The present disclosure relates generally to providing Ethernet VLAN capacity requirement estimation and in particular, to a method of utilizing a least contribution capacity algorithm for providing Ethernet VLAN capacity requirement estimation.
Computer networks carry data between various devices. The data may be carried in connection-based links, such as the virtual circuits in an asynchronous transfer mode (ATM) network. Data may also be carried between devices in network segments where data is broadcast to all of a plurality of devices on the segment via a broadcast-type medium. An example of the latter is an Ethernet network. It is typically convenient to set up local area networks (LANs) using a broadcast type medium over which devices can share data.
In some circumstances, for example, where a LAN is required to connect devices that are geographically distant from one another, the LAN may be broken into separate segments. Within each segment devices (e.g., switches) can exchange data by way of a broadcast-type medium. The segments may be connected to one another by way of connection-based links such as physical transport lines. Such a LAN may be referred to as a virtual LAN (VLAN). The VLAN may be thought of as a logical web of connections over physical transports.
Metro-Ethernet networks are based on VLANs within the Ethernet network of a given metropolitan area. A VLAN is the interconnection of any number of access ports for a given customer within the larger service provider Ethernet network. Due to the nature of Ethernet VLANs as tree structures topologically, the calculation of the impact of any given port on the bandwidth (BW) of the underlying trunk network is complex since it depends not only on the BW of the port and the class of service (COS) of the VLAN, but also on the placement of the port within the context of the overall VLAN. Currently, expert technicians manage Ethernet VLANs manually. As VLANs become larger and include more complex (e.g., more COSs) it becomes more difficult and time consuming for technicians to take into account capacity considerations.
An exemplary embodiment is a computer implemented method for providing virtual local area network (VLAN) capacity requirement estimation. The method includes receiving at a computing system a VLAN configuration file that specifies VLAN access ports, VLAN switches and VLAN trunks in a VLAN. A target access port identifier is received at the computing system from a requestor, the target access port identifier includes a target class of service and a target bandwidth requirement. A target trunk and target switch corresponding to the target access port are determined at the computing system. The target trunk corresponds to one of the VLAN trunks and the target switch corresponds to one of the VLAN switches. A bandwidth contribution of the target access port to the VLAN is calculated at the computing system. The calculating is based on a least contribution algorithm that reflects an impact of provisioning the target access port with respect to trunk capacity, and is responsive to the target bandwidth requirement, the target class of service and placement of the target port in the VLAN. The bandwidth contribution is then transmitted to the requestor.
Another exemplary embodiment is a system for providing VLAN capacity requirement estimation. The system includes a storage device storing a VLAN configuration database specifying VLAN access ports, VLAN switches and VLAN trunks in a VLAN. The system also includes a host system in communication with the storage device and in communication with a user system via a network. The host system includes application software to implement a method. The method includes receiving a VLAN configuration file that specifies VLAN access ports, VLAN switches and VLAN trunks in a VLAN. A target access port identifier is received from a requestor, the target access port identifier includes a target class of service and a target bandwidth requirement. A target trunk and target switch corresponding to the target access port are determined. The target trunk corresponds to one of the VLAN trunks and the target switch corresponds to one of the VLAN switches. A bandwidth contribution of the target access port to the VLAN is calculated. The calculating is based on a least contribution algorithm that reflects an impact of provisioning the target access port with respect to trunk capacity, and is responsive to the target bandwidth requirement, the target class of service and placement of the target port in the VLAN. The bandwidth contribution is then transmitted to the requestor.
Still further embodiments of the present invention include a computer program product for providing VLAN capacity requirement estimation. The computer program product includes a tangible storage medium readable by a processing circuit and stores instructions for execution by the processing circuit for facilitating a method that includes receiving a VLAN configuration file that specifies VLAN access ports, VLAN switches and VLAN trunks in a VLAN. A target access port identifier is received from a requestor, the target access port identifier includes a target class of service and a target bandwidth requirement. A target trunk and target switch corresponding to the target access port are determined. The target trunk corresponds to one of the VLAN trunks and the target switch corresponds to one of the VLAN switches. A bandwidth contribution of the target access port to the VLAN is calculated. The calculating is based on a least contribution algorithm that reflects an impact of provisioning the target access port with respect to trunk capacity, and is responsive to the target bandwidth requirement, the target class of service and placement of the target port in the VLAN. The bandwidth contribution is then transmitted to the requestor.
Other systems, methods and/or computer program products according to embodiments will be or become apparent to one with skill in the art upon review of the following drawings and detailed description. It is intended that all such additional systems, methods, and/or computer program products be within the scope of the present invention, and be protected by the accompanying claims.
Referring to the exemplary drawings wherein like elements are numbered alike in the several FIGURES:
Exemplary embodiments of the present invention implement a least contribution algorithm for calculating the impact of any given port on the BW of the underlying trunk network, on a per port basis, in the context of provisioning VLANs. Provisioning decisions are made based on the result of applying the least contribution algorithm and counters are updated and/or alerts are generated. Exemplary embodiments of the present invention will calculate the impact of the addition (or removal) of a particular access port to a specified VLAN. Exemplary embodiments of the present invention may be utilized to provide an audit function of a VLAN by walking through each access port in the specified VLAN. For every existing link in the specified VLAN, appropriate alerts may be generated, counters updated and a pass or fail status communicated.
Exemplary embodiments of the present invention operate in the context of an operational support system that manages metro-Ethernet services. The operational support system may provide the context of network intelligence and capacity tracking counters and control parameter that govern the logic of the least contribution capacity algorithm. In exemplary embodiments of the present invention, the operational support system includes a database of existing VLANs such that the VLAN names are unique across the region, each existing VLAN has an accessible list of network elements already in the connection paths of that VLAN, and each VLAN has the counters to support a least contribution algorithm. In addition, each trunk includes capacity counters and threshold parameters that contain: the BW capacity of the trunk; the currently assigned BW in each COS category; and alarm and cutoff parameters that may be utilized by exemplary embodiments of the present invention to control further assignments to that trunk.
In exemplary embodiments of the present invention, the algorithm has as input a VLAN name, a COS, an access port and the BW of the port. The algorithm then examines every link relative to this access port, i.e., every link has a near end and a far end relative to this access port. Due to the tree structure of an Ethernet VLAN, all ports in the VLAN are on exactly one side or the other of each link. The algorithm can therefore be utilized to calculate the sum of all ports on each of the two sides of the link, or trunk, and then determine the overall impact of adding the access port. Taking the BW and COS of the port into account and the contribution of the port to the capacity load of the link, the algorithm verifies whether capacity is available for the port. If yes, it adjusts the counters appropriately and goes on to the next link. The least contribution algorithm may be utilized by exemplary embodiments of the present invention in the VLAN provisioning process to determine the impact on the existing VLAN link of adding (or removing) an access port on the VLAN. It will pass or fail the assignment and issue appropriate alarms.
The network 106 may be any type of known network including, but not limited to, a wide area network (WAN), a local area network (LAN), a global network (e.g. Internet), a virtual private network (VPN), and an intranet. The network 106 may be implemented using a wireless network or any kind of physical network implementation known in the art. A user system 102 may be coupled to the host system through multiple networks (e.g., intranet and LAN) so that not all user systems 102 are coupled to the host system 104 through the same network. One or more of the user systems 102 and the host system 104 may be connected to the network 106 in a wireless fashion.
The storage device 108 depicted in
The host system 104 depicted in
The host system 104 may also operate as an application server. The host system 104 executes one or more computer programs to provide Ethernet VLAN capacity requirement estimation. One or more application programs within the host system 104 share information to support the capacity requirement estimation process. The processing of the capacity requirement estimation application may be shared by a user system 102 and the host system 104 by providing an application (e.g., a Java applet) to the user system 102. As previously described, it is understood that separate servers may be utilized to implement the network server functions and the application server functions. Alternatively, the network server, the firewall, and the application server may be implemented by a single server executing computer programs to perform the requisite functions.
At step 206, the current and potential BW associated with the access port side is calculated. The current access port side total is the sum of all BW requirements entering the trunk from the switch at the access port side of the trunk. The potential access port side total is the sum of the current access port side total and the BW of the specified access port. Next, at step 208, the current BW associated with the non-access port side of the trunk is calculated as the total of the BW of all access ports on the non-access port side of the trunk. At step 210, the contribution of the specified access port is calculated in terms of a minimum required BW. The current minimum required BW may be calculated as the minimum of the current access port side total and the current non-access port side total. The potential minimum required BW may be calculated as the minimum of the potential access port side total and the current non-access port side total. The BW contribution of the specified access port is equal to the potential minimum required BW minus the current minimum required BW. The BW contribution of the specified access port is zero if the current minimum required BW is equal to the potential minimum required BW.
At step 212, the algorithm checks the capacity of the trunk to verify that the requested BW, or the BW contribution of the specified access port, for the requested COS is available. A pair of access switches may include several trunks between them to choose from for the requested BW. In exemplary embodiments of the present invention, the trunk that currently contains the highest utilization is selected by the algorithm as long as the selection does not cause the trunk to exceed capacity. Alternate exemplary embodiments may allow a technician to select the trunk that has the lowest utilization. If the assignment of the requested BW would cross the alarm, or alert, threshold for the specified COS on the trunk, an alarm is raised. If the assignment would cross the cutoff threshold for the specified COS on the trunk, an alarm is raised and the assignment is not allowed. Alarms, or alerts, may include sending an e-mail to alert an individual of the situation and/or sending the data to an operational system. The algorithm updates the capacity counters of each trunk and VLAN trunk as appropriate and returns an indication of whether the assignment is a pass or fail. If the assignment failed, then the links that have failed are also returned.
Alternate exemplary embodiments of the present invention may be utilized to perform audits on VLAN capacity to ensure that the required BW is being made available and to assess the likelihood of new trunks being required in the near future to support the VLAN. This may be performed by walking through each access port in the VLAN and assessing the capacity requirements. The audit may be utilized to verify that a VLAN that was designed manually includes enough capacity. Exemplary embodiments of the audit include: checking the hand designed VLAN for structural integrity (e.g., completeness, coherence, and tree structure); computing all capacity counters and hub values; and checking capacity on all trunks. Other alternate exemplary embodiments of the present invention may be utilized to update the VLAN and counters, if there is enough capacity, and to transmit any alerts and/or cut-off threshold data.
In the following example, the impact of an access port on the BW of an underlying trunk in a VLAN is calculated. The example is simplified to show how exemplary embodiments of the present invention may perform, however, a typical Ethernet VLAN may include twenty or more access ports.
The impact of a 100 M access port f1 at access switch F 312 is being calculated. In this example, the following data is received from the requestor or from the operational support systems: COS is best effort; the trunk connecting access switch F 312 to switch C 306 has the capacity to support a BW of 1000 M for the best effort COS; the current BW is 750 M and an alert should be generated when the BW passes 800 M. The VLAN, as depicted in
Next, the current and potential BW associated with the access port side is calculated (see step 206 in
Next, the current BW associated with the non-access port side of the trunk is calculated (see step 208 in
Then, the contribution of the specified access port is calculated in terms of a minimum required BW (see step 210 in
Current minimum BW=MIN(0(current access port side total),400(current non-access port side total))=0;
Potential minimum BW=MIN(100(potential access port side total),400(current non-access port side total))=100;
Contribution of access port f1=100M(potential minimum BW)−0M
(current minimum BW)=100M.
The algorithm then checks the capacity of the trunk to verify that the requested BW for the COS best effort is available (see step 212 in
Exemplary embodiments of the present invention assess the capacity requirements when an access port is added or removed from a VLAN. This may be performed prior to adding a new access port to ensure that enough capacity is available. In addition, exemplary embodiments of the present invention may be utilized to perform VLAN audits to determine if the trunks supporting a VLAN are reaching capacity limits. This ability to predict capacity impact and to audit a VLAN may lead to better VLAN performance because new trunk capacity may be added and/or the access port may be connected via a different trunk and thereby avoid performance degradation of the VLAN.
As described above, the embodiments of the invention may be embodied in the form of computer-implemented processes and apparatuses for practicing those processes. Embodiments of the invention may also be embodied in the form of computer program code containing instructions embodied in tangible media, such as floppy diskettes, CD-ROMs, hard drives, or any other computer-readable storage medium, wherein, when the computer program code is loaded into and executed by a computer, the computer becomes an apparatus for practicing the invention. Exemplary embodiments of the present invention can also be embodied in the form of computer program code, for example, whether stored in a storage medium, loaded into and/or executed by a computer, or transmitted over some transmission medium, such as over electrical wiring or cabling, through fiber optics, or via electromagnetic radiation, wherein, when the computer program code is loaded into and executed by a computer, the computer becomes an apparatus for practicing the invention. When implemented on a general-purpose microprocessor, the computer program code segments configure the microprocessor to create specific logic circuits.
While the invention has been described with reference to exemplary embodiments, it will be understood by those skilled in the art that various changes may be made and equivalents may be substituted for elements thereof without departing from the scope of the invention. In addition, many modifications may be made to adapt a particular situation or material to the teachings of the invention without departing from the essential scope thereof. Therefore, it is intended that the invention not be limited to the particular embodiment disclosed as the best mode contemplated for carrying out this invention, but that the invention will include all embodiments falling within the scope of the appended claims. Moreover, the use of the terms first, second, etc. do not denote any order or importance, but rather the terms first, second, etc. are used to distinguish one element from another.
This application is a continuation of U.S. patent application Ser. No. 12/604,750 filed Oct. 23, 2009, the contents of which are incorporated herein by reference in their entirety, which is a continuation of U.S. patent application Ser. No. 10/667,009 filed Sep. 19, 2003, the contents of which are incorporated herein by reference in their entirety.
Number | Name | Date | Kind |
---|---|---|---|
4926418 | Cidon et al. | May 1990 | A |
5216591 | Nemirovsky et al. | Jun 1993 | A |
5684800 | Dobbins et al. | Nov 1997 | A |
5774876 | Woolley et al. | Jun 1998 | A |
5804810 | Woolley et al. | Sep 1998 | A |
5825772 | Dobbins et al. | Oct 1998 | A |
5867494 | Krishnaswamy et al. | Feb 1999 | A |
5867495 | Elliott et al. | Feb 1999 | A |
5892441 | Woolley et al. | Apr 1999 | A |
5946308 | Dobbins et al. | Aug 1999 | A |
5949788 | Friedman et al. | Sep 1999 | A |
5959568 | Woolley | Sep 1999 | A |
5979757 | Tracy et al. | Nov 1999 | A |
5999525 | Krishnaswamy et al. | Dec 1999 | A |
6044075 | Le Boudec et al. | Mar 2000 | A |
6084528 | Beach et al. | Jul 2000 | A |
6092113 | Maeshima et al. | Jul 2000 | A |
6104701 | Avargues et al. | Aug 2000 | A |
6112251 | Rijhsinghani | Aug 2000 | A |
6147995 | Dobbins et al. | Nov 2000 | A |
6151324 | Belser et al. | Nov 2000 | A |
6199753 | Tracy et al. | Mar 2001 | B1 |
6208649 | Kloth | Mar 2001 | B1 |
6335927 | Elliott et al. | Jan 2002 | B1 |
6363319 | Hsu | Mar 2002 | B1 |
6522641 | Siu et al. | Feb 2003 | B1 |
6550672 | Tracy et al. | Apr 2003 | B1 |
6597214 | Singh et al. | Jul 2003 | B1 |
6631019 | Vujkovic-Cvijin et al. | Oct 2003 | B1 |
6633573 | Ben-Zur et al. | Oct 2003 | B1 |
6681232 | Sistanizadeh et al. | Jan 2004 | B1 |
6687339 | Martin | Feb 2004 | B2 |
6690848 | Graves et al. | Feb 2004 | B2 |
6697793 | McGreevy | Feb 2004 | B2 |
6721728 | McGreevy | Apr 2004 | B2 |
6731625 | Eastep et al. | May 2004 | B1 |
6731832 | Alvarez et al. | May 2004 | B2 |
6741615 | Patwardhan et al. | May 2004 | B1 |
6741981 | McGreevy | May 2004 | B2 |
6754174 | Ben-Zur et al. | Jun 2004 | B1 |
6754181 | Elliott et al. | Jun 2004 | B1 |
6763025 | Leatherbury et al. | Jul 2004 | B2 |
6778498 | McDysan | Aug 2004 | B2 |
6804199 | Kelly et al. | Oct 2004 | B1 |
6912232 | Duffield et al. | Jun 2005 | B1 |
6914905 | Yip et al. | Jul 2005 | B1 |
6963575 | Sistanizadeh et al. | Nov 2005 | B1 |
6976087 | Westfall et al. | Dec 2005 | B1 |
7028083 | Levine | Apr 2006 | B2 |
7092389 | Chase et al. | Aug 2006 | B2 |
7185077 | O'Toole et al. | Feb 2007 | B1 |
7446891 | Haas et al. | Nov 2008 | B2 |
7624187 | Gilmartin et al. | Nov 2009 | B1 |
7640359 | Gilmartin | Dec 2009 | B1 |
20010003833 | Tomizawa et al. | Jun 2001 | A1 |
20020031142 | Metin et al. | Mar 2002 | A1 |
20020042274 | Ades | Apr 2002 | A1 |
20020054595 | Ambe et al. | May 2002 | A1 |
20020110087 | Zelig et al. | Aug 2002 | A1 |
20020120727 | Curley et al. | Aug 2002 | A1 |
20020126690 | Narayana et al. | Sep 2002 | A1 |
20020129727 | Ettmueller | Sep 2002 | A1 |
20020191250 | Graves et al. | Dec 2002 | A1 |
20030067928 | Gonda | Apr 2003 | A1 |
20030149788 | Saint Etienne et al. | Aug 2003 | A1 |
20030169694 | Seaman | Sep 2003 | A1 |
20030172188 | Hasegawa et al. | Sep 2003 | A1 |
20040042416 | Ngo et al. | Mar 2004 | A1 |
20040058652 | McGregor et al. | Mar 2004 | A1 |
20040062198 | Pedersen et al. | Apr 2004 | A1 |
20040081180 | De Silva et al. | Apr 2004 | A1 |
20040098500 | Liu et al. | May 2004 | A1 |
20040103282 | Meier et al. | May 2004 | A1 |
20040105459 | Mannam | Jun 2004 | A1 |
20040146006 | Jackson | Jul 2004 | A1 |
20040196790 | Balakrishnan et al. | Oct 2004 | A1 |
20040210623 | Hydrie et al. | Oct 2004 | A1 |
20040221042 | Meier | Nov 2004 | A1 |
20040246976 | Balakrishnan et al. | Dec 2004 | A1 |
20040249916 | Graves et al. | Dec 2004 | A1 |
20050021766 | McKeowen et al. | Jan 2005 | A1 |
20050027851 | McKeown et al. | Feb 2005 | A1 |
20050066036 | Gilmartin | Mar 2005 | A1 |
20050122983 | Gilmartin et al. | Jun 2005 | A1 |
20060013231 | Matthews et al. | Jan 2006 | A1 |
20060062211 | Manthoulis et al. | Mar 2006 | A1 |
20100046397 | Gilmartin | Feb 2010 | A1 |
20100046525 | Gilmartin et al. | Feb 2010 | A1 |
Entry |
---|
Martin, Richard P., et al. “Effects of Communication Latency, Overhead, and Bandwidth in a Cluster Architecture.” University of California, Berkeley: Computer Science Division. International Symposium on Computer Architecture: pp. 85-97; 1997. |
Kruse, James and Keith Ross, “Cross Networking, A Top-Down Approach Featuring the Internet”, 2001, Addison Wesley Longman; Inc. pp. 280-281. |
IEEE Standards for Local and Metropolitan Area Networks: Virtual Bridge Local Area Networks, LAN MAN Standards Committee of the IEEE Computer Society, Dec. 8, 1998, 34p, IEEE Std 802. 1q-1998, The Institute of Electrical and Electronics Engineers, New York, New York, United States of America. |
Fineburg, Victoria. “A Practical Architecture for Implementing End-to-End QoS in an IP Network.” IEEE Communications Magazine: pp. 122-130. Jan. 2002. |
Number | Date | Country | |
---|---|---|---|
20120250693 A1 | Oct 2012 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 12604750 | Oct 2009 | US |
Child | 13493077 | US | |
Parent | 10667009 | Sep 2003 | US |
Child | 12604750 | US |