Method and system therefor for ensuring a true activation of distributed restoration in a telecommunications network

Abstract
To ensure that the distributed restoration process of a DRA provisioned network proceeds only in response to true failures, the present invention DRA network provisions to each of the ports of the nodes a timer mechanism for ascertaining whether an alarm is a genuine alarm. This is done by presetting the timer with an expiration period so that an alarm is validated as a failure only upon the expiration of the timer. When validated, the value of a counter is incremented. The value of the counter is reflective of the sum of validated alarms, and is compared against a preset threshold value. And it is only when the value of the summed validated alarms exceeds the preset threshold value would the DRA process be initiated. When a validated alarm ceases, the reverse process takes place. That is, the ending of the alarm has to be validated by another timer, which could be the same timer as used for validating an alarm. The counter is decremented for each validated non-alarm, so that when the value of the defect counter falls below the threshold value, the DRA process is reset.
Description




FILED OF THE INVENTION




This invention relates to distributed restoration algorithm (DRA) networks, and more particularly to a method and system therefor of ensuring that the triggering of the distributed restoration process in a telecommunications network is not due to false alarms or failures.




BACKGROUND OF THE INVENTION




A telecommunications network may employ a combination of several approaches for restoring traffic flow interrupted by equipment failure or malfunction. For example, a network may rely upon a 1:1 automatic protect switching for some portions, distributed restoration (DRA) for other portions or domains of the network, and finally a centralized control of rerouting for situations not readily handled by the other approaches or schemes.




The automatic protection switching (APS) scheme, although wasteful of bandwidth, nonetheless is useful in some cases where simplicity and speed are required. The DRA scheme, on the other hand, takes slightly longer and may conceivably be considered more complex. But the DRA scheme is also more adaptable than APS and can leverage mesh restorability. For both APS and DRA schemes, restoration is triggered by the detection of transmission alarm conditions that result from occurred failures.




In a network where there are a number of schemes such as APS and DRA, even though the failure may quickly be circumvented by the APS scheme, the DRA provisioned nodes of the network may also begin to respond to the same failure, all of the while oblivious to the activities being carried on by the APS process. Such unnecessary triggering of the DRA process is undesirable, insofar as the DRA provisioned portion of the network, while the DRA process is ongoing, becomes vulnerable as the DRA process seeks to reserve spare links for the distributed restoration. Accordingly, any subsequent real failures could be precluded from complete and timely restoration due to this false triggering of the DRA process. To overcome this shortcoming, the DRA scheme must verify the genuineness of the failure before taking action.




It would appear that a simple solution is the provision of a timer. However, the provision of a timer for such multi-restoration schemes is inadequate because there are numerous links that interconnect the nodes of the network, and any one of those links can generate an alarm condition. It is therefore possible for two or more separate short duration alarm events to overlap enough so that those events would appear to be a single long duration alarm event, thereby activating the DRA process.




There is therefore a need for a robust method for determining when a DRA process may be activated.




Moreover, there is a need to have the DRA process start as quickly as possible, when it is needed, and yet not be triggered by false alarms.




SUMMARY OF THE PRESENT INVENTION




To ensure that a true activation of the DRA process takes place in the DRA provisioned domains of a network, each port of a node, or for example the digital cross-connect or an intelligent device, of the network is provided with a defect validation timer. This timer is user programable and could be preset, for example, with a nominal value of 100 ms. When an alarm condition is received, the timer is started. And if the alarm condition persists until the timer expires, then the alarm is deemed validated. In other words, the alarm is deemed to be a true alarm that merits the activation of the DRA process.




Once validated, an alarm can only be idled if it becomes inactive and remains inactive for a period of time. In practice, the same defect validation timer can be used for idling an alarm. Thus, when an alarm goes inactive, it starts the timer and the inactive state of the alarm is validated when the inactive alarm persists until the defect validation timer expires.




In the meantime, the quantity of the validated alarms is maintained by a defect counter, which is programmed with a predetermined threshold value. If the number of validated alarms, as counted by the counter, exceeds the preset threshold, the DRA process is initiated.




As alarms can come and go in a network, there may actually be continuous incrementing, as well as decrementing, of the count in the defect counter. But so long as the summed validated alarms remains above the preset threshold, the DRA process continues.




The present invention therefore achieves the objective of providing a more reliable, yet timely, initiation of the DRA process in a network so that the DRA process can coexist with other restoration processes such as the APS and central restoration schemes.




The instant invention achieves the further objective of adapting the initiation of the DRA process to the access/egress ports of the nodes of the network.











BRIEF DESCRIPTION OF THE FIGURES




The above-mentioned objectives and advantages of the present invention will become more apparent and the invention itself will be best understood by reference to the following description of an embodiment of the invention taken in conjunction with the accompanying drawings, wherein:





FIG. 1

is an illustration of a telecommunications network of the instant invention;





FIG. 2

is an illustration of two adjacent cross-connected nodes having added thereto equipment for ensuring that the activation of the DRA process is not done falsely;





FIG. 3

is an exemplar circuit of the DRA trigger system of the instant invention; and





FIG. 4

is a flow chart illustrating the operational steps of the instant invention.











DETAILED DESCRIPTION OF THE PRESENT INVENTION





FIG. 1

illustrates an exemplar telecommunications network that includes a number of interconnected nodes


2


-


24


each being cross-connected to its adjacent nodes by at least one span, or at least one working link and one spare link. For example, node


2


is connected to node


4


by means of working link


2


-


4


W and a spare link


2


-


4


S. Similarly, node


4


is connected to node


6


by a working link


4


-


6


W and a spare link


4


-


6


S. Further connecting the adjacent nodes, insofar as the exemplar network of

FIG. 1

is assumed to include a number of restoration schemes, is a dedicated line connecting each of the pairs of adjacent nodes for the APS process. Thus, as shown, a dedicated line or link


2


-


4


P cross-connects nodes


2


and


4


, while a dedicated line


4


-


6


P cross-connects nodes


4


and


6


. In essence, each of the dedicated lines,


2


-


4


P and


4


-


6


P for example, is used to reroute the traffic between its associated pair of adjacent nodes (


2


,


4


and


4


,


6


for example) if traffic is disrupted between those nodes. For the sake of simplicity, only the dedicated lines cross-connecting nodes


2


to


4


,


4


to


6


,


6


to


8


and


2


to


10


are labeled in the

FIG. 1

exemplar network.




For the telecommunications network of

FIG. 1

, it is assumed that all of the nodes shown are provisioned with both a distributed restoration algorithm (DRA) scheme as well as a 1:1 APS restoration scheme.




Further shown in

FIG. 1

is an operation support system (OSS)


26


that oversees and monitors the overall operation of the network. Given that OSS


26


has an overall view, or map, of the layout of each node within the network, it can provide a centralized restoration when a fault occurs anywhere within the network. As shown, OSS


26


has a memory store


30


into which data retrieved from the various nodes are stored. An interface unit, not shown, provides interfacing between OSS


26


and the nodes of the network. For the sake of simplicity, only nodes


2


,


4


,


6


, and


8


are shown to be connected to OSS


26


.




Each of the nodes


2


-


24


of the network of

FIG. 1

comprises a cross-connect switch such as for example the 1633-SX broadband cross-connect switch made by the Alcatel Network System Company. Two of such switches, for example nodes


2


and


4


, are shown in more detail in FIG.


2


. As shown, each of the switches has a number of access/egress ports such as for example


32


and


34


in node


2


and


36


and


38


in node


4


. Each of those access/egress ports is shown to be multiplexed to a line terminating equipment (LTE). It is by means of these LTEs that the adjacent nodes are cross-connected to each other. Thus, as shown, access/egress port


32


is connected to LTE


40


while access/egress port


34


of node


2


is connected to LTE


42


. Likewise, for node


4


, access/egress port


36


outputs to LTE


44


while access/egress port


38


outputs to LTE


46


.




Note that the LTEs are SONET equipment each having a detector residing therein to detecting any failure of the links between the digital cross-connect switches. Note further that the detecting circuit for detecting whether a communication failure has occurred may also be incorporated within the respective nodes, as printed circuit (PC) cards inserted at the various access/egress ports. Furthermore, there might be a greater number of links connecting the node to its LTE, as compared to the links or spans connecting two LTEs, as the lines cross-connecting the LTEs may be OC-48 lines, while those connecting the digital cross-connect switch to the LTE may be OC-12 fibers. Finally, note that even though optical carrier fibers are shown, the instant invention is equally applicable to synchronous transport signal level (STS-N) lines such as for example STS-1 or STS-3 lines.




For the example embodiment of the instant invention, each of the nodes


2


and


4


of

FIG. 2

is shown to include access/egress ports that include a number of individual ports a-i, etc. Each of these individual ports outputs from its node to a particular link, such as for example


50




a-




50




i


for access/egress port


38


of node


4


. Similar links connect the other access/egress ports of the other nodes to corresponding LTEs.




For an understanding of the instant invention, consider links


50




a-




50




i


cross-connecting access/egress port


38


to LTE


46


. As was mentioned previously, circuits provided at the LTE, or within node


4


as PC cards at access/egress port


38


, can detect any failure or malfunction that occurs at any one of the links cross-connecting a node, for example node


4


, with its adjacent node, for example node


6


shown in FIG.


1


. For the instant invention, for the purpose of explanation, a plurality of lines


48




a


to


48




i


extend respectively from links


50




a


to


50




i


to a DRA trigger system


52


. In actuality, note that the DRA trigger system


52


in fact resides in each of the cross-connect or intelligence devices. Lines similar to


48




a


-


48




i


for sending information to DRA trigger system


52


likewise are provided from the links cross-connecting access/egress port


38


and LTE


42


, designated as


54


, and the links cross-connecting access/egress port


36


and LTE


44


, designated as


56


. Assume that each of links


54


and


56


in fact contains multiple lines such as for example those represented by lines


48




a-




48




i.


Thus, for the instant invention, each access/egress port of each of the nodes of the network is assumed to be communicatively connected to DRA trigger system


52


.




With reference to

FIG. 3

, a conceptual configuration of DRA trigger system


52


is illustrated with respect to the lines input thereto from links


50




a-




50




i.


As shown, lines


48




a


-


48




i


and beyond are assumed to be connect to DRA trigger system


52


by way of respective timers


54




a-




54




n.


Timers


54




a-




54




n


each are considered a rolling off timer with de-glitch functions. Once set, the timers each will expire after a predetermined period of time. The period of time for each timer is set by a timer setting control which, for the instant invention, is set to have a nominal value of 100 ms, for example. Thus, for the instant invention, when an event, such as for example an alarm, occurs in any one of links


50




a-




50




i,


the line corresponding to the link where the event occurs would provide a signal to its corresponding timer to begin counting down the preset time. And when the preset time is reached, the timer expires.




In a typical network, it is not unusual for a number of alarms or transients to occur at any given time. Usually such transient events are ignored. However, if the transient event is of sufficient magnitude so that traffic is disrupted, the restoration scheme provided in the network would begin restoration to restore the traffic. In the case that the network is provisioned with both APS and DRA, when a brief transient of sufficient magnitude occurs, the APS process begins and in a very brief time would reroute the traffic to the dedicated line(s) from the malfunctioned link. For example, were link


2


-


4


W connecting nodes


2


and


4


to fail, using the APS process, the traffic is rerouted to


2


-


4


P.




Yet the fault at link


2


-


4


W is also detected by those nodes that are provisioned with DRA so that even though the fault has been rerouted by a different scheme, the DRA process is nonetheless initiated under this scenario. The instant invention aims to eliminate such unnecessary utilization of resources by providing the timers as shown in

FIG. 3

so that when a fault is detected, unless that fault persists beyond the expiration of the timer, it is not deemed to be a true or actual fault. In which case that fault is disregarded.




Because the initiation of a DRA process is based on the number of alarms or faults that are detected, the instant invention, as embodied by the exemplar circuit of

FIG. 3

, has each of the timers connect to a summer


56


, which sums the various alarms. This summed value is then provided to a comparator


58


by means of an input


60


. Comparator


58


is provided with a predetermined preset threshold value


62


. Thus, if the summed alarms were to exceed the value of the preset threshold, a signal for initiating the DRA process is output from comparator


58


. On the other hand, if the summed value of the alarms is less than or equal to the preset threshold value, the DRA process will not be initiated.




Thus, to eliminate unwarranted activation of the DRA process, the instant invention provides at each port of each node a timer with a predetermined expiration time. When an alarm is sensed at any one of the links, the port to which the link is connected outputs to its associated timer a signal for initiating the timer to begin a validation period. For the instant invention, to ensure that the alarm is not transient, the timer would send the alarm to summer


56


only after it has been validated as a genuine alarm. Summer


56


then sums all of the alarm signals it receives. The summed value of the alarms is next compared with a preset threshold for determining whether the DRA process for restoring disrupted traffic should be activated.




As was noted earlier, many of the alarms are of transient nature and are of such magnitude that they will not become actual alarms. In addition, the number of alarms summed at summer


56


at any period of time could in fact vary as a function of time. Thus, in order to better calculate at any instant of time the total number of alarms summed, a defect counter


64


is provided in, or works cooperatively with, summer


56


for keeping an accurate count of the number of alarms that are summed. Thus, each time an alarm is detected from a given port, such alarm is counted by and increments counter


64


. Conversely, each time an alarm ceases, the count in counter


64


is decremented. Thus, for the exemplar embodiment shown in

FIG. 3

, assuming that only validated alarms are counted to initiate the DRA process, those validation alarms need to add up to a value greater than the preset threshold, before a signal is output to initiate the DRA process.




For the exemplar embodiment of the instant invention, albeit optical fibers are shown for interconnecting the nodes of the network, in actuality, those optical fibers are interchangeable with synchronous transport signal (STS-n) lines. Given that each port can carry a STS-n signal, such as for example a STS-3 signal, to accurately reflect the number of alarms, counter


64


will count each validated STS-n alarm as n alarms. In other words, if a validated STS-3 alarm is provided to summer


56


, counter


64


will be incremented by a value of


3


. And if a DS3 or STS-1 validated defect is input to summer


56


, counter


64


will increment its count by 1. Conversely, after expiration of a timer, if a defect has cleared, the defect validation timer will be reset and the counter


64


is decremented.





FIG. 4

is a flow chart that illustrates the operational steps of the instant invention. As shown, the process begins at step


70


in which an alarm input becomes active or detected. Thereafter, the delay timer with the preset timer value is initiated, per step


72


. Next, for that particular timer, a determination is made per step


74


on whether the alarm is still active. If the alarm is no longer active, the process stops.




On the other hand, if the alarm remains active, the process proceeds to determine whether the timer has expired, per decisional step


76


. So long as the timer has not expired, the process returns to step


74


to continue to monitor whether the alarm is still active. After the expiration of the timer per step


76


, the alarm is validated per step


78


. The counter in the DRA trigger system, and more specifically summer


56


, is thereafter incremented and counted, per step


80


. At step


82


, a determination is made on whether the value of the defect counter exceeds the preset threshold for initializing the DRA process. If it is, an output is provided to activate the DRA process, per step


84


.




On the other hand, if the defect count is less than the threshold value as determined by step


82


, the process continues to step


86


to determine whether the alarm is still active. If it is, the state of the alarm continues to be monitored. If the alarm is deemed not to be active, the process proceeds to step


88


whereby the delay timer is activated in its reverse stage, i.e., a determination of whether indeed the alarm has ceased. Thereafter, the process determines whether the alarm remains inactive, per step


90


. If it is, determination is made per step


92


on whether the off delay timer has expired. If it has not, the process continues to monitor the status of the alarm signal. If it is determined that the off delay timer indeed has expired, then the process proceeds to step


94


to decrement the defect counter, as the alarm has been validated as having ceased.




Thereafter, the process proceeds to determine whether the defect count in the counter is less than or equal to the preset threshold, per step


96


. It is, the alarm output for activating the DRA process is reset, per step


98


. If it is not, the process stops.




Inasmuch, as the present invention is subject to many variations, modification and changed in detail, it is intended that all matter described throughout this specification and shown in the accompanying drawings be interpreted as illustrative only and not in a limiting sense. Accordingly, it is intended that the present invention be limited only by the spirit and scope by hereto appended claims.



Claims
  • 1. In a distributed restoration algorithm (DRA) provisioned telecommunications network having a plurality of interconnected nodes each including a plurality of access/egress ports, a method of ensuring that a DRA process for distributedly restoring disrupted traffic is not triggered in said network due to false alarms, comprising the steps of:communicatively connecting to each port of each node in said network a durational timer means; initiating the timer means associated with said each port when an alarm is output therefrom; summing the number of alarms detected by and validated by corresponding timer means; and initiating said DRA process if the value of the summed alarms is greater than a predetermined threshold value.
  • 2. The method of claim 1, wherein said step c further comprises the step of:maintaining a counter to count the number of validated alarms; wherein said counter increments its count each time a validated alarm from a port is detected and decrements its count each time an alarm from a port is validated to have ceased.
  • 3. The method of claim 1, wherein each of said timer means starts a validation period upon detection of an alarm, further comprising the step of:confirming said detected alarm to be a true alarm if said detected alarm persists after the expiration of the validation period of said timer means.
  • 4. The method of claim 2, further comprising the step of:counting each failed synchronous transport signal (STS-n) as n alarms so that the count of said counter is incremented n times when a STS-n alarm is validated and decremented n times when a STS-n alarm is validated to have ceased.
  • 5. In a distributed restoration algorithm (DRA) provisioned telecommunications network having a plurality of interconnected nodes, a method of ensuring that a DRA process for distributedly restoring disrupted traffic is not triggered in said network due to false alarms, comprising the steps of:monitoring and detecting alarms output from each node of said network; starting a durational timer associated with each detected alarm; summing the number of detected alarms; comparing the summed alarm number with a predetermined value; and initiating said DRA process if the value of the summed alarms is greater than said predetermined value.
  • 6. The method of claim 5, further comprising the step of:effecting a counter to sum said value of detected alarms, said value being incremented each time a validated alarm is detected and decremented each time an alarm is validated to have ceased.
  • 7. The method of claim 5, further comprising the step of:confirming said each detected alarm to be a real fault if said each detected alarm persists after its associated timer has expired.
  • 8. The method of claim 5, further comprising the step of:counting each failed synchronous transport signal (STS-n) as n alarms so that the number of detected alarm s is incremented n times when a STS-n alarm is detected and decremented n times when a STS-n alarm ceases.
  • 9. A distributed restoration algorithm (DRA) provisioned telecommunications network adapted to initiate a DRA process for distributedly restoring disrupted traffic in said network only in response to true alarms, comprising:a plurality of interconnected nodes each including a plurality of access/egress ports; respective durational timers communicatively connected to corresponding ports of each node in said network, each of said respective timers associated with a corresponding port being initiated when an alarm is output from said corresponding port; summer means for summing the number of alarms validated by respective ones of said timers; and comparator means for comparing the summed number of alarms against a predetermined threshold value; wherein said DRA process is initiated when said summed number of alarms is greater than said predetermined threshold value.
  • 10. The network of claim 9, wherein said summer means comprises:a counter for counting the number of alarms, said counter incrementing its count each time an alarm from a port is validated and decrementing its count each time an alarm from a port is validated to have ceased.
  • 11. The network of claim 9, wherein each of said respective timers starts a validation period upon detection of an alarm; andwherein said detected alarm is confirmed to be an actual alarm if it persists after the expiration of the validation period of said each timer.
  • 12. The network of claim 10, wherein said counter counts each failed synchronous transport signal (STS-n) as n alarms so that the count of said counter is incremented n times when a STS-n alarm is validated and decremented n times when a STS-n alarm is validated to have ceased.
CROSS REFERENCE TO RELATED APPLICATIONS

The instant invention relates to the following applications having Ser. Nos. 08/825,440 filed Mar. 28, 1997, 08/825,441 filed Mar. 28, 1997, 09/046,089 filed Mar. 23,1998, Ser. No. 09/148,944 filed Sep. 8, 1998 entitled “Restricted Reuse of Intact Portions of Failed Paths”, and Ser. No. 09/149,591 filed Sep. 8, 1998 entitled “Signal Conversion for Fault Isolation”. The respective disclosures of those applications are incorporated by reference to the disclosure of the instant application. The instant invention further relates to applications Ser. Nos. 08/483,579 filed Jun. 7, 1995, 08/736,800 filed Oct. 25, 1996 and 08/781,495 filed Jan. 13, 1997. The respective disclosures of those applications are likewise incorporated by reference to the instant application. This application is further related to the invention entitled “Method and Message Therefor of Monitoring the Spare Capacity of a DTNR Network” with filed Jul. 30, 1999, now abandoned, the disclosure of which being incorporated by reference herein. This application is yet further related to the invention entitled “Quantification Of The Quality Of Spare Links In A Telecommunications Network”, with Ser. No. 09/149,590 filed Sep. 8, 1998, the disclosure of which being incorporated by reference herein. This application is still yet further related to the invention entitled “Method of Coordinating the Respective Operations of Different Restoration Processes” with Ser. No. 09/149,590 filed Sep. 8, 1998, the disclosure of which being incorporated by reference herein.

US Referenced Citations (59)
Number Name Date Kind
4648088 Cagle et al. Aug 1985
4853927 Wenzel May 1989
4884263 Suzuki Nov 1989
4956835 Grover Sep 1990
5070497 Kleine-Altekamp Dec 1991
5146452 Pekarske Sep 1992
5173689 Kusano Dec 1992
5189662 Kleine-Altekamp Feb 1993
5218601 Chujo et al. Dec 1990
5233600 Pekarske Aug 1993
5235599 Nishimura Jun 1994
5319632 Iwasaki Jul 1995
5325366 Shinbashi Jun 1994
5435003 Chng et al. Jul 1995
5455832 Bowmaster Oct 1995
5479608 Richardson Dec 1995
5493273 Smurlo et al. Feb 1996
5495471 Chow et al. Feb 1996
5537532 Chng et al. Jul 1996
5548639 Ogura Aug 1996
5586112 Tabata Dec 1996
5590118 Nederlof Dec 1996
5590119 Moran et al. Dec 1996
5598403 Tatsuki Jun 1995
5623481 Russ et al. Apr 1997
5636203 Shah Jun 1997
5636206 Amemiya et al. Jun 1997
5646936 Shah et al. Jul 1997
5657320 Russ et al. Aug 1997
5680326 Russ et al. Oct 1997
5710777 Gawne Feb 1998
5721727 Ashi et al. Feb 1998
5734687 Kainulainen Mar 1998
5748611 Allen et al. May 1998
5748617 McLain, Jr. May 1998
5757774 Oka May 1998
5781535 Russ et al. Jul 1998
5802144 Laird et al. Sep 1998
5812524 Moran et al. Sep 1998
5832196 Croslin et al. Nov 1998
5838660 Croslin Nov 1998
5841759 Russ et al. Jan 1997
5850505 Grover et al. Dec 1998
5852600 Russ Dec 1998
5862125 Russ Jun 1999
5862362 Somasegar et al. Jan 1999
5867689 McLain, Jr. Feb 1999
5933422 Kusano et al. Aug 1999
5943314 Croslin Aug 1999
5991338 Trommel Nov 1999
5999286 Venkatesan Dec 1999
6026077 Iwata Feb 2000
6044064 Brimmage et al. Mar 2000
6049529 Brimmage et al. Apr 2000
6104695 Wesley et al. Aug 2000
6108309 Cohoe et al. Aug 2000
6137775 Bartlett et al. Oct 2000
6154448 Peterson et al. Nov 2000
6167025 Hsing et al. Dec 2000
Foreign Referenced Citations (2)
Number Date Country
9641440 Dec 1996 WO
9748189 Dec 1997 WO
Non-Patent Literature Citations (2)
Entry
Bouloutas et al. “Alarm Correlation and Fault Identification in Communication Networks”; 1994 IEEE Transactions and Communications.
Manione et al.; “An Inconsistencies Tolerant Approach in the Fault Design of Telecommunications Network”; Feb. 14, 1994.