FE). The forwarding element is responsible for forwarding traffic in the data plane and establishes connectivity to a neighbour node based on the instructions received from the control element.
The control element controls a set of at least one FE nodes forming a transport network. FE nodes are connected to each other by transport links between so-called internal ports. FE nodes are connected to nodes outside of the CE-controlled transport network (CE Domain) by so-called external ports. This is shown in further detail in
In
Ethernet is a widely used transport standard that specifies the physical transport layer and part of the data link layer, for example addressing. A ring topology using the Ethernet standard causes some complications. Ethernet and partly protocols above Ethernet provide automatic data path detection and selection. Those protocols must ensure that data are not sent in a loop. Various protocols are proposed to provide loop detection and loop prevention, for example the Spanning Tree Protocol, STP, and improved variants of this protocol like Rapid Spinning Tree Protocol, rSTP. These protocols provide a slow failure detection and failure handling in case a link breaks or a node fails. This failure detection and handling is in the order of seconds, this slow handling is not comparable with fail-over times achieved with the SDH (Synchronous Digital Hierarchy) technology where the failure detection handling is in the order of 50 milliseconds. A new procedure was developed in ITU-T to improve the fail-over time for Ethernet ring topology: the Ethernet ring protection switching, ITU-I G.8032/Y. 1344, Ethernet ring protection switching, http://www.itu.int/rec/T-REC-G.8032-201003-I.
This specification proposes the Ring Automatic Protection Switching (R-APS) protocol to manage the connectivity and node availability in the Ethernet ring. Further functionality defined in the ITU-T recommendation “OAM functions and mechanisms for Ethernet based networks”, ITU-T Y.1731, OAM functions and mechanisms for Ethernet based networks, http://www.itu.int/rec/T-REC-Y.1731-200802-I is used to monitor the availability of links immediately connected to a node.
While OAM (Operations Administration and Maintenance) functions are used in each node to monitor the availability of the directly connected links, the R-APS protocol is used to exchange this information between all nodes in the ring. Finally, each node receives an overview of the availability of links and nodes in the ring. In case of failure, independent decisions are taken in each node to find an alternative route for the traffic bypassing the failed link or node.
The concept of the Ethernet protocols used to prevent Ethernet loops is shown in
As a consequence, the traffic cannot take the shortest path in all cases. By way of example, traffic from ring node 110 to ring node 111 has to pass through 114, 113 and 112 as the direct connection to ring node 111 is disabled. The ring protection link impacts the overall transport capacity that can be achieved in the Ethernet ring topology.
Because it is not easy to overcome this situation, the approach in Ethernet based networks is to run each transport node independently from one another. Each node detects the network topology by means of specific topology detection protocols. Based on information gained, each node makes an independent decision based on a common decision model to decide on how to route traffic in a network. The final model shall ensure that the final data paths are always loop-free.
Another drawback is the number of transport labels needed in a MBH to cope also with failover cases. This is a problem for split MBH networks using the split router architecture mentioned above.
A typical deployment scenario is that transport paths (e.g. Multiprotocol Label Switching (MPLS) tunnels, or VLANs) are configured from any access leave of the L-RAN tree to the head-end interface towards the core network as shown in
The above problem does not only exist in MBH networks but also in other networks such as Metropolitan Area Networks, converged mobile aggregation networks, or Virtual Local Area Networks (VLAN).
Accordingly, a need exists to avoid problems with the size of networks in view of the range of possible labels. This need is met by the features of the independent claims. In the dependent claims further embodiments are described.
According to a first aspect of the invention a method for handling, by a ring node of a network having a ring topology, a data transfer of data packets through the network is provided via which the data packets are transmitted to their destination node, wherein each ring node has two neighbouring ring nodes. The ring node detects data packets of an incoming data transfer received from a non-ring node wherein the data packets should be transmitted through the ring network to their destination node. An indication of a ring direction is added to the data packets of the incoming data transfer, wherein the indication of the ring direction indicates in which direction the data packets of the data transfer are passed through the network having the ring topology. Furthermore, the data packets of the incoming data transfer are forwarded to one of the two neighbouring ring nodes based on the added indication.
By adding the indication, i.e. a direction information how the data packets should be transmitted through the ring network, the administration effort and the problem of the size of the mobile backhaul network is avoided.
The indication of the ring direction may indicate whether data packets of the incoming data transfer should pass the network with the ring topology in a clockwise or counter-clockwise direction. As two directions in a ring topology are possible, the indication indicates whether the data packets of a data transfer should be transferred, when entering the ring, in one direction or the opposite direction. The data packets are forwarded to the neighbouring ring node in accordance with the allocated indication.
Furthermore, the ring node may balance the load of its neighbouring ring nodes. When a plurality of incoming data transfers is detected by the ring node, a first one of the indications may be added to the data packets of one of the plurality of incoming data transfers, and the other one of the indications can then be added to the data packets of the data transfer directly following after said one incoming data transfer. This alternating distribution of data transfers can help to equilibrate the load of the different ring nodes.
Furthermore, it is possible that the ring nodes of the ring network remove the added indication when the data packets of a data transfers leave the ring topology. When data packets of one data transfer including the indication are received from a neighbouring ring node, it is possible to check, based on the destination information included in the data packets, whether the data packets of said one data transfer should be passed to the other neighbouring ring node or not. If the data packets should not be passed to the other neighbouring ring node, the added indication is removed and the data packets of said one data transfer are passed to a non-ring node or to another ring or, in other words, to a node outside the ring where the indication was added. In this embodiment the indication is removed at a ring node where a breakout from the ring transport occurs.
In case of a ring topology change the added indication may be used as follows: When it is detected by one of the ring nodes that it is not possible to pass the received data packets of the data transfer to its neighbouring ring node in accordance with the added indication due to a topology change in the network, e.g. due to a link failure between two ring nodes, said one ring node which detects that it cannot pass data packets to the neighbouring ring node replaces the indication of the received data packets of the data transfer by the opposite of the two indications.
Furthermore, it is possible, when an incoming data transfer is detected by one of the ring nodes, that a ring lifetime is added to the data packets of the incoming data transfer by said one ring node. This ring lifetime may depend on the number of ring nodes in the network. In a ring topology the risk exits that packets of a data transfer circulate within the ring forever when none of the links is closed for the circulation in the complete ring. The ring lifetime may be initially set by a central control entity which controls the network with the ring topology or by a network administrator. A receiving ring node may first check whether the ring lifetime has ended. If the lifetime has ended, the detecting ring node drops the packets. If the lifetime has not ended, the detecting ring node may decrement the ring lifetime. If it is detected by one receiving ring node that the ring lifetime has ended, the data packets of the data transfer are dropped by the ring node that detects that the lifetime has ended. It is possible not to decrement the lifetime at ring entry and at ring breakout. However, it is also possible to decrement the lifetime at ring entry and ring breakout depending on how the ring lifetime is defined. By setting the ring lifetime, e.g. a TTL parameter (Time to Live), to the number of ring nodes in the ring and by decrementing the lifetime by one time unit at every hop to the next neighbouring ring node and by dropping the data packets of a data transfer at the end of the lifetime, it can be avoided that data packets circulate in the ring over a longer period of time.
It is furthermore possible that, when a topology change is detected by one of the ring nodes, said ring node transmits the information about the topology change to the central control entity. As the detecting ring node may change the added indication for incoming packets that cannot be transferred to the neighbouring ring node, a fast reaction of the ring node is assured. At the same time, when the central control entity receives the information about the topology change, the central control entity can react to the detected topology change and may determine a new ring topology.
Furthermore, it is possible that the connections to the neighbouring ring nodes are established in accordance with the configuration instructions received from the control entity controlling the ring nodes.
The indication of the ring direction may be a MPLS label. In another embodiment the indication is a VLAN identity. When applying the invention to MPLS labels, the number of labels corresponds to the number L-RAN leaves +2. This means that two labels are used in the ring. Furthermore, as the two ring labels or ring indications may be reused every ring, problems with the size of the mobile backhaul network are avoided.
The invention furthermore relates to the ring node of the network with the ring topology, the ring node comprising a non-ring port where data packets of an incoming data transfer received from a non-ring node and to be transmitted through the ring network to the destination are detected. Furthermore, a processing unit is provided configured to add an indication of a ring direction to the data packets of the incoming data transfer. The processing unit can further be configured to direct the data packets of the incoming data transfer to a ring port where the data packets of the incoming data transfer are forwarded to one of the neighbouring ring nodes based on the added indication.
The ring node may operate as discussed above in more detail.
The invention furthermore relates to a central control entity configured to control a topology change in a network having the ring topology. The central control entity contains a receiver configured to receive information about a topology change of the ring topology of the network from one of the ring nodes. The central control entity furthermore contains a database containing, for each of the ring nodes, information about possible connections of each ring node to other ring nodes of the network and about a status of the possible connections. Furthermore, a control unit is provided configured to determine which of the data transfers are affected by a topology change and configured to determine, for each of the affected data transfers, a new path through the network. Furthermore, the control unit may determine new switching instructions for ring nodes that are affected by the new path determined for the affected data transfers. The central control entity furthermore contains a transmitter transmitting the new switching instructions to the affected ring nodes. Furthermore, the control unit determines the number of ring nodes in the network and generates the ring lifetime that corresponds to the number or ring nodes. The transmitter can then transmit the ring lifetime to the ring nodes. At the ring nodes the ring lifetime can be added to the data packets of the data transfers. As mentioned above, the added ring lifetime can help to avoid the circulation of packets in the ring for a longer period of time.
The invention furthermore relates to a method for controlling the topology change by the central control entity.
The invention will be described in further detail with reference to the accompanying drawings, in which
In the following it will be explained how an indication of a ring direction added as a new label helps to control the signal path in a network having a ring topology. In the following the indication is also called ring label. This ring label is pushed in front of the received packet when the packet enters the ring. However, it should be understood that the ring label may also be added to the data packet at a different position. There are two different ring labels used within the ring, one for transporting packets clockwise around the ring and the other one for the counter-clockwise transport. In
Within the ring the following mechanisms are applied: First of all, a ring label is added. There are two labels, one for each direction, clockwise (CW) and anti-clockwise or counter clockwise (CCW).
Furthermore, as will be explained in further detail below, a packet within the ring label is sent round the ring until the time to live (TTL) expires. Furthermore, a breakout from the ring transport is checked at each hop.
In the following the steps 1-5 shown in
In another embodiment the port could be an external port if the domain controlled by CE 200 only covers the ring. In this case the packet entering the ring does not carry a transport label.
In a second step forwarding element 13 sees an incoming packet on an internal non-ring port. Forwarding element 13 adds an indication of the ring direction 72, or ring label, either CW for clockwise or CCW for counter clockwise, and forwards it on the ring according to the allocated ring label. Furthermore, when different incoming data transfers are detected by forwarding element 13, the added ring labels may be added in an alternating way, e.g. for one data transfer the CW may be added whereas for the next data transfer the CCW label may be added and for the second next packet again the CW label may be added for implementing a load sharing scheme. Also other load sharing schemes are possible.
This ring label, shown by reference numeral 72 in
At step 3 forwarding element 14 sees an incoming packet on the ring with the CW ring label. Forwarding element 14 checks the tunnel label underneath the ring label whether to breakout from the ring transport. In the embodiment shown the breakout should occur at forwarding element 11 so that no breakout happens in forwarding element 14.
In step 4 the forwarding element 11 acts in the same way as forwarding element 14, but here breakout has to be done. As can be seen from
In connection with
In step 3 now forwarding element 14 detects an incoming packet on the ring node with the CW ring label 72. Forwarding element 14 checks the tunnel label underneath the ring label whether to breakout from the ring transport. As in
But forwarding element 14 detects that the next hop in the ring is not reachable. As a consequence, in step 3 the forwarding element 14 swaps the ring label 72 from clockwise to counter-clockwise, i.e. ring label 73. The forwarding element 14 routes the packet according to the new label 73.
In the rest of the ring the handling is unchanged, so in steps 4 and 5 the packet is transported as it was the case in step 3 of
As can be seen from the above, this mechanism allows a fast reaction on failures in the ring, without affecting the other nodes in the ring. The swap of the ring label is based on a local detection of a link or a neighbouring node failure and is therefore very fast. When a forwarding element then detects a link or a neighbour node failure, it reports this to the central control entity 200 as shown in
In
It should be understood that the central control entity 200 and the ring node 11 shown in
Referring back to
Each transport label bears its own TTL parameter. So there is a TTL value received with the transport label for the destination in the mobile backhaul. This TTL parameter is indicated in the label 71. As shown in
When the TTL reaches zero or reaches the end of the lifetime, the packet is dropped. This prevents packets from going around for a too long time. At maximum there is one round trip. A packet that has not caused any breakout within one round trip would otherwise never stop going round.
In
As shown in
For supervising neighbouring ring nodes or links a forwarding element can use one of the following technologies: It is possible to use bidirectional forwarding detection (BFD), RFC 5580. Furthermore, it is possible to use OSPF (Open Shortest Path First) Hello on Ethernet. Additionally, connectivity fault management (CFM), IEEE 802.1ag may be used. Furthermore, fault management and performance monitoring according to ITU/TY.1731 may be used or Ethernet in the First Mile (EFM), IEEE 802.3ah.
As can be seen from the above discussion, the present invention allows a full utilization of the entire ring and there is no need to take out a certain link or segment to avoid the routing of loops. In case of a link failure a fast healing is possible based on a local decision in a forwarding element. Furthermore, an optimum adaptation of the traffic to the new situation after the failure is assured.
Furthermore, the full range of MPLS transport labels can be used for a MBH network design. Moreover, additional protection by specific TTL handling is obtained in order to avoid the going around within the ring forever. The invention furthermore helps to reduce the number of labels needed in the domain of the central entity. In addition, there is no need for a duplicated set of transport labels for failover and the ring labels can be reused in other rings for the same domain controlled by the central control entity if the rings are independent.
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/EP2012/053763 | 3/5/2012 | WO | 00 | 8/27/2014 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO2013/131554 | 9/12/2013 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
5490139 | Baker | Feb 1996 | A |
5699356 | Beever | Dec 1997 | A |
6122250 | Taniguchi | Sep 2000 | A |
6154462 | Coden | Nov 2000 | A |
6584535 | Ouellet | Jun 2003 | B1 |
6594232 | Dupont | Jul 2003 | B1 |
6639896 | Goode | Oct 2003 | B1 |
6680912 | Kalman | Jan 2004 | B1 |
6711125 | Walrand | Mar 2004 | B1 |
6785285 | Romana | Aug 2004 | B1 |
7212490 | Kao | May 2007 | B1 |
7545735 | Shabtay | Jun 2009 | B1 |
20010003833 | Tomizawa | Jun 2001 | A1 |
20010015979 | Hata | Aug 2001 | A1 |
20020024931 | Chikazawa | Feb 2002 | A1 |
20030012131 | Venema | Jan 2003 | A1 |
20030058790 | Nagamine | Mar 2003 | A1 |
20030108029 | Behzadi | Jun 2003 | A1 |
20030117946 | Fontana | Jun 2003 | A1 |
20040160904 | Enomoto | Aug 2004 | A1 |
20040252688 | May | Dec 2004 | A1 |
20050135804 | Rashid | Jun 2005 | A1 |
20050243845 | Higashitaniguchi | Nov 2005 | A1 |
20050271035 | Cohen | Dec 2005 | A1 |
20060109802 | Zelig | May 2006 | A1 |
20070206618 | Zelig | Sep 2007 | A1 |
20070237072 | Scholl | Oct 2007 | A1 |
20070268821 | Levit | Nov 2007 | A1 |
20080080367 | Fujii | Apr 2008 | A1 |
20080170657 | Peeters | Jul 2008 | A1 |
20080259920 | Cheng | Oct 2008 | A1 |
20080285442 | Bruckman | Nov 2008 | A1 |
20090016384 | Cheng | Jan 2009 | A1 |
20090201806 | Ding | Aug 2009 | A1 |
20090207727 | Zeng | Aug 2009 | A1 |
20100110881 | Ryoo | May 2010 | A1 |
20100195649 | Miyata | Aug 2010 | A1 |
20100214909 | Ceccarelli | Aug 2010 | A1 |
20100226244 | Mizutani | Sep 2010 | A1 |
20100238813 | Allan | Sep 2010 | A1 |
20100246387 | Krishnan | Sep 2010 | A1 |
20100260196 | Holness | Oct 2010 | A1 |
20100278040 | He | Nov 2010 | A1 |
20100287405 | Soon | Nov 2010 | A1 |
20110007628 | Tochio | Jan 2011 | A1 |
20110058560 | Okita | Mar 2011 | A1 |
20110170406 | Krishnaswamy | Jul 2011 | A1 |
20120140679 | Inaba | Jun 2012 | A1 |
Number | Date | Country |
---|---|---|
1 528 731 | May 2005 | EP |
1 672 851 | Jun 2006 | EP |
1 780 960 | May 2007 | EP |
Entry |
---|
International Search Report for International Application No. PCT/EP2012/053763 mailed Jun. 15, 2012, 5 pages. |
Written Opinion of the International Searching Authority for International Application No. PCT/EP2012/053763 mailed Jun. 15, 2012, 11 pages. |
Yang et al: “Forwarding and Control Element Separation (ForCES) Framework; rfc3746.txt” Apr. 1, 2004, XP015009526, ISSN: 0000-0003; http://www.rfc-editor.org/rfc/pdfrfc/rfc3746.txt.pdf. |
ITU-T G.8032/Y.1344 (Mar. 2010) “Ethernet ring protection switching”, Telecommunication Standardization Sector of ITU; Series G: Transmission Systems and Media, Digital Systems and Networks; Series Y: Global Information Infrastructure, Internet Protocol Aspects and Next-Generation Networks; Recommendation ITU-T G.8032/Y.1344; Switzerland, Geneva, 2010; http://www.itu.int/rec/T-REC-G.8032-201003-I. |
ITU-T Y.1731 (Feb. 2008) “OAM functions and mechanisms for Ethernet based networks”, Telecommunication Standardization Sector of ITU; Series Y: Global Information Infrastructure, Internet Protocol Aspects and Next-Generation Networks; Recommendation ITU-T Y.1731; Switzerland, Geneva, 2009; http://www.itu.int/rec/T-REC-Y.1731-200802-I. |
“OpenFlow Switch Specification” Version 1.1.0 Implemented (Wire Protocol 0×02) Feb. 28, 2011; 56 pages; http://archive.openflow.org/documents/openflow-spec-v1.1.0.pdf. |
D. Katz et al.: “Bidirectional Forwarding Detection (BFD)” rfc 5880.txt; Standards Track; Jun. 2010; ISSN: 2070-1721; 49 pages; http://tools.ietf.org/pdf/rfc5880.pdf. |
IEEE Std 802.1ag™-2007: IEEE Standard for Local and metropolitan area networks—Virtual Bridged Local Area Networks; Amendment 5: Connectivity Fault Management; Sponsored by the LAN/MAN Standards Committee; New York, NY; Dec. 17, 2007. |
IEEE Std 802.3ah™-2004: IEEE Standard for Information technology—Telecommunications and information exchange between systems—Local and metropolitan area networks—Specific requirements; Part 3: Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Access Method and Physical Layer Specifications; Amendment : Media Access Control Parameters, Physical Layers, and Management Parameters for Subscriber Access Networks; Sponsored by the LAN/MAN Standards Committee; New York, NY; Sep. 7, 2004. |
Number | Date | Country | |
---|---|---|---|
20150103830 A1 | Apr 2015 | US |