The present invention relates to the routing of data traffic along a network comprised of interconnected successive router nodes, each controlled by its own software information processing tables and management protocol for enabling the data routing to the next router node and along the network routing path; the invention being more particularly directed to the impact upon the data routing of upgrading such software.
Under current practice, as in, for example, network routing systems of Cisco and other manufacturers, the upgrading, revising or other changing of the software managing of a router in such a network of interconnected router nodes requires taking the router down, effecting the software upgrade or other change (generally from software memory images), and then restarting, disrupting the routing traffic and interaction with neighboring router nodes. Historically, the problem of network routing reliability has often not been a large issue because of the redundancy of routing paths in the networks, and because of the tolerance of users to a half-minute to several minutes traffic re-routing after a particular router node has been taken out of service for a software upgrade, or has failed. The removal of a router node from the network triggers the reconverging along another path of router nodes. The router is brought down to the level of only configuration management while the software is upgraded or otherwise changed or varied, and then the router is restarted again and reconverges, enabling traffic along the initial router network path. If no alternative path exists, however, a portion of the network will be disconnected during the update.
In environments such as universities and the like, several minutes of disruption for email or the like is tolerable; but if audio or video data is being routed, or interactive interplay is involved, such reconfiguring time presents a deleterious disruption.
Through the novel techniques underlying the present invention, however, a much higher availability router is provided wherein software may be upgraded in the network router path without disrupting or interrupting traffic service therein, and without interruption even if no alternative routing paths are available in the network.
It is accordingly the principal object of the present invention to provide a new and improved method of and system for upgrading or otherwise changing or varying router software in networks of interconnected router nodes without suffering the before-described prior art traffic interruption and resulting delays and the like.
Another object is to provide for such upgrades without interruption even if there is no alternative routing path available in the network.
Still a further object is to provide a novel higher availability router system than prior art systems.
Other and further objects will be explained hereinafter and are more particularly delineated in the appended claims.
In summary, however, from one of its viewpoints, the invention embraces in a network data routing system comprised of a plurality of interconnectable router nodes, each controlled by software processing and management information for enabling data routing along a predetermined path of router nodes, a method of revising and upgrading the software information in one of such preselected router nodes along said paths, that comprises, continuing the data routing along said path with original software information controlling said one router node; during such continued routing, preparing new software information at said one node from said original software information and including revisions and upgrades; and, after such preparing of the new software information, swapping the same for the original software information in said one node during the continuing of the data routing along said path without interruption, and imperceptibly to all the other router nodes in the router system.
Preferred and best mode designs and details are later fully described.
The invention will now be explained in connection with the accompanying drawings in which
As before mentioned, the upgrading or other changing or varying of the software in any router of the plurality of successively interconnected routers defining the network data traffic path, is effected, in accordance with the present invention, without bringing the router down. Rather, the invention enables creating a swap of upgraded software, prepared while the original router software continues operation, without interruption of that router operation, and imperceptibly to all the other routers and system.
This, as earlier pointed out, is in distinct contrast to traditional techniques illustrated in
When it becomes necessary to upgrade or change the software in router node N3, the prior art, as previously noted, generally shuts down N3 during the upgrading and re-loading of the software, indicated as by the crosses X. This requires the seeking of the alternative longer upper path T1 (N1-N2-N4-N5) with the indicated interruption and re-route delay. Had there been no alternative path, moreover, the lower portion of the network would be disconnected during the update.
In contrast, as shown in
Preferred ways in which this “on-the-fly” or “on-line” preparation of upgraded software and “hot swap” may be implemented, will now be detailed with a description of the software functionality and architecture suitable for “hot-swap” capability, including the functional composition, the generic flow of information through the system that “hot swap” must support, and the functional requirements associated with each hot-swap support component.
First, the relationship of key module architectural elements is schematically shown in
The “hot-swap” architecture provides a sort of uniform “software backplane”,
Also within the backplane services B is provided a dynamic linker L that allows modules to be linked and then replaced with a link to a new version, and a dynamic binder BT that also allows a task to ask for other tasks by name, and receives a pointer to an interface structure that captures plug-in information; i.e. with a dynamically bound veneer to TCP/IP and message queue based IPC (so-labeled), allowing a new task to take control by the task manager TM of already open connections, and to pick up processing where the previous task left off. Thus, as above stated, the persistence mechanism PS allows state information to be passed from one task to the next, coordinating with the IP and messaging interface so that the point where the new task begins processing the queued requests, corresponds to the point the shared persistent data was check-pointed; and with the SNMP/MIB descriptors and data persisting between activation of the service.
In summary, therefore, in addition to the dynamic binding mechanisms, the task manager TM is responsible for activation of each required module, monitoring their availability and stopping a task or restarting the task if it has crashed. The use of module interfaces for the elements of the “hot-swap” services, focusing on the notion of the software backplane, provides a plug-in capability to each module. Such interfaces include the TCP/IP, UDP and task message IPC used to control a module. The interfaces also include the persistent data that must be passed from one activation of a task to the next in order to avoid any delay or disruption otherwise caused by a cold start of the module. The module interfaces include also the MIB used to represent the objects and information to be published through SNMP agent to a monitoring system. Support for this “backplane” also includes the embedded operating system which provides the usual range of well-known building blocks plus the linker, unlinker. Support may also include an additional library to support the dynamic binding among tasks, plus the configuration management services needed to maintain the software; and the network and system management interfaces, as well.
Turning now to the operating system features required to build on, and the changes needed to cause the TCP/IP stack to handle transparent module replacement, a more detailed description is herein provided of the modified TCP/IP stack and the elements required to support data persistence, the interface structure, and the binder and task manager; and finally, further description of the module management components, the configuration manager which allows an operator to control what will run and how the system will behave if new modules fail, and the download manager which oversees the software upgrades.
Reference is first made to
The IP handler bus allows connections, both listener and direct, to be passed from one task to another. Tasks will register with the service by identifying the port wish to listen for and that may include an identifier that will be included at the beginning of each message. When the connection is established, data from the connection will be passed to the appropriate message queue Q. Connect requests received in response to a proxy listen will also be sent to the message queue for accessing control checks the service may wish to perform. The connection can be reassigned when a new module begins to run and registers with the pre-empt option set. This will cause the old binding to be broken and a new one to be created, which may be nothing more than changing the task identifier associated with the binding held by the IP handler, since for proper handling, the entire message queue must be passed from the original task to the new one. Pending messages must be left on the queue for the new task to pick up and process. Before the new task may take the message queue for the old task, however, it may have to synchronize with the original task. This synchronization should ensure that all changes up to the last message process have been checkpointed to the persistent data area. It should also ensure that the original task does not begin to process additional messages beyond the synchronization point.
This approach is necessary to ensure a clean hand-off to pending work between tasks, since the message queues allow pending requests to be held and then redirected to a new version of the module. This approach is deemed a preferred one because it does not require modifications to TCP/IP stack. Such changes, indeed, would require a custom stack and would reduce the processing delay, buffer copy delay and possible memory fragmentation from buffer handling; but it would eliminate the more complicated problem of checkpoint synchronization with the message stream that must be performed for a clean hand-off between the tasks.
More fully to describe the binding activity relationship and steps, reference is now made to
Lastly,
The task information may include:
While the invention has been described in connection with the illustrative and important example of a BGP routing protocol, the techniques of the invention can also be applied to other routing protocols, link layer protocols, management applications and, in general, any application that runs on a router. Examples of routing protocols include interior gateway protocols, multicast protocols, resource reservation protocols. Link layer protocols include Frame Relay and ATM (A synchronous Transfer Mode) configuration, path selection and circuit management protocols. General management applications include Simple Network Management Protocol (SNMP), the command line interpreter, Web servers and other user interfaces and their supporting infrastructure within the router. General applications are wide ranging, including remote access protocols like tenet and ftp, information services for host name lookup and time synchronization, or embedded editors for modifying configuration and other files. The technique and portions thereof are useful in other communications systems as well; and further modifications will also occur to those skilled in the art, such being considered to fall within the spirit and scope of the invention as defined in the appended claims.
Number | Name | Date | Kind |
---|---|---|---|
5155837 | Liu et al. | Oct 1992 | A |
5339430 | Lundin et al. | Aug 1994 | A |
5418524 | Fennell | May 1995 | A |
5546581 | McKinnis et al. | Aug 1996 | A |
5546584 | Lundin et al. | Aug 1996 | A |
5555418 | Nilsson et al. | Sep 1996 | A |
5931938 | Drogichen et al. | Aug 1999 | A |
5968170 | Gross et al. | Oct 1999 | A |
6009524 | Olarig et al. | Dec 1999 | A |
6012088 | Li et al. | Jan 2000 | A |
6026157 | Gulik et al. | Feb 2000 | A |
6084869 | Fishman et al. | Jul 2000 | A |
6101327 | Holte-Rost et al. | Aug 2000 | A |
6125372 | White | Sep 2000 | A |
6128734 | Gross et al. | Oct 2000 | A |
6134663 | Nakamura et al. | Oct 2000 | A |
6154878 | Saboff | Nov 2000 | A |
6175919 | Ha | Jan 2001 | B1 |
6195792 | Turnbull et al. | Feb 2001 | B1 |
6202207 | Donohue | Mar 2001 | B1 |
6289511 | Hubinette | Sep 2001 | B1 |
6314567 | Oberhauser et al. | Nov 2001 | B1 |
6324693 | Broderson et al. | Nov 2001 | B1 |
6353928 | Altberg et al. | Mar 2002 | B1 |
6360363 | Moser et al. | Mar 2002 | B1 |
6378127 | Delo | Apr 2002 | B1 |
6397385 | Kravitz | May 2002 | B1 |
6408434 | Fujiwara | Jun 2002 | B1 |
6418555 | Mohammed | Jul 2002 | B1 |
6438748 | Gard et al. | Aug 2002 | B1 |
6446255 | Curtis et al. | Sep 2002 | B1 |
6463584 | Gard et al. | Oct 2002 | B1 |
6473899 | Nelson et al. | Oct 2002 | B1 |
6553028 | Tang et al. | Apr 2003 | B1 |
6594822 | Schweitz et al. | Jul 2003 | B1 |
20010014968 | Mohammed | Aug 2001 | A1 |
20010049732 | Raciborski et al. | Dec 2001 | A1 |
20010053131 | Geens | Dec 2001 | A1 |
20020021675 | Feldman | Feb 2002 | A1 |