The present invention relates generally to data communications systems; more specifically, to Quality of Service (QoS) functions and mechanisms for providing consistent, predictable data delivery in broadband aggregation networks.
Digital Subscriber Line (DSL) technology is widely-used today for increasing the bandwidth of digital data transmissions over the existing telephone network infrastructure. Other types of Layer 1 (L1) transport mechanisms in use include Fiber-To-The-Home (FTTH) and WIMAX. In a typical system configuration, a plurality of DSL subscribers are connected to a service provider (SP) network through a Digital Subscriber Line Access Multiplexer (DSLAM), which concentrates and multiplexes signals at the telephone service provider location to the broader wide area network (WAN). Basically, a DSLAM takes connections from many customers or subscribers and aggregates them onto a single, high-capacity connection. The DSLAM may also provide additional functions such as Internet Protocol (IP) address assignment for the subscribers, IP Access Control Lists (ACLs), etc.
Asynchronous Transfer Mode (ATM) protocol networks have traditionally been utilized for communications between DSLAM devices and Broadband Remote Access Servers (BRAS) that provide authentication and subscriber management functions. A BRAS is a device that terminates remote users at the corporate network or Internet users at the Internet service provider (ISP) network, and commonly provides firewall, authentication, and routing services for remote users. Next generation BRAS devices are frequently referred to as Broadband Network Gateway (BBNG) devices.
The ATM protocol is an international standard in which multiple service types (such as voice, video, or data) are conveyed in fixed-length “cells” over point-to-point network connections. Data packet cells travel through the ATM switches from the user network interface (UNI) to the network node interface (NNI) through a process called Virtual Path Identifier/Virtual Channel Identifier (VPI/VCI) translation. The VPI/VCI identifiers are used by the ATM switches to switch/direct the subscriber traffic to a given feature server, and in the reverse direction to forward server traffic to a given DSLAM/subscriber, without ambiguity. Furthermore, the VPI/VCI mechanism is used by the feature server to identify the subscriber.
By way of background, U.S. Pat. No. 6,801,533, for example, teaches a system and method for proxy signaling in a DSLAM and generally describes a DSL network that includes communication transfer of signals from a DSLAM to a remote access server over a high-speed ATM network. Transmission of packet data over an ATM network is also taught in U.S. Pat. No. 6,785,232. U.S. Pat. No. 5,818,842 teaches a communication system with an interface device that connects a plurality of interconnected ATM switches to Local Area Network (LAN) interface adapters for connection to LAN networks.
Many service provider (SP) networks are being migrated away from ATM protocol networks to Ethernet networks. Ethernet is a technology that originated based on the idea of peers on a network sending messages in what was essentially a common wire or channel. Each peer has a globally unique key, known as the Media Access Control (MAC) address to ensure that all systems in an Ethernet have distinct addresses. Most modern Ethernet installations use Ethernet switches (also referred to as “bridges”) to implement an Ethernet “cloud” or “island” that provides connectivity to the attached devices. The switch functions as an intelligent data traffic forwarder in which frames are sent to ports where the destination device is attached. Examples of network switches for use in Ethernet network environments are found in U.S. Pat. Nos. 6,850,542, 6,813,268 and 6,850,521.
Regardless of the network technology employed, IP Quality of Service (QoS) management is usually needed both to prioritize some applications, ensuring that they receive minimized data delivery delay and assured bandwidth, and to efficiently utilize the available bandwidth of the network. This IP QoS management is typically achieved using mechanisms such as policing, shaping, and queuing.
Traffic policing mechanisms commonly rely on a token bucket algorithm to enforce a maximum rate sent (egress) or received (ingress) for traffic at any given moment. A policer typically regulates traffic by dropping data packets when the rate of traffic exceeds the specified rate limit.
Traffic shaping typically delays excess traffic using a buffer or queuing mechanism to hold packets and shape the flow when the data rate of the source is higher than expected. Generic Traffic Shaping (GTS), Class-Based Traffic Shaping (CBTS), Distributed Traffic Shaping (DTS) and Frame Relay Traffic Shaping (FRTS) are examples of shaping mechanisms. Shaping may be applied to the output of a single first-in-first-out (FIFO) queue, or may be applied to a number of queues using an IP queuing scheme where traffic is classified into queues based on context information in the IP header, such as the source or destination address. These queues may then be serviced using a queuing algorithm such as a class-based weighted fair queue (CBWFQ), for example.
A primary reason for using traffic shaping is to regulate traffic in order to avoid congestion that can occur when the sent traffic exceeds the access speed of its remote, target interface. Examples of traffic shaping mechanisms are found in U.S. Patent Publication No. 2005/0163049, which teaches a packet shaper that ensures proper packet transmission within user-specific minimum bandwidth; and U.S. Patent Publication No. 2005/0163049, which teaches a method and apparatus for classifying packets in a data processing device according to a plurality of context-specific sets of processing rules based on context identifiers associated with representative data packets.
QoS functions such as shaping have been traditionally performed on a physical port in order to reduce the total amount of traffic sent to the next box in a network. However, in the case of DSL and FTTH, often times the next Layer 2 (L2) hop is a DSLAM that lacks the ability to perform IP QoS functions. For example, many DSLAMs are unable to perform Class-Based Queuing (CPQ) based on widely used protocols such as the Dynamic Host Configuration Protocol (DHCP) or the IEEE 802.1P specification, which enables Layer 2 switches to prioritize traffic and perform dynamic multicast filtering. (The 802.1P specification works at the media access control (MAC) framing layer, and includes a three-bit header field for prioritization, which allows packets to be grouped into various traffic classes.) This means that if there are facility constraints beyond the next L2 hop which might randomly drop frames without regard for the encapsulated DSCP or 802.1P, Service Level Agreements (SLAs) that set expectations between the customer and provider could be harmed.
In ATM-based architectures such as the DSL Forum TR-59 specification, the DSLAM cannot, or is not trusted to perform IP QOS functions. In this case if the rate of a subscriber line at the DSLAM is exceeded, traffic may be discarded indiscriminately of IP QOS markings. To avoid this shaping is applied at the BRAS based upon layer 2 context such as the ATM VPI/VCI, in order to limit the traffic before it arrives at the DSLAM. The VPI/VCI represents a particular subscriber line on the DSLAM, and traffic to that VPI/VCI is shaped in order to enforce a maximum rate for traffic sent to that line, and to ensure that the physical rate of the DSL line going between the DSLAM and the subscriber is not exceeded. This type of shaping may be used in conjunction with IP queuing.
One problem with this approach, however, is that for IP sessions in Gigabit Ethernet (GE) DSLAM aggregation networks, there is no L2 identifier such as the VPI/VCI at the BRAS upon which to shape all of the traffic to a particular subscriber line. In many cases, the VPI/VCI concept is replaced at L2 with a Virtual Local Area Network (VLAN) that is shared among multiple subscribers. This means that there is no single L1, L2, or L3 data plane field (e.g., IP address, MAC address, or portion of a payload) that identifies the subscriber line; hence, there is no identifier for the bundle of traffic which needs shared QoS treatment, e.g., shaping and/or policing.
Thus, what is a needed is a new mechanism for identifying a bundle of data packet traffic that needs shared QoS treatment where there is no single L1, L2, or L3 identifier—one that ensures against indiscriminant drops and data packet collisions.
The present invention will be understood more fully from the detailed description that follows and from the accompanying drawings, which, however, should not be taken to limit the invention to the specific embodiments shown, but are for explanation and understanding only.
A QoS mechanism that enables a logical grouping of sessions to be identified based on snooped control plane information is described. In the following description specific details are set forth, such as device types, protocols, network configurations, etc., in order to provide a thorough understanding of the present invention. However, persons having ordinary skill in the networking arts will appreciate that these specific details may not be needed to practice the present invention.
A computer network is a geographically distributed collection of interconnected subnetworks for transporting data between nodes, such as intermediate nodes and end nodes. A local area network (LAN) is an example of such a subnetwork; a plurality of LANs may be further interconnected by an intermediate network node, such as a router, bridge, or switch, to extend the effective “size” of the computer network and increase the number of communicating nodes. Examples of the end nodes may include servers and personal computers. The nodes typically communicate by exchanging discrete frames or packets of data according to predefined protocols. In this context, a protocol consists of a set of rules defining how the nodes interact with each other.
As shown in
In a typical networking application, packets are received from a framer, such as an Ethernet media access control (MAC) controller, of the I/O subsystem attached to the system bus. A DMA engine in the MAC controller is provided a list of addresses (e.g., in the form of a descriptor ring in a system memory) for buffers it may access in the system memory. As each packet is received at the MAC controller, the DMA engine obtains ownership of the system bus to access a next descriptor ring to obtain a next buffer address in the system memory at which it may, e.g., store (“write”) data contained in the packet. The DMA engine may need to issue many write operations over the system bus to transfer all of the packet data.
According to one embodiment of the present invention, an Internet Subscriber Gateway (ISG) device such as a BRAS snoops control plane traffic for a logical port identifier that allows traffic having varying data plane information (e.g., multiple IP or MAC addresses) to be treated as a single group for QoS purposes. For example, shaping may be based on the logical identity of the snooped access link, which allows multiple users of a single DSL line or pipe (multiple ISP sessions) to be bundled together and managed as a single entity from a QoS perspective despite the lack of a dedicated L2 data path all the way back to the BRAS. This removes shaping and queuing requirements from the DSLAM, FFTH, or other non-QoS capable L2 aggregation devices.
Practitioners in the arts will understand that the term “data plane” refers to capacity and performance issues involved with the data physically traversing the network, while the term “control plane” refers to resources required to maintain proper functionality of the data plane. Control plane functionality typically includes service overhead such as routing, spanning tree, and management of the device. Like the data traffic that traverses the network, control plane requirements utilize processor, memory, buffering, queuing, and bandwidth resources. The term “snooping” is also well-known and generally refers to the act of monitoring and identifying traffic passing over a bus or through an interface. In the context of the present invention, a session group is broadly defined as a bundle of IP or MAC sessions against which QoS policies can be applied. An IP session is defined by traffic to or from a particular IP address or subnet and a MAC session is defined by traffic to or from a particular MAC address.
In one embodiment, DHCP relay agent information (Option 82) is utilized to acquire the identity of an L2 access link (e.g., customer premises equipment (CPE) to DSLAM) in a BRAS device via snooping of control plane information. DHCP Option 82 enables a DHCP relay agent (such as a DSLAM) to include circuit identification (ID) information about itself when forwarding subscriber-oriented DHCP packets to a DHCP server (such as a BRAS). The information sent in the ID may include information about the DSL line and the permanent virtual circuit (PVC) connection that comprises the L2 link. For example, DHCP Option 82 information contains the L2 endpoint identifier (Network Access Server (NAS) port) of the DSLAM. That is, the NAS port of the DSLAM is populated into DHCP Option 82 information that is send to the BRAS. Shaping policies are then applied at the BRAS to a logical grouping of multiple IP or MAC sessions where the grouping is based on the DHCP Option 82 information received.
In addition, other protocols, like the Point-to-Point Protocol (PPP) can also contain a logical port identifier (e.g., a PPP tag inside a PPP over Ethernet (PPPOE) active discovery request message) that may be used with, or separately from, DHCP Option 82 such that PPP and DHCP-based traffic can be shaped together as a session group. In other embodiments, shaping of L2 sessions may be based on a grouping of other arbitrary items, information, or parameters, e.g., NAS port, IP address, MAC address, subnet, etc.
Included in BRAS device 15 are routed sub-interfaces 21-24, each of which provides a connection with either a SP network, such as a virtual private network (VPN) connection with ISP1, or local applications 14. Each of sub-interfaces 21-24 is shown connected with a DSLAM 18 through u-PE 17 via a path (e.g., VLAN 31, ISP 1) operating in accordance with the IEEE 802.1Q specification, which defines a standard for Virtual LAN and its associated Ethernet frame format. In this example, DSLAM 18 and u-PE 17 are both associated with a wire center 12.
DSLAM 18 is shown connected with customer premises 38 and 39 via PVCs 36 and 37, respectively. A PVC is essentially a fixed virtual circuit (VC) between two network devices that functions as the public data network equivalent of a leased line—encapsulated within a Layer 2 protocol. However, it should be understood that PVC is not required for implementing the present invention. Instead of a PVC, the connection protocol could, for example, be native Ethernet over DSL. Premises 38 & 39 may each comprise asymmetric digital subscriber line (ADSL) modems, which are often referred to as an ATU-R (ADSL Terminal Unit-Remote). In the example of
In the embodiment of
It should be understood that the hardware of BRAS 15 may not use the control plane information in its actual QoS algorithms. Instead, the hardware is typically informed of a set of IP address, MAC address, and other data plane field combinations that will be sent to a common QOS function such as a shaper or policer; it is the set of these combinations that comprise session group 25 from the standpoint of the hardware in BRAS 15.
Furthermore, a session group need not come into existence until more than one subscriber session is seen on a single physical link from the subscriber's premises.
In the diagram of
It is appreciated that in other implementations, DSLAM 41 may be substituted with an optical line termination (OLT) device, a first Ethernet to the home, business, or campus (ETTX) device, or some other broadband access device.
As can be seen, in
In the model of
The model shown in
Finally,
It should also be understood that elements of the present invention may also be provided as a computer program product which may include a machine-readable medium having stored thereon instructions which may be used to program a computer (e.g., a processor or other electronic device) to perform a sequence of operations. Alternatively, the operations may be performed by a combination of hardware and software. The machine-readable medium may include, but is not limited to floppy diskettes, optical disks, CD-ROMs, and magneto-optical disks, ROMs, RAMs, EPROMs, EEPROMs, magnet or optical cards, or other type of machine-readable medium suitable for storing electronic instructions. Elements of the present invention may be downloaded as a computer program product, wherein the program may be transferred to a node or switch by way of data signals embodied in a carrier wave or other propagation medium via a communication link (e.g., a modem or network connection).
Additionally, although the present invention has been described in conjunction with specific embodiments, numerous modifications and alterations are well within the scope of the present invention. Accordingly, the specification and drawings are to be regarded in an illustrative rather than a restrictive sense.
Number | Name | Date | Kind |
---|---|---|---|
5331637 | Francis et al. | Jul 1994 | A |
5848277 | Sheu | Dec 1998 | A |
6055364 | Speakman et al. | Apr 2000 | A |
6073176 | Baindur et al. | Jun 2000 | A |
6078590 | Farinacci et al. | Jun 2000 | A |
6188694 | Fine et al. | Feb 2001 | B1 |
6301244 | Huang et al. | Oct 2001 | B1 |
6304575 | Carroll et al. | Oct 2001 | B1 |
6308282 | Huang | Oct 2001 | B1 |
6373838 | Law et al. | Apr 2002 | B1 |
6424657 | Voit et al. | Jul 2002 | B1 |
6430621 | Srikanth et al. | Aug 2002 | B1 |
6484209 | Momirov | Nov 2002 | B1 |
6502140 | Boivie | Dec 2002 | B1 |
6519231 | Ding et al. | Feb 2003 | B1 |
6611869 | Eschelbeck et al. | Aug 2003 | B1 |
6665273 | Goguen et al. | Dec 2003 | B1 |
6667982 | Christie et al. | Dec 2003 | B2 |
6668282 | Booth, III et al. | Dec 2003 | B1 |
6693878 | Daruwalla et al. | Feb 2004 | B1 |
6732189 | Novaes | May 2004 | B1 |
6757286 | Stone | Jun 2004 | B1 |
6763469 | Daniely | Jul 2004 | B1 |
6785265 | White et al. | Aug 2004 | B2 |
6789121 | Lamberton et al. | Sep 2004 | B2 |
6798775 | Bordonaro | Sep 2004 | B1 |
6826698 | Minkin et al. | Nov 2004 | B1 |
6829252 | Lewin et al. | Dec 2004 | B1 |
6839348 | Tang et al. | Jan 2005 | B2 |
6850542 | Tzeng | Feb 2005 | B2 |
6852542 | Mandel et al. | Feb 2005 | B2 |
6879594 | Lee et al. | Apr 2005 | B1 |
6882643 | Mauger et al. | Apr 2005 | B1 |
6892309 | Richmond et al. | May 2005 | B2 |
6954436 | Yip | Oct 2005 | B1 |
7009983 | Mancour | Mar 2006 | B2 |
7016351 | Farinacci et al. | Mar 2006 | B1 |
7047304 | Senapati et al. | May 2006 | B2 |
7092389 | Chase et al. | Aug 2006 | B2 |
7113512 | Holmgren et al. | Sep 2006 | B1 |
7116665 | Balay et al. | Oct 2006 | B2 |
7173934 | Lapuh et al. | Feb 2007 | B2 |
7277936 | Frietsch | Oct 2007 | B2 |
7310342 | Rouleau | Dec 2007 | B2 |
7315554 | Baum et al. | Jan 2008 | B2 |
7345991 | Shabtay et al. | Mar 2008 | B1 |
7408936 | Ge et al. | Aug 2008 | B2 |
7466703 | Arunachalam et al. | Dec 2008 | B1 |
20020032780 | Moore et al. | Mar 2002 | A1 |
20020087721 | Sato et al. | Jul 2002 | A1 |
20020156612 | Schulter et al. | Oct 2002 | A1 |
20020196795 | Higashiyama | Dec 2002 | A1 |
20030012183 | Butler | Jan 2003 | A1 |
20030036375 | Chen et al. | Feb 2003 | A1 |
20030101243 | Donahue et al. | May 2003 | A1 |
20030110268 | Kermarec et al. | Jun 2003 | A1 |
20030112781 | Kermode et al. | Jun 2003 | A1 |
20030142674 | Casey | Jul 2003 | A1 |
20030154259 | Lamberton et al. | Aug 2003 | A1 |
20030177221 | Ould-Brahim et al. | Sep 2003 | A1 |
20040095940 | Yuan et al. | May 2004 | A1 |
20040102182 | Reith et al. | May 2004 | A1 |
20040107382 | Doverspike et al. | Jun 2004 | A1 |
20040125809 | Jeng | Jul 2004 | A1 |
20040133619 | Zelig et al. | Jul 2004 | A1 |
20040141501 | Adams et al. | Jul 2004 | A1 |
20040151180 | Hu et al. | Aug 2004 | A1 |
20040158735 | Roese | Aug 2004 | A1 |
20040165525 | Burak | Aug 2004 | A1 |
20040165600 | Lee | Aug 2004 | A1 |
20040172559 | Luo et al. | Sep 2004 | A1 |
20040213201 | Osterlund | Oct 2004 | A1 |
20040228291 | Huslak et al. | Nov 2004 | A1 |
20040230444 | Holt et al. | Nov 2004 | A1 |
20040233891 | Regan | Nov 2004 | A1 |
20040264364 | Sato | Dec 2004 | A1 |
20050007951 | Lapuh et al. | Jan 2005 | A1 |
20050025143 | Chen et al. | Feb 2005 | A1 |
20050030975 | Wright et al. | Feb 2005 | A1 |
20050044265 | Vinel et al. | Feb 2005 | A1 |
20050063397 | Wu et al. | Mar 2005 | A1 |
20050068972 | Burns et al. | Mar 2005 | A1 |
20050089047 | Ould-Brahim et al. | Apr 2005 | A1 |
20050099949 | Mohan et al. | May 2005 | A1 |
20050152370 | Meehan et al. | Jul 2005 | A1 |
20050157664 | Baum | Jul 2005 | A1 |
20050157751 | Rabie et al. | Jul 2005 | A1 |
20050175022 | Nishimura et al. | Aug 2005 | A1 |
20050190773 | Yang et al. | Sep 2005 | A1 |
20050239445 | Karaogguz et al. | Oct 2005 | A1 |
20050249124 | Elie-Dit-Cosaque et al. | Nov 2005 | A1 |
20050286503 | Oda et al. | Dec 2005 | A1 |
20060007867 | Elie-Dit-Cosaque et al. | Jan 2006 | A1 |
20060092847 | Mohan et al. | May 2006 | A1 |
20060098607 | Zeng | May 2006 | A1 |
20060126496 | Filsfils et al. | Jun 2006 | A1 |
20060182037 | Chen et al. | Aug 2006 | A1 |
20060248277 | Pande | Nov 2006 | A1 |
20060262794 | Livet et al. | Nov 2006 | A1 |
20060285500 | Booth | Dec 2006 | A1 |
20060285501 | Damm | Dec 2006 | A1 |
20070076719 | Allan et al. | Apr 2007 | A1 |
Number | Date | Country |
---|---|---|
WO 2007031002 | Mar 2007 | WO |
WO 2008089370 | Jul 2008 | WO |
Entry |
---|
Lahti “Quality of Service in the Poin-to-Point Protocol over Ethernet” in: Google Scholar (on line, <URL:http://www.e.kth.se/˜e95—pla/exjobb/doc/Lahti—Thesis—QoS—in—PPPoE.pdf>) Oct. 1, 2000. |
Do-Wire Edge-To Edge (PWE3) Working Group, Simon Delord, UECOMM; Philippe Niger, France Telecom; Yuichi Ikejiri, Yuichiro Wada, NTT Debor: “PWE3 Applications & OAM Scenarios; draft-delord-pwe3-oam-applications 02.txt” Standard-Working-Draft, Internet Engineering Task Force, IETF, CH, No. 2, Oct. 1, 2005, XP015042128 ISSN: 0000-0004 abstract p. 10, paragraph 3 Section 3.1.1.1. on pp. 12-13; http://ftp.ist.utl.pt/pub/drafts/draft-delord-pwe3-oam-applications-02.txt. |
Blunk et al. Draft RFC 2284—Extensible Authentication Protocol EAP, Feb. 2004; http://tools.ieff.org/html/draft-ietf-eap-rfc2284bis-09. |
Light Reading, Inc., Distributed-Edge Artecture, Nov. 25, 2003. |
Landron, Use of the IEEE Assigned Type Field with IEEE std 802.3, 1998 Edition Local and Metropolian Area Networks, Apr. 16, 2004. |
Marc Lasserre et al., “Virtual Private LAN Services over MPLS”, Mar. 2003, Internet Draft Document, pp. 4-22; http://tools.ietf.org/html/draft-lasserre-vkompella-ppvpn-vpls-04. |
Number | Date | Country | |
---|---|---|---|
20070076607 A1 | Apr 2007 | US |