Not Applicable.
The present invention relates to management of traffic forwarding in packet networks, and in particular to in-band signalling for point-point packet protection switching.
Network operators and carriers are deploying packet-switched communications networks in place of circuit-switched networks. In packet-switched networks such as Internet Protocol (IP) networks, IP packets are routed according to routing state stored at each IP router in the network. Similarly, in Ethernet networks, Ethernet frames are forwarded according to forwarding state stored at each Ethernet switch in the network. The present invention applies to communications networks employing any Protocol Data Unit (PDU) based network and in this document, the terms “packet” and “packet-switched network”, “routing”, “frame” and “frame-based network”, “forwarding” and cognate terms are intended to cover any PDUs, communications networks using PDUs and the selective transmission of PDUs from network node to network node.
In Ethernet networks, Provider Backbone Transport (PBT), also known as Provider Backbone Bridging-Traffic Engineering (PBB-TE), as described in Applicant's British patent number GB 2422508 is used to provide a unicast (i.e. point-to-point—p2p) Ethernet transport technology. Provider Link State Bridging (PLSB) as described in Applicant's co-pending U.S. patent application Ser. No. 11/537,775 can be used to provide a transport capability for Ethernet networks using IS-IS to set up unicast paths in the network. Both above patent documents are hereby incorporated by reference.
Provider Link State Bridging (PLSB) typically uses protocols such as Intermediate System—Intermediate System (IS-IS) or Open Shortest Path First (OSPF) to exchange topology, addressing and service information to enable the calculation of paths for forwarding packets from any given source node to one or more destination nodes, and to install the forwarding state required to implement those paths. OSPF and IS-IS are run in a distributed manner across nodes of the network so that each node will locally compute paths based on the view of network topology shared by the routing system.
As is known in the art, IS-IS and OSPF are “routing” protocols, in which “Dijkstra” or similar algorithms are used to compute shortest paths between any two nodes in the network. Once computed, these shortest paths can then be used to derive unicast paths, and to determine the forwarding state that must be installed in each node in order to implemented the derived paths. Techniques such as Reverse Path Forwarding Check (RPFC) can be used to mitigate the effect of any loops that may form transiently during periods when multiple distributed peer nodes independently compute paths and install the forwarding state.
For example, a packet to be sent from the west Client Edge (CE-1) 4 to the East Customer Edge (CE-2) 6 is encapsulated with the Source Address (C-SA) of the West Customer Edge 4, the Destination Address (C-DA) of the East Customer Edge 6, and the Service Instance identifier (I-SID) assigned by the network, and sent to the Customer Backbone Port (CBP) 14 of the West Bridge 10, which hosts the West Customer Edge (CE-1) 4. Within the West Bridge 10, the packet is encapsulated with the backbone Source Address (B-SA) of the West Bridge 10, the backbone Destination Address (B-DA) of the East bridge 12, and a Backbone VLAN Identifier (B-VID) assigned to the active TESI for East-bound traffic. Thus encapsulated, the packet can then be conveyed through the active TESI to the East Bridge 12, which strips the B-DA, B-SA, and B-VID information, and forwards the de-capsulated packet to the East Customer Edge (CE-2) 6 via the Customer Backbone Port (CBP) 16 which hosts the East customer edge (CE-2) 6.
In the illustration of
In the East bridge 12, a traffic merging function accepts packets received through either of the two TESIs 8, and routes them to the Customer Backbone Port (CBP) 16 which hosts the East Customer Edge (CE-2) 6. As a result, a protection switching function does not need to be implemented in the East bridge 12 for proper forwarding of east-bound traffic.
An arrangement in which a single working path is protected by a single back-up (or protection) path, as shown in
A limitation of IEEE 802.1 Qay is that it relies on out-of-band signalling, such as a network operator's Data Communications Network (DCN) for the coordination of network operator requested protection switching operations. In this respect, the term out-of-band refers to signalling that does not traverse the same path as the subscriber traffic. However, the use of out-of-band signalling for the coordination of operator requested protection switching increases the complexity of network management functions, and means that a mismatch between the protection mode and the state of one or more involved switches may be undetectable. In addition, IEEE 802.1 Qay only provides a 1:1 protection scheme. In some cases, it may be desirable to provide more complicated M:N protections schemes, wherein M is the number of protection (back-up) paths, and N is the number of working paths.
An automatic protection switching scheme for Ethernet VLAN networks is described in the ITU-T G.8031 standard. This technique utilizes an Automated Protection Switching Protocol Data Unit (APS PDU) for in-band signalling of protection state information. However, this technique is not readily applicable to the problem of protection switching of point-to-point connections (i.e., TESIs) in PBB-TE network domains. Furthermore, G.8031 does not support generalized M:N protection schemes with multiple or shared protection paths.
Techniques which overcome at least some of the above-noted issues remain highly desirable.
Thus, an aspect of the present invention provides a method of controlling traffic forwarding in a Provider Backbone-Traffic Engineered (PBB-TE) network. A protection group (PG) is defined, and including N working Traffic Engineered Service Instances (TESIs) and M protection TESIs. An Automatic Protection Switching Protocol Data Unit (APS PDU) is defined, which includes information defining at least a state of the protection group. This APS PDU is forwarded only through the protection TESI(s).
Further features and advantages of the present invention will become apparent from the following detailed description, taken in combination with the appended drawings, in which:
a-3d are tables showing representative values of APS specific fields of the APS PDU of
It will be noted that throughout the appended drawings, like features are identified by like reference numerals.
Embodiments of the invention are described below, by way of example only, with reference to
In very general terms, the present invention provides a method of controlling traffic forwarding in a Provider Backbone-Traffic Engineered (PBB-TE) network. A protection group (PG) is defined, and including N working Traffic Engineered Service Instances (TESIs) and M protection TESIs. An Automatic Protection Switching Protocol Data Unit (APS PDU) is defined, which includes information defining at least a state of the protection group. This APS PDU is forwarded only through the protection TESI(s).
Preferably, the present invention supports a generalized M:N protection scheme, in which N≧1 and M≧1. In the reduced case of N=1 and M=1, the protection scheme can be revertive or non-revertive, as desired. In a revertive protection scheme, traffic switched to the protection TESI in response to a Signal Failure (SF) or Forced Switch (FS) affecting the working TESI, is switched back to the working TESI following recovery from the failure (or removal of the FS). In a non-revertive protection scheme, the protection TESI to which traffic is switched in response to either a Signal Failure (SF) or Forced Switch (FS) is subsequently re-designated as a working TESI of the protection group.
Preferably, protection schemes in which either or both of N and M are greater than one are revertive.
Referring to
The APS block 22 is used to define the protection scheme and control protection switching behaviour of the protection group. In the embodiment of
In some embodiments, when the working TESI is operating normally, the APS PDU is only sent through the protection TESI(s). This has the advantage of minimizing overhead traffic in the working TESI under normal operating conditions of the protection group. As may be appreciated, besides the use of CFM CCMs, continuity checks of a protection TEST can be performed by sending a “No-Request/Null/Null” APS PDU through the protection TESI at regular intervals. Referring to
As noted above, the field value assignments shown in
The specific TESIs within a protection group, and their respective roles (i.e. “working” or “protection”) within the protection group, are determined at the time the protection group is set up. As a result, the specific protection scheme being implemented with the protection group is also known in advance. Accordingly, in some embodiments, the use of M:1 and 1:N bits 38,40 of the Flags field 36 (as shown in
In some embodiments in which the number of protection TESIs M≧2, the protection TESIs may be arranged in a hierarchy, so that the protection switching function will switch traffic to each of the protection TESIs in a predetermined order. This operation may be accomplished using the protection sequence bits 42 of the Flags field 36. Thus, for example, a preferred protection TESI can be designated by setting the protection sequence bits to a value of “0” in APS PDUs sent through that protection TESI. A second (less preferred) protection TESI can be designated by setting the protection sequence bits to a value of “1” in APS PDUs sent through that protection TESI. Each of the other protection TESI's within the protection group can be similarly designated with a respective protection sequence number, in accordance with their position in the hierarchy. With this arrangement, the protection switching function will operate to switch traffic from the working TESI to each of the protection TESIs following the order of preference as defined by the protection sequence numbers. Thus, for example, traffic from the working TESI will be protection switched to a lower ranking protection TESI only if higher ranking protection TESI's are unable to accept the traffic.
In most cases, traffic can be successfully protection switched to a protection TESI if there is sufficient available capacity in that protection TESI.
In some embodiments, pre-emption rules may be defined to control the conditions under which traffic can be protection switched into a given protection TESI. This arrangement is useful in that it enables the protection TESIs to carry subscriber traffic during normal operations of the network, while still supporting effective protection of the working TESI.
In some embodiments, the pre-emption rules may be based on the customer-level service instance. Thus, for example, when a service instance is established, a desired Quality of Service (QoS) level can be selected and assigned to that service. If packets of that service must subsequently be protection switched to a protection TESI, the Customer Backbone Port can use the customer service instance identifier (I-SID) to control the protection switching behaviour. For example, working TESI traffic of a given QoS level may pre-empt protection TESI traffic having a lower QoS level.
In some embodiments, the pre-emption rules may be based on a priority of the protection switch request. For example, in
Alternatively, consider a scenario in which a protection TESI is carrying traffic that has been switched from a working TESI due to a manual switch on that working TESI, In this case, the APS PDUs of the involved protection TESI will have a Request/State field value of “0111”. If a service failure affecting another working TESI occurs, an APS PDU with a Request/State field value of “1011” will be sent to the Customer Backbone Port to trigger the protection switch to the protection TESI. This protection switch request will be successful, and traffic within the protection TESI pre-empted as required, because the priority level of the received APS PDU is higher than that of the traffic already in the protection TESI. Conversely, if an exercise switch is requested (Request/State field value of “0100”), the request will be refused, because the priority level of the request APS PDU is lower than that of the traffic already in the protection TESI.
In some embodiments in which the number of working TESIs N≧2, a portion of a total capacity of a protection TESI may be allocated to each working TESI. With this arrangement, traffic from the working TESI may be protection switched to the protection TESI. However, the protection TESI may “throttle” the protection switched traffic in accordance with the amount of capacity allocated to that working TESI.
If desired, where the capacity of a protection TESI is partitioned between two or more working TESIs, each partition may have its own APS PDU. In this case, the Request/State field priority levels described above may be used to resolve contention issues between each of the working TESIs. For example, consider a scenario in which a protection TESI is carrying traffic that has been switched from a first working TESI due to a manual switch. In this case, traffic of the first working TESI will be allocated to a respective first partition of the protection TESI, and will have a corresponding APS PDU with a Request/State field value of “0111”. If a service failure affecting a second working TESI occurs, traffic of that working TESI can similarly be allocated to a respective second partition of the protection TESI, and will have a corresponding APS PDU with a Request/State field value of “1011”. A contention issue can arise if the total bandwidth requirement of the two traffic flows exceeds the capacity of the protection TESI. However, the respective Request/State field values of the two flows can be used to resolve contention, by allowing the traffic flow with the highest priority level to pre-empt lower priority traffic flows. In the above example, traffic in the second partition (which has a Request/State field value of “1011”) can pre-empt traffic of the first partition (which has a Request/State field value of “0111”)
In some embodiments, a TESI may be shared between two or more protection groups. In such cases, the Multiple Protection Groups (MPG) bit 44 of the Flags field 36 can be set to indicate that the APS PDU contains a protection group block 46 (
If desired, a TESI that is designated as a working TESI in one protection group may be designated as a protection TESI in another protection group. In such cases, the techniques described above can be used, alone or in combination, to mitigate contention issues and limit the risk of “working” traffic of one protection group being pre-empted by protection traffic in the other protection group. For example, the shared TESI operating as a protection TESI can be assigned a protection sequence value of “1” or higher, so that it is less likely to receive protection switched traffic. In addition, pre-emption rules can be defined so that the “working” traffic always has priority over protection switched traffic. Finally, the capacity of the shared TESI may be partitioned between each of the protection groups with which the TESI is associated. If desired, this partitioning may be fixed, so that each partition group is allocated a predetermined proportion of the total capacity of the shared TESI, which remains fixed independently of the bandwidth requirements or priority levels of the traffic flows within each protection group.
The embodiment(s) of the invention described above is(are) intended to be exemplary only. The scope of the invention is therefore intended to be limited solely by the scope of the appended claims.
This application is based on, and claims benefit of, provisional U.S. patent application No. 61/118,554, which was filed Nov. 28, 2009, the entire contents of which are hereby incorporated herein by reference.
Number | Date | Country | |
---|---|---|---|
61118554 | Nov 2008 | US |