This application is based on, and claims the benefit of, European Patent Application No. 03292497.9 filed on Oct. 9, 2003, which is incorporated by reference herein.
1. Field of the Invention
The present invention relates to SDH/SONET telecommunication networks and in particular to a method and corresponding frame for providing “in band” path failure detection and localization. In other words, the present invention relates to a path failure detection and localization mechanism having a logic that is distributed in the various nodes of a SDH/SONET network.
2. Description of the Prior Art
The deregulation occurred in the last years on telecommunication networks has frequently led to a multi-operator environment, where traffic may be carried through before being terminated by an actual user.
Thus, a generic path may “pass-through” different network domains with, consequently, the need to be managed and/or to be protected by each operator.
Specifically, the need to discriminate the occurrence of a possible failure within/without a domain, so as to localize the fault detected is a key issue for properly activating any method of traffic restoration/protection.
A known mechanism for activating monitoring (and also protection) functionalities in an SDH network domain is the so-called tandem connection (TC). Such a mechanism has been already standardized under ITU-T G.707 (see annex C). A Tandem Connection is defined as a group of VC-ns which are transported and maintained together through one or more tandem line systems, with the constituent VC payload capacities unaltered. Note that in support of the layered overhead approach used in SDH, the Tandem Connection sub-layer falls between the multiplex section and path overhead layers (i.e. the original Regenerator section, Multiplex section, and Path functional overhead layering evolves to Regenerator section, Multiplex section, Tandem Connection and Path layers).
The Tandem Connection mechanism thus utilizes proper bytes of POH different from those normally used for end-to-end monitoring (typically B3, C2, and J1 bytes for VC4/VC3 paths). The Tandem Connection has been typically developed for serially arranged different operator network domains, namely for network domains of different telecom operators that are serially passed-through by a certain path.
In such a scenario (serially arranged different operator network domains) the problem with the standard Tandem Connection mechanism is related to both maintenance and service level agreement operations affecting a path. In case of claims from a final user, the operator finally charging such a final user can not understand which of the intermediate serially arranged operators has provided a fault-affected network resulting in a failured path.
In order to avoid such an inconvenience, the Standard has provided for a further byte, N1 byte of VC3/VC4 POH that can be acceded by the intermediate telecom operator. An intermediate operator, at the input of a path in its network domain, writes any possible error coding values and external alarm conditions in the N1 byte and transports such information at the egress end node of its network, namely the path end node.
Thus, the known Tandem Connection mechanism is rather effective in case of serially arranged different operator network domains but it is completely uneffective and unusable in case of nested network domains. In the first case, a certain path runs from an ingress end node to an egress end node of a first network domain and then passes through, serially, a second network domain, a third network domain, . . . . In the second case, a certain path runs from an ingress end node to an egress end node of a main network domain passing through the ingress nodes of the first, the second and the n-th intermediate network domains and then through the egress nodes of the n-th, . . . , the second and the first intermediate network domains. It will become clear to the man skilled in the art that if an inner telecom operator activates a Tandem Connection for monitoring its domain, such an operation squelches any Tandem Connection possibly activated by an operator that is external to it. Thus, in other words, the TC activated by the main operator becomes useless because the nested operators have used the same bytes for writing information related to their own network status.
Thus, the Tandem Connection functionality conceived within SDH technology fits a network topology where different operators manage intermediate domains serially connected: in these domains each operator can access the N1 byte of VC3/VC4 POH of the Higher Order VC (HOVC) for internal path monitoring, terminating the functionality at the NE's ingressing-egressing its domain.
Fault localization is currently supported through control plane (DCC) by centralized and distributed management. In a SDH or SONET network, all the alarm information are notified by the various network elements to the manager through the control plane. Thus, the DCC bytes (D1-D3 in SDH-RSOH or Sonet-Section Overhead and D4-D12 in SDH-MSOH or Sonet-Line Overhead) are used as communication channels for transmitting such information and form the supervision/control channel. In turn, the supervision/control channel is separated from the communication channel or data plane (situations could happen wherein the control plane is affected by a failure and the data plane is not or vice versa).
Fault localization through control plane is rather slow due to the different functional layers to be processed at each Network Element and, consequently, the possible update of network conditions due to a restoration process becomes critical in terms of response time for a fast re-allocation of available resources.
Finally, just for the purpose of providing a complete description, it should be said that in the OTH optical layer, the nested Tandem Connection functionality is defined. Whilst in the SDH domain a single byte N1 is defined (as said above), in the OTH case, six Tandem Connection N1-like bytes are provided, each byte being for a single level. Thus, six different information could be written in the same path and six parallel processes could be elaborated. Every nested telecom operator is allowed to accede to one only of the dedicated fields. In any case, the scope of the present patent application does not extend to the optical layer.
In view of the above, the Applicant has perceived the need to provide a method and corresponding frame for “in band” higher order path failure detection and localization.
The problem to solve by the present invention could be seen in providing an embedded communication channel, namely a channel within the bandwidth of a synchronous SDH/SONET signal, allowing for failure detection, failure localization and possibly providing information about the need to start a restoration process.
According to the present invention, a proper byte from POH is used, preferably K3 byte is used for SDH applications, Z4 byte is used for SONET applications.
According to the present invention, at least bits 5 and 6 of K3/Z4 are used for loading the following information: RDI (Remote Defect Indication) and “External failure/Internal failure”.
Profitably, bits 1-4 of byte K3 o Z4 are coded so that they carry a node identifier indicating a node detecting a failure.
The present invention will become fully clear after reading the following detailed description, to be given by way of example only and not with the object of limiting it, having reference to the attached sheets of drawings.
In the drawings:
a and 2b are diagrammatic representations of nested network domains;
a is a diagrammatic representation of a VC-4 frame;
b is a diagrammatic representation of K3 byte according to the present invention;
The path originates in end node NELA and terminates in end node NE2C of the network domain C. From NELA to NE2C it passed through the end nodes NE2A, NE1B, NE2B, NE1C of the serially arranged network domains B and C, respectively. In a similar network arrangement, the Tandem Connection mechanism operates sufficiently effectively.
The standard TC mechanism is not operable in a configuration of nested network domains as in
In the arrangement of
The present invention is applicable both in the first and in the second configurations, it does not replace the TC mechanism but it independently from it.
It is known that the SDH-VC-4-XcNC-4NC-3 POH consists of 9 bytes denoted J1, B3, C2, G1, F2, H4, F3, K3 and N1 (see
The present invention obtains the result of discriminating a path failure occurred inside a domain rather then outside. The present invention achieves such a result by using a proper encoding of K3 byte of VC4/VC3 POH (for SDH technology) or Z4 byte of STS1 POH (for SONET technology).
With reference, for instance, to
For any HO path passing-through both domains, NE's ‘ingressing-egressing’ Domain A, (i.e. NE 1, NE n) are supposed to handle Tandem Connection functionality for the monitoring and, possibly the protection of the interested path.
In particular, within the nested domains, the K3/Z4 byte is managed so as to encode specific indication for Near End/Far End fault detection in bits 5-6. Specifically, according to a preferred embodiment of the invention, bit 5 is used for indicating RDI (Remote Defect Indication) and bit 6 is used for indicating “External failure/Internal failure”. It should be understood that the scope of the present invention equally covers a different (for instance the opposite) use of bits 5 and 6 of byte K3/Z4.
As said above, this solution is aligned with current SDH/SONET standard recommendations considering those bits respectively “for future use” and “for future growth”.
Besides, this solution is compatible with the handling of possible path/trail protection schemes within the domain, based on protocol exchange message in bits 1-4 of K3 byte, as already specified by ITU-T G. 707/G.841 standard recommendations.
A further issue that an operator might want approach is the fault localization: then, not only the capability to distinguish Internal/External failure (supported by bits 5-6) will be provided, but also the possibility to localize the span (or link) which is fault affected. This feature becomes pretty attractive when path restoration methods (both centralized and distributed) are used within the domain: fault localization allows the operator to re-allocate efficiently available resources of connectivity.
Specifically, when path restoration is used for traffic survivability, a path protection scheme based on protocol is very unlikely to be used.
Then, bits 1-4 of K3/Z4 byte can be used for encoding a node identifier indicating the network element, inside the domain, detecting the path failure. This information should be forwarded and backwarded (RDI) to the NE's ingressing/egressing that domain and then to the manager.
The need to support fault localization on networks with more than 16 nodes, could be matched by multi-framing the indication of node identifier on two or more consecutive K3 byte (i.e. 8 bits or more).
Thus, ingress and egress end nodes to a network domain to be monitored identify an Internal TCM sublayer. Two new atomic functions are defined for sourcing and sinking the Internal Tandem Connection (ITC) according to the present invention: ITC-TT_So and ITC-TT_Sk. Furthermore, a new maintenance signal is defined for maintenance operations within the ITC sublayer: Internal VC-AIS (IVC-AIS). Indeed, IVC-AIS is similar to VC-AIS, with the exception that also K3 byte of POH is valid and is not all “1”s as in the known VC-AIS.
According to the present invention, the management of the internal TCM sublayer is performed only by ingress and egress nodes of main resources and no action is performed by the nodes intermediate to the network domain.
A possible failure coding according to the present invention is given, by way of example only, in the following Table 1 and will be explained through the examples of
Wherein:
With reference to
With reference to
With reference to
With reference to
Finally, with reference to
The above process can be further improved for managing fault localization by using similar concepts as above. Ingress and egress nodes to the domain to be monitored identify an internal TCM sublayer (ITCM); two new atomic functions are defined for sourcing and sinking the internal tandem connection, ITC TT_So and ITC_TT_Sk, respectively; and a new maintenance signal is defined for maintenance operations within the ITC sublayer, such a new maintenance signal is termed Internal VC-AIS (briefly, IVC-AIS). The difference resides in the fact that intermediate nodes can generate Internal VC-AIS maintenance signal in case of a failure occurred internally to a domain, instead of injecting simply AU-AIS. A new atomic function (ITC_int_So) is defined for internal tandem connection management at the nodes that are intermediate in the domain.
In addition to the coding of bits 5-6 of K3, bits 1-4 of such a byte carry a node identifier indicating the node detecting a failure. Possibly, a multiframe arrangement could be provided for network domains comprising more than sexteen nodes.
A possible improved failure coding, including failure detection features, according to the present invention is given, by way of example only, in the following Table 2 and to the examples of
Wherein:
Before starting to describe the mechanisms for failure detection according to the present invention, it should be remarked that each node belonging to domain B has a node identifier assigned. The identifier is inserted in bits 1-4 of K3 when generating internal VC-AIS. A number of identifier mapping procedures are possible but they will not described as they do not form a part of the present invention.
According to the present invention, ingress and egress nodes define the sublayer internal TC activating Internal Tandem Sk and So functions. The intermediate nodes manage Internal Tandem Connection So function.
With reference to
With reference to
With reference to
With reference to
With reference to
Finally, with reference to
It has now become clear that the new solution solves the problem of fault detection/fault localization in network with nested domains, optimizing network element response with respect the use of control plane.
There have thus been shown and described a novel method and a novel frame which fulfill all the objects and advantages sought therefore. Many changes, modifications, variations and other uses and applications of the subject invention will, however, become apparent to those skilled in the art after considering the specification and the accompanying drawings which disclose preferred embodiments thereof. All such changes, modifications, variations and other uses and applications which do not depart from the scope of the invention are deemed to be covered by the invention which is limited only by the claims which follow.
Number | Date | Country | Kind |
---|---|---|---|
03292497.9 | Oct 2003 | EP | regional |