AU693865C - Method for rerouting a packet-mode data connection - Google Patents
Method for rerouting a packet-mode data connectionInfo
- Publication number
- AU693865C AU693865C AU18139/95A AU1813995A AU693865C AU 693865 C AU693865 C AU 693865C AU 18139/95 A AU18139/95 A AU 18139/95A AU 1813995 A AU1813995 A AU 1813995A AU 693865 C AU693865 C AU 693865C
- Authority
- AU
- Australia
- Prior art keywords
- route
- rerouting
- node
- message
- buffering
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Description
Method for rerouting a packet-mode data connection
The invention relates to a method according to the preamble of the accompanying claim 1 for rerouting a packet-mode data connection.
In principle, the method of the invention can be applied in any packet switched network but the invention is primarily intended for a FR network (Frame Relay network) for which its features (the use of buffering) are very well suited. However, the invention can also be used in a (generally faster) ATM (Asynchronous Transfer Mode) network, for example.
Replacing previous packet network connections, Frame Relay is a packet network technique for transmitting frames of varying lengths, a heavily stripped-down version of a nowadays generally used protocol (X.25) that requires a lot of processing. By stripping operations that have become in a way unnecessary with time because of improvements in the quality of the transmission network, frame relay in the Frame Relay technique has become faster and more efficient .
ATM is a new packet-switching technique in which the problems of conventional packet networks have been solved by introducing short packets of a standard length (53 bytes) known as cells. Each cell contains a payload part of 48 bytes and a header of 5 bytes in length.
However, in this connection the FR or ATM technology will not be described any further as the method of the invention is not connected to any FR or ATM specific arrangements, but the node devices of the network are only required to have an ability to buffer. Frame Relay service is generally described in the CCITT recommendation 1.233, "Frame Mode Bearer Services" , and
the related protocol recommendation Q.922. For a more detailed description of the Frame Relay technique, a reference is made to the article "An Overview of Frame Relay Technology" , Data-pro Management of Data Communications, McGraw-Hill Incorporated, April 1991. A closer description of the ATM technology can be found, for example, in the CCITT recommendation 1.610, "B-ISDN operation and maintenance principles and functions" , CCITT Study Group XVIII Geneva, 9-19 June 1992, or in the recommendation 1.361, "B-ISDN ATM Layer Specification" , CCITT; ANSI T1.617 Annex D.
In packet networks connections can be "protected" by having one or two alternative routes between nodes in addition to the main route. In this case traffic can be transferred from one route to another if necessary. One of the requirements of the ATM network is, for example, that the order of the cells in the connection will remain invariable in the network. Because the ATM headers of the data cells do not have a sequence number to make the rearrangement of the cells possible, the connection has to travel via the same route through the network.
Transferring traffic from one route to another leads very probably to changes in the order of the cells and thus, loss of data, in case the delay of the new route is smaller than that of the old route.
It is an object of the present invention to eliminate the above-mentioned disadvantage and to achieve a method in which a virtual connection transmitting packet-mode data is transferred from one route to another as fast as possible with a minimum loss of traffic even in conflict situations in which the nodes at the termination points of the route have contradictory information about the routes in use. This object is achieved with the method of the invention,
which is characterized by what is described in the characterizing part of the accompanying claim 1.
The idea of the invention is to accomplish a dialogue which is based on mutual message exchange between the nodes, and on the basis of which the nodes will buffer data in their transmitters only when needed and also, until they can ascertain that they are transferring data to the same route so that the order of the packets at the opposite end will not be changed. The opposite end is notified of the need for buffering in each rerouting s vαation by a message exchange.
The method of the invention provides maximum probablity that the packet data will reach its destination and even in the correct order. Traffic is lost only when an active route becomes physically faulty and even then only the traffic already transmitted in between the appearance and detection of the fault is lost.
In the following, the invention and its preferred embodiment are described in more detail with reference to the example of the accompanying drawing, in which
Figure 1 shows a part of a packet-switched network that has two possible routes between two nodes, Figure 2 shows a schematic structure of the nodes in the termination points of the routes according to Figure 1,
Figure 3 shows the operation of a state machine for rerouting, Figure 4 shows the operation of a state machine for buffering and
Figure 5 shows the operation of a state machine for route testing.
The method of the invention is especially suitable for networks using semi-permanent virtual connections (PVC) in case a) traffic on a faulty active route has to be transferred to an alternative route, or b) traffic on an active route which is in order is directed to another route.
In the following, alternative a) is called forced rerouting and alternative b) , controlled rerouting. Controlled rerouting is performed either when disabling a route for maintenance procedures or when returning from an alternative route to an ordinary route.
The ends of a virtual connection are often in different nodes far away from each other. Thus, the different nodes control the ends of the virtual connection independently.
Figure 1 shows a network or a part of a network in which there are two possible routes between subscribers A and B. Nodes of the network are denoted by reference numerals 1...4 and alternative routes between the nodes 1 and 4 are denoted by reference signs a-b and A-B. The following markings are used in the description: - subscriber A - the first party of the data connection
- subscriber B - the second party of the data connection
- a-b, A-B - bidirectional routes on which the data of subscriber A or B can be transmitted
- a→b, A→B - unidirectional routes on which the data of subscriber A can be transmitted to subscriber B
- b→a, B→A - unidirectional routes on which the data of subscriber B can be transmitted to subscriber A.
The method of the invention does not as such require of the internal structure of the node anything else but the ability to buffer data. Thus, the internal structure of the node can vary in many ways depending on the network in use. The node (1 or 4) can simply be similar to a FR node (known per se) , as shown in Figure 2, in which a FR frame from a subscriber is received in an input buffer 15a, from which it is switched further onto a router 16, which routes it onto a correct output buffer (15c or 15e) . In this case (cf . Figure 1) there are two trunk connections (to nodes 2 and 3) and one subscriber connection (buffers 15a and 15b) .
A description is first given of forced rerouting that is a result of faults in the connection.
In the example, it is presumed that in an initial situation the route a-b is active. Forced rerouting starts when, for example, node 1 detects that the route a→b transmitting traffic is faulty (the node detects that the data link to the opposite end is not operating) . The detection can be based, for example, on a notification of the fault from the opposite end. After a fault detection of this kind, node 1 immediately transfers the traffic (the data packets to be transmitted) to a usable alternative route A→B and sends a notice of this to the opposite end (node 4) via this new route . According to a more advantageous (more efficient) embodiment, the order is as shown above; the node first transfers the traffic to be transmitted on an alternative route and only after that, sends said notice. (Rerouting is performed first so that no frame is lost unnecessarily.)
If node 4 detects the fault at the same time as node 1, both nodes transfer the traffic to the route A-B simultaneously. Both nodes also receive a notice from the opposite end of the transition of the other traffic direction to the same bidirectional route that it has just started or is just starting to use. In this case the nodes are satisfied with these notices and forced rerouting is over.
If node 4 does not detect the fault fast enough, it receives, as a first indication of the fault on the route a-b, a notice from an alternative route A-B of its own of the transition of the opposite end to operate on this new route. (In the method of the invention the nodes are also constantly listening to the routes that are in reserve.) At the latest, after receiving this notice, node 4 accepts all the incoming traffic from the route A-B and transmits it forwards to the subscriber. At the same time node 4 starts buffering the data packets to be transmitted to an active route b→a and also tests the condition of said route. The testing can be conducted, for example, with a "ping- pong" type of message exchange which has the advantage that it will thus allow the condition of the whole connection to be tested. After finding the route faulty, node 4 sends the buffered frames via a new route B→A and continues to direct traffic to this route. In this case forced rerouting is over.
In a possible conflict situation, in which the different ends (nodes 1 and 4) of a virtual connection want to transfer the traffic to different routes, the conception of one node is always dominating. The messages used for managing the virtual connection have a field in which the rank of different ends is shown
(the position of the field in a frame depends on the protocol in use) . This identifier can, for example, be
a node number in the network, in which case the node with a higher number, for example, dominates the node with a lower number.
A conflict situation is created if the virtual connection between subscribers A and B also has a third route a' -b' (not shown in the figure) that is configured in node 1, for example, to be a secondary alternative route but in node 4, to be a primary alternative route. In this case the operation of node 4 depends on whether it is a dominating or an obeying node.
In case node 4 is dominating, it sends the buffered packets via its own primary alternative route a' -b' and commands the opposite end to use this route, too. Thereafter the obeying node 1 transfers the traffic to the route a' -b' by means of controlled rerouting, by which the nodes make sure by using a special return- from-route notice and an acknowledgement in response to it that all the data messages have arrived at the opposite end before transferring the transmission to a new route. Controlled rerouting and the message exchange used therein are described in more detail below.
If node 4 detects during forced rerouting described above, that the fault has disappeared in the original route b→a, a conflict situation is created, in which the operation of the node again depends on whether it is a dominating or an obeying node. If a dominating node detects that the original route is in order again, it stops the buffering of the data packets to be transmitted to the virtual connection, transmits the buffered packets via the original route, and commands the opposite end to use the original route by sending it a management message to this effect. In this case it is most advantageous to keep the order of things such that the management message is sent first and the data packets only after that. If an obeying node detects that
the original route is in order again, it will not transfer the traffic directly back to the original route but acts as in controlled rerouting, ensuring first by means of a message exchange that all the data packets have arrived from the route to be disabled to the opposite end before new data packets are transmitted on the new route.
In one (fast) embodiment of the invention the above-described forced rerouting is made even more effective in such a way that the node detecting the fault first commands the opposite end, by sending a special forced rerouting message, to transfer the traffic to a new route immediately, that is, wholly without buffering. The node that has received this command will test the condition of the old active route only after transferring the traffic from said route.
When both ends of the virtual connection detect at the same time that the active route is faulty, they send forced rerouting commands via the new active routes they have selected. The nodes select different routes, for example, when their routing information is divergent, as described above in connection with the route a' -b' . In this case after receiving a forced rerouting command, the obeying node is forced to transfer traffic from the route it selected to the route the dominating node selected without any safety measures (buffering) . The danger of changes to the order of the data packets is then quite evident.
The above-described fast forced rerouting is therefore subject to faults if the routing data at the different ends of the virtual connection are contradictory. If the routing data of the virtual connection is in order, this method is, however, quite safe. An advantage of this embodiment is its speed since the data packets are not buffered.
Forced rerouting and its different embodiments were described above. In the following, an alternative method is described, that is, controlled rerouting which does not involve a fault situation as forced rerouting does, but a situation in which there is no real necessity to perform rerouting as fast as possible as both routes of the connection are still in use.
Controlled rerouting from the route A-B to the route a-b is started, for example, when the primary route a-b is in order again or when the network operator wants to disable the route A-B for some other reason.
(In a typical situation the primary route is the fastest one of the alternative routes and thus, it is always used when it is in order, if ' ossible. Therefore, even the example of controlled rerouting shown here concerns a return to the primary route a-b.)
If node 1, for instance, is the first one to start controlled rerouting, it starts buffering the data packets to be transmitted to the virtual connection and notifies the opposite end (for example, via the route to be enabled) that it is enabling the route a→b. Thus, it is advantageous to the invention that all these management messages concern just the route on which they travel. (In this case the different ends need not have any common route identification data.)
When node 4 is satisfied with this new route, it starts buffering the traffic, too and transmits a corresponding notice to node 1. In conflict situations, in which the different ends of the virtual connection intend to transfer traffic to different routes, the conception of one node is dominating, in the manner described above. When the nodes have agreed upon the new active route, they both send to each other special return-from-route notices.
The return-from-route notice is sent to that route (A-B) of the virtual connection which is to be disabled, routed like ordinary data packets so that it will not overtake them. (The return-from-route notice is thus transmitted to the route to be disabled after the data packets.) When a node receives a return-from- route notice from the route of the virtual connection, it sends an acknowledgement via the same route to the sender. Upon receiving this acknowledgement about returning from the route, the node can be sure of the arrival of all the data packets from said route to the opposite end (unless they have been destroyed on the way) .
When node 1 has received a return-from-route acknowledgement from the route A-B to be disabled, it stops buffering the data packets to be transmitted to the virtual connection and transmits the buffered data packets to a new active route a→b. When node 4 has also received a return-from-route acknowledgement and acted correspondingly, the traffic as a whole is transferred to the route a-b in such a way that messages are not lost or their order is not changed because of rerouting.
According to one preferred embodiment of the invention, it is advisable to use time supervision in controlled rerouting as a further check in case a return-from-route acknowledgement will not arrive. After the expiration of the time-out period, the buffering of traffic is stopped, which means that the time-out period has to be of such a long duration that the probability of the wrong order of the data packets will be very small. On the other hand, the time supervision period has to be so short that it is very improbable that the ability of the node to buffer (depending on the length of the buffers in use) will end during the period.
The method of the invention makes sure that traffic is not received simultaneously from different routes of the virtual connection. The method can possibly be complemented in such a way that the data packets are not accepted (even if received) from other routes after the nodes have come to an agreement on the route to be used. Thus it is further ensured that the data packets do not arrive in a wrong order, but this will lead to a traffic blackout, for example, when a notice of rerouting gets lost because of a transmission error, for example. Therefore, a better alternative is to transmit all the received data packets on to the subscriber.
Figures 3...5 show as an example the essential parts of state machines with which both forced rerouting and controlled rerouting can be performed (fast forced rerouting is not shown) .
Figure 3 shows the operation of a state machine concerning a route in a node. One route has four main states which are marked as follows: ROUTE IN USE, ROUTE IN RESERVE, ROUTE AWAITS ACKNOWLEDGEMENT and ROUTE FAULTY. Transitions between these states are marked with reference signs A...M. (The transition to the state ROUTE IN USE from the states ROUTE AWAITS ACKNOWLEDGEMENT or ROUTE IN RESERVE can have two stages, D+I or J+I.) Transitions caused by messages received by the node and the possible messages sent as a result of these transitions are described in the following. The received messages are shown by the letter R and a colon in front of them (R:) . The messages to be sent are shown similarly by the letter S (S:) . The messages can be any messages with the meaning described below, and they do not necessarily have to come from the opposite node but they can come from farther away, from the network management, for instance. In connection with the
messages to be sent, the destination of the message is indicated after the letter S, separated by a slash. If the letter S is in parenthesis, it means that said message is not sent every time, but only when needed. Transition A
- R: "Testing failed", Transition B
- R: "Even the last fault has been removed from the route", - S/opposite end: "Route in order here, how about there?"
Transition C
R 'Testing failed'
- R "Route faulty at my own end",
- R "Fault on the route",
- R "Fault at the opposite end",
- (S) /alternative route: "Get active at once". It is to be noted that all four received messages are alternative and even one of them causes a transition from the state ROUTE IN USE to the state
ROUTE FAULTY. In case of the first two messages, a message "Our end faulty" is sent when necessary. At Transition C traffic is stopped (a fault situation) .
Transition D - R: "Route in order also at the obeying end".
Transition E (internal transition in the state ROUTE IN USE)
- R: "Possible forced rerouting",
- S: "Start testing". Transition F (internal transition in the state
ROUTE IN USE)
- R: "Testing in order",
- S: "Stop buffering". Transition G - R: "Get active at once",
- S/opposite end: "Traffic onto this route",
- S: "Stop buffering".
When this transition occurs, the node starts the traffic and sends said message. Transition H
- R: "Return-from-route" ,
- S/opposite end: "Return-from-route" . Transition I
- S/opposite end: "Traffic onto this route", - S: "Start buffering",
- S/former route: "Return-from-route" . Transition J
- R: "The opposite end priorities also allow enabling the route", - R: "The dominating end uses this route".
Transition K
- R: "Route also in order at the dominating end",
(S) /opposite end: "Our priorities allow enabling the route" .
Transition L (internal transition in the state ROUTE IN RESERVE)
- R: "Return-from-route acknowledgement",
- S: "Stop buffering". Instead of a return-from-route acknowledgement, the transition can be caused by the expiration of the time-out period.
Transition M (internal transition in the state ROUTE IN RESERVE) - R: "The obeying end uses this route",
- S/active route: "Possible forced rerouting",
- S: "Start buffering".
Forced rerouting and controlled rerouting consist of the transitions described above, for example, the above-described controlled rerouting started by one
node can include, for instance, transitions H and L (the route to be disabled) and B, K, J and I (the route to be enabled/obeying node) or B, D and I (the route to be enabled/dominating node) . (The priorities in the messages refer to the priority that is configured to said route in the node) .
When the nodes detect a fault and start a forced rerouting at the same time, they make the transitions C (the route to be disabled) and G (the route to be enabled) only. If the dominating node does not detect the fault before the obeying node notifies of the rerouting, it will resort to (on the route to be disabled) the transitions M, E and C. In a conflict situation, in which the dominating node detects after the transitions M and E that the route is in order, it carries out only an internal transition F and the transitions C and G will not be made.
Figure 4 shows a buffering automaton (a state machine for buffering) that has two main states : FREE and BUSY. When a node receives a message saying "start buffering" , the automaton is transferred from the state FREE to the state BUSY and the traffic of the data connection will be written in the buffer. When a message received in the state BUSY says "stop buffering" or after the expiration of the time-out period, as described above, the buffered traffic is transmitted to the data connection via the route in use. After this, the traffic will not be written in the buffer, and a transition is made to the state FREE. Figure 5 shows a testing automaton of the route
(a state machine for route testing) that also has two main states: ROUTE NOT TESTED and ROUTE BEING TESTED.
When the node receives a message saying "start testing", the automaton is transferred to a testing state and a message "Is everything in order?" is sent to the
opposite end. There are two ways to leave the testing state for another main state. The transition is made in the one way if a message "at the opposite end the route is in order" is received and then a message "testing in order" is sent and a transition is made to the state ROUTE NOT TESTED. The same transition can be made in the other way by receiving in the testing state either a message "fault at the opposite end" or a message "fault on the route" or after a time-out. At the same time a message "testing failed" is sent.
Although the invention was above explained with reference to the examples of the accompanying drawings, it is clear that the invention is in no way restricted thereto, but it can be modified within the scope of the inventive concept disclosed above and in the appended claims. As was mentioned above, the arrangement of the invention does not, for example, require of the internal structure of the node anything else but the ability to buffer data. Therefore, the internal structure of the node can be accomplished in many ways known per se. The buffering itself can also be carried out in different ways; the outgoing or incoming data or both can be buffered. The most natural procedure is, however, to buffer the outgoing data. Also, the operation of the state automatons, for example, can vary in many ways although they realize the essential idea of the invention; only one example of their operation is shown above.
Claims (10)
1. A method for rerouting a packet-mode data connection, especially a Frame Relay network data connection, in which method traffic transmitted between two nodes (1, 4) of the network is transferred from a first route to be disabled to a second, new route, whereby data packets to be transmitted to a new route are buffered, when needed, in a transmitter in a rerouting situation in order to perform checkings concerning the route or to ensure the correct order of the data packets, c h a r a c t e r i z e d in that in an individual rerouting situation, the opposite end is notified of the need for buffering by sending a message, the contents of which depend on the rerouting situation in question.
2. A method according to claim 1, c h a r a c- t e r i z e d in that in forced rerouting, the node (1) starting the rerouting transmits to a new route (A-B) a message of the first type concerning forced rerouting and transfers traffic at once to the new route, whereby as both nodes start forced rerouting independently and receive said message from the opposite end, the node ends the rerouting upon receiving said message.
3. A method according to claim 1, c h a r a c- t e r i z e d in that in forced rerouting, the node (1) starting the rerouting transmits to a new route (A-B) a message of the first type concerning forced rerouting and transfers traffic at once to the new route, and that the opposite end in response to said message immediately starts buffering the data packets, tests the condition of the former active connection (a-b) and after finding the connection faulty, stops buffering and directs the buffered data packets to the new route (A-B) .
4. A method according to claim 1, c h a r a c- t e r i z e d in that the message also carries information about the new route and the priority of a node in the mutual hierarchy of the nodes, the node of a lower hierarchy level starting to use the route notified by the node of an upper hierarchy level in the case that the nodes are originally transferring traffic to different routes.
5. A method according to claim 4, c h a r a c- t e r i z e d in that in transferring to a route notified by a node of an upper hierarchy level, a node of a lower hierarchy level
- starts buffering the data
- sends the node of the opposite end a special return-from-route notice, and
- in response to an acknowledgement from the opposite end stops buffering and transfers the transmission to a new route.
6. A method according to claim 1, c h a r a c- t e r i z e d in that in forced rerouting, the node (1) starting the rerouting transmits to a new route (A-B) a message of the second type concerning forced rerouting and transfers traffic at once to the new route, and that the opposite end in response to said message transfers traffic immediately to the new route (A-B) .
7. A method according to claim 1, c h a r a c- t e r i z e d in that in controlled rerouting the nodes (1, 4)
- agree upon the new active route by using information included in said message about the new route and start the buffering of the data packets to be transmitted after coming to an agreement on the route in question, at the latest,
- send return-from-route notices to each other on the route (A-B) to be disabled, - acknowledge the reception of the return-from- route notice to the opposite end, and
- in response to the received acknowledgement, stop buffering and transfer the transmission to a new route (a-b) .
8. A method according to claim 7, c h a r a c- t e r i z e d in that the return-from-route notice is sent and routed as ordinary data packets after them.
9. A method according to claim 7, c h a r a c- t e r i z e d in that in controlled rerouting the nodes
(1, 4)
- agree upon the new active route by using information included in said message about the new route and start the buffering of the data packets to be transmitted after coming to an agreement on the route in question, at the latest,
- send return-from-route notices to each other on the route (A-B) to be disabled,
- await an acknowledgement from the opposite end to the return-from-route notice and after a certain predetermined waiting time is exceeded, they independently stop buffering and transfer the transmission to a new route (a-b) .
10. A method according to claim 7 or 9, c h a r a c t e r i z e d in that said message also carries information about the new route and the priority of a node in the mutual hierarchy of the nodes, the node of a lower hierarchy level starting to use the route notified by the node of an upper hierarchy level in the case that the nodes were originally transferring traffic to different routes .
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FI940939 | 1994-02-28 | ||
FI940939A FI98772C (en) | 1994-02-28 | 1994-02-28 | Procedure for route switching on a packet data connection |
PCT/FI1995/000112 WO1995024085A2 (en) | 1994-02-28 | 1995-02-28 | Method for rerouting a packet-mode data connection |
Publications (3)
Publication Number | Publication Date |
---|---|
AU1813995A AU1813995A (en) | 1995-09-18 |
AU693865B2 AU693865B2 (en) | 1998-07-09 |
AU693865C true AU693865C (en) | 1999-03-04 |
Family
ID=
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US5905714A (en) | Method for rerouting a packet-mode data connection | |
EP1033900B1 (en) | Signaling method for packet network and system | |
US5398236A (en) | Asynchronous transfer mode link recovery mechanism | |
US6741553B1 (en) | Method and system for protecting virtual traffic in a communications network | |
US5544152A (en) | Method for setting up virtual connections in packet switching networks | |
FI91695B (en) | A method for prioritizing traffic between interconnected LANs through a backbone network | |
US6614756B1 (en) | Method of detecting and recovering from signaling congestion in an asynchronous transfer mode network | |
US20080310429A1 (en) | Equivalent switching method for transmission devices in mpls networks | |
CN1331334C (en) | Circuit arrangement for providing a back-up circuit for transmission devices in ring architectures that route MPLS packets | |
US6944156B2 (en) | Label request packet transmission method, packet transfer network and method thereof, and packet transfer device | |
US6580688B1 (en) | Switching transmission units to an equivalent circuit for the purposes of bidirectional asynchronous cell transfer | |
EP0748544B1 (en) | Method for rerouting a packet-mode data connection | |
EP0820209A2 (en) | Data transfer device having retransmission control function | |
AU693865C (en) | Method for rerouting a packet-mode data connection | |
US5553060A (en) | Method for maintaining virtual connections given an at least partial outage of connecting paths | |
US7042882B2 (en) | Layer-structured path setup method and node apparatus for implementing same | |
WO1999002009A2 (en) | Loop detection | |
CN1401200A (en) | Equivalent switching method for transmission devices in MPLS networks | |
AU635584B2 (en) | Local area network | |
AU641828B2 (en) | A method of transmitting data on a telecommunications network | |
JP3568681B2 (en) | Cell switching system and cell data guarantee system | |
JPH04345241A (en) | Input traffic control method | |
EP1170904A1 (en) | Communications network and method for routing data packets | |
JPH04150430A (en) | Node device for communication network | |
JPH0360243A (en) | Loop communication method |