This application relates to the field of optical communication networks, and particularly to large-scale routers for optical communication networks.
In an optical router the information that passes through the core switching fabric is a chunk of information that must go from the input side of a line shelf through the optical switch itself to the egress side of a switch shelf. No storage is available in the optical switch itself. Therefore the information must be formatted in such a way that data passes through the optical switch and is collected on the egress side, such that every chunk that is collected can potentially require a different phase adjustment for clock and data recovery. Further, since the chunk size is significantly larger than the minimum size packet that is brought into the system, there needs to be a more efficient method to transfer small packets through the optical switch itself.
An optical system exhibits cross-talk and relatively high loss characteristics. Thus, errors that are incurred through the optical switch require error checking and correcting for a high degree of reliability. To pick a given chunk out of a stream of random bits requires framing information. Additionally, it is required to have a reasonably equal mix of zeroes and ones with reasonable limitation of continuous streams of zeroes and ones for DC balance going through the optical switch, resulting in DC balance of light coming into the optical receiving circuitry from the switch itself.
The present invention is directed to a chunk format, which solves the various problems to allow a purely optical switch to operate at the core of a large-scale, high data throughput router. The format includes a preamble that allows each individual chunk to have clock and data recovery performed before the actual information within the chunk is received. The format further includes a chunk header that contains information specific to the entire chunk. The chunk according to the present format can contain multiple packets, with each packet having its own packet header for packet-specific information. The format provides for a scrambler seed which allows scrambling the data to achieve a favorable zero and one balance as well as minimal run lengths. There are many multiple scrambler seed values that are available to be used, such that there can be a random choice of scrambler seed for any particular chunk to avoid the malicious forcing of zero and one patterns or run length of bits zeroes and ones. There are a chunk cyclical redundancy check (CRC) as well as forward error correction (FEC) bytes to detect and/or correct any errors and also to insure a high degree of data and control integrity. Advantageously, a framing symbol inserted into the chunk format itself allows the receiving circuitry to identify or locate a particular chunk format. “Break Bytes” and “Make Bytes” fields located at the beginning of a chunk preamble precondition an optical receiver to a proper state before the actual chunk arrives at the receiver. A “Break Bytes” field is configured to maintain a 50% density of 0's and 1's for the transmit laser during the switch fabric “dark period.” The receiver threshold level is quickly reestablished by setting the value of a “Make Bytes” field to all ones. The “Make Bytes” are followed by preamble bytes, which are alternating ones and zeros.
Various aspects of the invention are described in concurrently filed, co-pending, and commonly assigned U.S. application Ser. No. 09/703,057, filed on 31 Oct. 2000, entitled “System And Method for IP Router With an Optical Core,” to U.S. application Ser. No. 09/703,056, filed on 31 Oct. 2000, entitled “System and Method for Router Central Arbitration,” to U.S. application Ser. No. 09/703,058, filed on 31 Oct. 2000, entitled “Timing and Synchronization for an IP Router using an Optical Switch,” to U.S. application Ser. No. 09/703,027, filed on 31 Oct. 2000, entitled “Router Network Protection Using Multiple Facility Interfaces,” to U.S. application Ser. No. 09/703,043, filed on 31 Oct. 2000, entitled “Router Line Card Protection Using One-for-N Redundancy” and to U.S. application Ser. No. 09/703,064, filed on 31 Oct. 2000, entitled “Router Switch Fabric Protection using Forward Error Correction,” the disclosures of which are incorporated herein by reference.
The foregoing has outlined rather broadly the features and technical advantages of the present invention in order that the detailed description of the invention that follows may be better understood. Additional features and advantages of the invention will be described hereinafter which form the subject of the claims of the invention. It should be appreciated by those skilled in the art that the conception and specific embodiment disclosed may be readily utilized as a basis for modifying or designing other structures for carrying out the same purposes of the present invention. It should also be realized by those skilled in the art that such equivalent constructions do not depart from the spirit and scope of the invention as set forth in the appended claims. The novel features which are believed to be characteristic of the invention, both as to its organization and method of operation, together with further objects and advantages will be better understood from the following description when considered in connection with the accompanying figures. It is to be expressly understood, however, that each of the figures is provided for the purpose of illustration and description only and is not intended as a definition of the limits of the present invention.
For a more complete understanding of the present invention, reference is now made to the following descriptions taken in conjunction with the accompanying drawing, in which:
A communication network router is a system that distributes information from multiple sources to multiple destinations in the network. At the core of a router is a switching fabric that directs the information from the multiple sources to the multiple destinations. A fabric is generally defined as a collection of devices that cooperatively perform routing functions. In accordance with embodiments of the present invention, all information flows through the fabric in substantially fixed sized data chunks. In some embodiments the switch fabric contains an optical switch.
The “Break Bytes” field 101-3 is configured to maintain a 50% density of 0's and 1's for the transmit laser. “Break Bytes” field 101-3 will have a higher density of zeros in order to balance the all ones in “Make Bytes” field 101-2. The “Break Bytes,” “Make Bytes,” and preamble fields are all programmable in length to allow flexibility. It is noted that the “Break Bytes” and “Make Bytes” fields can alternatively be located at the trailing end of the string of chunk fields in
Referring again to
Chunk header 102 includes a master chunk bit 102-6, which specifies that a particular chunk is a master chunk, such that every sixteenth chunk sent through the switch is designated as a master chunk. Chunk header 102 also contains a sequence number 102-7, providing for separate sequence streams for guaranteed bandwidth chunks and for best effort chunks. The sequence number is unique within a source/destination pair, such that a destination is able to look at the last sequence number received for a particular source and guarantee that no chunks were corrupted beyond the point of being able to use them. The sequence number is used for alarming and for alerting that a chunk potentially was corrupted. Further, in chunk header 102 there is a re-initialize bit 102-8 indicating that sequence number 102-7 should be re-initialized at the destination. This is used to enable sequence number re-initialization to avoid the alarming mechanism.
Each individual packet within chunk 10 has its own header, for example, fields 103-1 and 103-2, which includes information specific to that packet. Packet header information specifies whether a packet segment contained in the chunk is a packet start or a packet end, if that packet segment is the entire packet including both start and end, or whether the packet segment is the middle of the packet. This information is used for reassembling multi-chunk packets as well as for specifying whether a packet is contained completely within the chunk. Additionally, contained in a packet header is a byte count specifying the number of bytes contained in the packet segment associated with this particular packet header. Also included is a bit, which if active, indicates that the packet should never be discarded. This bit is frequently set for a guaranteed bandwidth packet in chunks marked as guaranteed bandwidth chunks. Best effort 1, 2 and 3 classes should be designated only if the chunk has been indicated as a best effort chunk. There is a Point-to-Point Protocol (PPP) header format specifying how the destination facility module should treat the packet in terms of what PPP format should be appended to the chunk as it is being sent out. Packet header 103-1, 103-2 also contains a bit indicating whether the packet should be sent out through the output of the router or whether it should be looped back into the destination packet forwarding engine to be used by that packet forwarding engine. Packet header 103-1, 103-2 also includes a destination tributary indicator specifying to which tributary at a destination port the packet should be sent.
Fields 104-1 and 104-2 within the chunk format are the actual payloads of the packets associated with respective packet headers 103-1 and 103-2. Packet header/payload pairs, for example 103-1 and 104-1, can be contained within the chunk payload up to a limit on the order of nine of these pairs, due to the 400 byte total payload size of a chunk versus a minimum packet size of 40 bytes. A chunk filler 105 is the next field. If there are not sufficient data in packets to fill the chunk payload, then the unused payload capacity is filled with non-traffic bytes.
The next field is a scrambler seed 106. The scrambler seed value is used to insure an equal balance of zeroes and ones across a chunk as well as to minimize the run lengths of ones and zeroes respectively across the chunk. A particular scrambler algorithm used for the chunk format does not insure a particular nisi length of zeroes and ones but minimizes that run length by scrambling of the bits.
The next field is a two-byte chunk CRC 107 used to insure that the overall chunk consisting of fields 102 through 107 has the proper CRC value once it is corrected by the forward error correcting (FEC) information described below in more detail. Fields 102 through 107 in the present router implementation contain a total of 400 bytes, including four bytes for chunk header 102, four bytes for each packet header 103-1, 103-2, a flexible number of bytes for packet payloads, for example 104-1, 104-2, two bytes for scrambler seed 106, two bytes for CRC 107, and the remainder in chunk filler 105.
The next field in sequence is a framing symbol 108, which is 16 bytes in length and is used to determine where in a stream of bits beginning and trailing end of a chunk are located. Framing symbol 108 is a unique symbol that must be found within a window roughly 10 nanoseconds in size, in order to identify a chunk. The framing symbol could be found anywhere within those 10 nanoseconds and it must be guaranteed that the framing symbol is unique within those 10 nanoseconds worth of bits.
Sixteen-byte framing symbol 108 is located near the trailing end of the chunk format, because the trailing end of the chunk format is a more reliable place than the beginning of the chunk to position the framing symbol. The beginning of the chunk format near preamble 101-1 has a potential for being unreliable, in that it takes more than the expected number of bits to acquire the phase of the incoming signal of bits of information, and the first few bits of the fields at the beginning of the chunk may become corrupted whereas the trailing end of the chunk should not suffer from that problem. Accordingly, framing symbol 108 is located near the trailing end of chunk 10, to insure with the highest probability that it is received without errors. Since framing symbol 108 is not covered by FEC field 109, the framing symbol must be received without any correction applied to it. For greater reliability two bytes of 16-byte framing symbol 108 are placed just before FEC field 109, and 14 bytes worth of bits are intermixed into the preceding 56 bytes of fields. Accordingly each of these preceding 56 bytes contains two bits of framing symbol 108 and six bits of actual data.
In an embodiment of the present invention, a 400-byte chunk payload is delivered to an internal optics ASIC, which generates 32 FEC bytes. Once the 32 FEC bytes are generated, then 16-byte framing symbol 108 is inserted into the chunk payload. Viewing the 400-byte chunk payload as a bit stream, framing symbol 108 is inserted as two bits of framing symbol per six bits of data at the trailing end of the 400-byte chunk payload. Of the 16-byte framing symbol, 2 bytes are inserted after the 400-byte payload, and the other 14 bytes are intermixed two bits at a time per 6 bits of other data. The two bits that are intermixed always have the same value, a zero and a one bit. These two bits ensure that, when the internal optics ASIC scans the payload within the framing window, it will find no other framing symbol pattern until it actually finds the intended framing symbol. Once the framing symbol bits are inserted, then the 32 FEC bytes are appended. Once the framing symbol is inserted, then the intermixed fields are no longer byte aligned fields.
In operation, a receiving ASIC looks for the framing symbol. There is enough variation in arrival times of chunks that the receiving ASIC starts looking for the framing symbol up to 56 bytes before the actual framing symbol. To make sure that the receiving ASIC does not incorrectly find another string of bits having the same pattern as the framing symbol, 14 bytes of the framing symbol are forced two bits per byte into the preceding 56 bytes of the chunk. The receiving ASIC finds the framing symbol and then stops looking. Accordingly there is no need to force in extra bits after the framing symbol. If the receiving ASIC is still looking for the framing symbol after the point where it should be located, it means that the framing symbol is corrupted. If the framing symbol is corrupted, then the receiving ASIC relies on the redundancy in the system.
Although the present invention and its advantages have been described in detail, it should be understood that various changes, substitutions and alterations can be made herein without departing from the spirit and scope of the invention as defined by the appended claims. Moreover, the scope of the present application is not intended to be limited to the particular embodiments of the process, machine, manufacture, composition of matter, means, methods and steps described in the specification. As one of ordinary skill in the art will readily appreciate from the disclosure of the present invention, processes, machines, manufacture, compositions of matter, means, methods, or steps, presently existing or later to be developed that perform substantially the same function or achieve substantially the same result as the corresponding embodiments described herein may be utilized according to the present invention. Accordingly, the appended claims are intended to include within their scope such processes, machines, manufacture, compositions of matter, means, methods, or steps.
This application is a continuation of U.S. patent application Ser. No. 09/703,038, entitled “System and Method for Router Data Aggregation and Delivery,” filed on 31 Oct. 2000 now U.S. Pat. No. 7,613,183. This application is related to U.S. application Ser. No. 09/703,057, filed on 31 Oct. 2000, entitled “System And Method for IP Router With an Optical Core,” to U.S. application Ser. No. 09/703,056, filed on 31 Oct. 2000, entitled “System and Method for Router Central Arbitration,” to U.S. application Ser. No. 09/703,058, filed on 31 Oct. 2000, entitled “Timing and Synchronization for an IP Router using an Optical Switch,” to U.S. application Ser. No. 09/703,027, filed on 31 Oct. 2000, entitled “Router Network Protection Using Multiple Facility Interfaces,” to U.S. application Ser. No. 09/703,043, filed on 31 Oct. 2000, entitled “Router Line Card Protection Using One-for-N Redundancy” and to U.S. application Ser. No. 09/703,064, filed on 31 Oct. 2000, entitled “Router Switch Fabric Protection using Forward Error Correction,” the disclosures of which are incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
4922486 | Lidinsky | May 1990 | A |
5500858 | McKeown | Mar 1996 | A |
5544161 | Bigham | Aug 1996 | A |
5577180 | Reed | Nov 1996 | A |
5583859 | Feldmeier | Dec 1996 | A |
5583863 | Darr, Jr. | Dec 1996 | A |
5590122 | Sandorfi | Dec 1996 | A |
5627836 | Conoscenti | May 1997 | A |
5691983 | Nawata | Nov 1997 | A |
5691984 | Gardner | Nov 1997 | A |
5694438 | Wang | Dec 1997 | A |
5708961 | Hylton | Jan 1998 | A |
5896374 | Okumura | Apr 1999 | A |
5903324 | Lyons | May 1999 | A |
6061358 | Nelson | May 2000 | A |
6081570 | Ghuman | Jun 2000 | A |
6081650 | Lyons | Jun 2000 | A |
6151318 | Woodward | Nov 2000 | A |
6226296 | Lindsey | May 2001 | B1 |
6252878 | Locklear et al. | Jun 2001 | B1 |
6256321 | Kobayashi | Jul 2001 | B1 |
6278709 | Walker | Aug 2001 | B1 |
6330245 | Brewer | Dec 2001 | B1 |
6335992 | Bala | Jan 2002 | B1 |
6438515 | Crawford | Aug 2002 | B1 |
6463506 | McAllister | Oct 2002 | B1 |
6470007 | Berman | Oct 2002 | B1 |
6496901 | De Martine | Dec 2002 | B1 |
6516435 | Tsunoda | Feb 2003 | B1 |
6522667 | Oda | Feb 2003 | B1 |
6526574 | Jones | Feb 2003 | B1 |
6567199 | Nakaoka | May 2003 | B1 |
6570871 | Schneider | May 2003 | B1 |
6574224 | Brueckheimer et al. | Jun 2003 | B1 |
6594278 | Baroudi | Jul 2003 | B1 |
6631481 | Hoard et al. | Oct 2003 | B1 |
6633564 | Steer | Oct 2003 | B1 |
6658010 | Enns | Dec 2003 | B1 |
6665495 | Miles | Dec 2003 | B1 |
6687247 | Wilford | Feb 2004 | B1 |
6701088 | Watannabe | Mar 2004 | B1 |
6711357 | Brewer | Mar 2004 | B1 |
6718139 | Finan | Apr 2004 | B1 |
6763023 | Gleeson et al. | Jul 2004 | B1 |
6765931 | Rabenko et al. | Jul 2004 | B1 |
6829237 | Carson | Dec 2004 | B2 |
6829437 | Kirby | Dec 2004 | B2 |
6836479 | Sakamoto et al. | Dec 2004 | B1 |
6839322 | Ashwood Smith | Jan 2005 | B1 |
6910148 | Ho | Jun 2005 | B1 |
6938179 | Iyer | Aug 2005 | B2 |
6970648 | Ofek | Nov 2005 | B2 |
7006525 | Jha | Feb 2006 | B1 |
7031607 | Aswood Smith | Apr 2006 | B1 |
7058027 | Alessi et al. | Jun 2006 | B1 |
7093160 | Lau | Aug 2006 | B2 |
7139247 | Desai | Nov 2006 | B2 |
7236453 | Visser | Jun 2007 | B2 |
7269133 | Lu | Sep 2007 | B2 |
7292535 | Folkes | Nov 2007 | B2 |
20010010694 | Lindsey | Aug 2001 | A1 |
20010046208 | Eng | Nov 2001 | A1 |
20020044555 | Kamo | Apr 2002 | A1 |
20020080829 | Ofek | Jun 2002 | A1 |
20030005387 | Tsunoda | Jan 2003 | A1 |
20050078673 | Sakamoto et al. | Apr 2005 | A1 |
Number | Date | Country | |
---|---|---|---|
Parent | 09703038 | Oct 2000 | US |
Child | 12563844 | US |