EP1386452A2 - Schutz von ringnetzdaten - Google Patents

Schutz von ringnetzdaten

Info

Publication number
EP1386452A2
EP1386452A2 EP02734162A EP02734162A EP1386452A2 EP 1386452 A2 EP1386452 A2 EP 1386452A2 EP 02734162 A EP02734162 A EP 02734162A EP 02734162 A EP02734162 A EP 02734162A EP 1386452 A2 EP1386452 A2 EP 1386452A2
Authority
EP
European Patent Office
Prior art keywords
signal
channel
node
data
fault
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP02734162A
Other languages
English (en)
French (fr)
Inventor
Charles Lee
Harsh Kapoor
Jonathan Morgan
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Appian Communications Inc
Original Assignee
Appian Communications Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Appian Communications Inc filed Critical Appian Communications Inc
Publication of EP1386452A2 publication Critical patent/EP1386452A2/de
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04JMULTIPLEX COMMUNICATION
    • H04J3/00Time-division multiplex systems
    • H04J3/02Details
    • H04J3/08Intermediate station arrangements, e.g. for branching, for tapping-off
    • H04J3/085Intermediate station arrangements, e.g. for branching, for tapping-off for ring networks, e.g. SDH/SONET rings, self-healing rings, meashed SDH/SONET networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/42Loop networks
    • H04L12/437Ring fault isolation or reconfiguration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/64Hybrid switching systems
    • H04L12/6402Hybrid switching fabrics

Definitions

  • a communication network typically includes a large number of nodes connected by transmission lines.
  • these transmission lines are often optical fibers.
  • Such fibers are extremely thin and therefore susceptible to mechanical breakage.
  • the alignment between fibers at a junction must be extremely precise. These junctions are therefore easily disrupted by mechanical shock or vibration. Even slight kinks or bends in a fiber can cause internal reflections that lead to significant degradation in signal quality.
  • attempts are made to isolate a fiber from mechanical disturbance reliable isolation remains difficult. Buried fibers routinely fall prey to backhoes in construction accidents. Over the years, the accumulated effect of the vibration of passing subway trains can gradually degrade communication. Not all disruptions (also known as "faults”) result from human activity, however. Even a minor earthquake can cause isolated disruptions in service.
  • a network can also fail as a result of disruption within a node.
  • the laser at the transmitting end of each fiber can gradually deteriorate.
  • nodes can include complex electronic systems, they too are subject to failure from a variety of causes.
  • One method of achieving this is to arrange the nodes of a communication network in a ring and to connect the nodes with two independent fibers: a working fiber and a protection fiber.
  • a ring connected in this way is referred to in the art as a Unidirectional Path Switched Ring ("UPSR").
  • UPSR Unidirectional Path Switched Ring
  • a source node transmits two copies of a data frame to a destination node.
  • a working copy of the data frame travels clockwise around the ring on the working fiber and a protection copy of the frame travels counter-clockwise around the ring on the protection fiber. If the destination node finds that the protection copy matches the working copy, it accepts the working copy. Otherwise, the destination node selects the better of the two copies.
  • a data frame can pass through many other nodes. In these intervening nodes, there may be data packets queued for transmission on the ring. In addition, there may be space within the data frame for accommodating some of these data packets. Because these empty spaces represent a waste of network resources, it would be useful to accommodate some of these queued data packets in those spaces.
  • the working copy of the data frame will inevitably differ from the protection copy of the frame.
  • the destination node upon comparing the working copy with the protection copy, the destination node will receive two different frames with no way to determine whether the difference is the result of additional data on the frame or a disruption in transmission.
  • a method and a system are provided for protecting ring network data.
  • a ring is configured with multiple nodes connected by first and second channels.
  • a distributing filter is provided and is configured to direct a first type of data to the first channel in the ring and a second type of data to the second channel in the ring.
  • a fault is detected on at least one of the first and second channels in the ring.
  • the distributing filter is adjusted to redirect data in the ring to avoid the fault.
  • the distributing filter may include a mechanism that distributes data over multiple channels, which distribution may or may not be executed in accordance with one or more predefined schemes such as a priority based scheme, a capacity based scheme, or a random distribution based scheme.
  • a communication network circumvents difficulties by providing nodes in which each node adopts a signaling protocol that informs other nodes in the network of the condition of the signals arriving at that node from an adjacent node. In response to these signals, each node makes an independent decision as to whether to bypass its adjacent nodes on the network.
  • the first node When a disruption occurs, there will be a first node and a second node adjacent to, and on either side of, the disruption.
  • the first node Upon the detection of the disruption, the first node signals each of the other nodes to cause that other node to determine if it is the second node, and, if so, to identify itself as such. If it is not, that node continues to operate in its normal mode. However, if that node determines that it is the second node, it sends an acknowledgement signal back toward the first node and redirects data between the first and second channels, thereby preventing data from proceeding further toward the disruption. Upon receipt of the acknowledgement, the first node likewise redirects data between the first and second channels, thereby preventing data from proceeding further toward the disruption. This results in the isolation of that disruption and the combination of the first and second channels to form a new ring that excludes the disruption.
  • the system and method may be implemented using standard Ethernet components, and the redirection of data may be accomplished in a way that is transparent to a node's operations that are unrelated to the ring network.
  • the system and method may be implemented and/or exercised on a network that is based on conventional Ethernet technology, e.g., to add resilience or to render the network highly effective for a particular purpose by increasing resilience to a satisfactory level.
  • Ring network data can thus be protected in a distributed solution that provides resiliency, ease of maintenance and implementation, and interoperability with IEEE 802.17 and other proposed technology.
  • Fig. 1 shows a network in which a working trunk and a protection trunk connect a plurality of nodes into a ring;
  • Figs. 2-3 illustrate portions of a typical node from the ring of Fig. 1 showing an internal architecture for protection of data following a signal fault on the working channel;
  • Figs. 4A-4F show the state of a ring network at various times following a disruption in the network
  • Figs. 5-6 are flow charts illustrating data protection methods.
  • Fig. 1 illustrates a resilient network ring architecture ("ring") 100 in which, by example, nodes 102A-102D (labeled "OSAP” for Optical Services Activation Platform, which may include technology from Appian Communications, Inc.) are linked by working and protection trunks ("channels") 204, 206.
  • each channel 204, 206 includes optical fibers for optical transmission of data, but in other embodiments optical fibers could be supplemented or replaced by other data communications technology such as coaxial cables or wireless transceivers.
  • each node e.g., node 102B
  • adjacent nodes e.g., nodes 102A, 102C
  • Channels 204, 206 carry signals in opposite directions in ring 100.
  • working channel 204 may carry a signal in a clockwise direction around ring 100
  • protection channel 206 may carry a signal in a counterclockwise direction around ring 100.
  • Some or all of the nodes may have time division multiplexing ("TDM”) or Ethernet connection or both, as shown in Fig. 1, for communicating data to and from the ring.
  • TDM time division multiplexing
  • FIG. 2 illustrates pertinent data transmission and data reception logic within a typical node.
  • a resilient packet ring (RPR) network device e.g., card
  • RPR resilient packet ring
  • Card 200 provides an interface, in a node such as node 102 A, between node equipment 202 and the working and protection channels 204, 206.
  • Card 200 also has input and output low voltage differential signal ("LVDS") connections 208, 210 that may be routed to a companion card for use in packet circuit emulation (“PACE”) technology as described below, and has fault handling logic 214 that operates as described below.
  • LVDS low voltage differential signal
  • Card 200 has a first physical layer interface device (“PHY”) 216 for receiving incoming data from working channel 204 and has a second PHY 218 for transmitting outgoing data on protection channel 206.
  • Card 200 also has a media access controller (“MAC") 220 that provides an interface between PHYs 216, 218 and memory logic 222, 224.
  • the PHYs and the MAC may have capabilities compatible with SONET, IEEE 802.3, or any variant, such as Gigabit or 10 Gigabit Ethernet.
  • a Broadcom or Intel Ethernet device such as the Intel 21440 multiport 10/lOOMbps Ethernet controller may be used.
  • MAC 220 helps to transfer incoming data from PHY 216 to memory logic 222 and outgoing data from memory logic 222 to PHY 218.
  • MAC 220 also transfers incoming data from PHY 216 to memory logic 224 that includes a lookup engine 226 and a lookup memory 228.
  • the lookup engine distinguishes among different classes or types of data traffic and uses the lookup memory to determine how to treat data traffic based on its class or type.
  • the lookup memory may hold one or more tables of data that supplies guidance for directing or otherwise treating the data traffic.
  • Memory logic 222 has receive and transmit DMA logic 230, 232 and corresponding receive and transmit memories 234, 236. DMA logic 230, 232, together with MAC 220, causes incoming and outgoing data to be transferred between PHYs 216, 218 and receive and transmit memories 234, 236, respectively.
  • Card 200 also has a priority filter 238 that provides an interface between the service provider equipment 202 and memory logic 222. Under normal circumstances, filter 238 causes only high priority incoming data to be transferred from memory logic 222 to equipment 202, and causes only low priority data to be transferred from equipment 202 to memory logic 222.
  • Fault handling logic 214 responds to fault indications from memory logic 222, and, under certain circumstances as described below, can reconfigure memory logic 222 and priority filter 238 to cause card 200 to form a bridge redirecting data between working channel 204 and protection channel 206.
  • Fig. 3 shows a schematic illustration of a portion of the data protection system within a typical node.
  • Fig. 3 shows only the portion of the data protection system associated with monitoring a signal on an inbound working channel.
  • each of the nodes 102A- 102D has the same architecture and logic, reference numerals for parts shown in Fig. 3 are used in connection with subsequent descriptions of the operation of each node.
  • the typical node shown in Fig. 3 includes first and second RPR network cards
  • Cards 300, 302 each of which includes an instance of the card 200 logic described above. However, cards 300, 302 are connected differently. Card 300 is connected as described above for card 200, i.e., with a working channel input 324 to receive data on the working channel and a protection channel output 338 to transmit data on the protection channel. Card 302 has the reverse connections: a protection channel input 336 to receive data from the protection channel and a working channel output 326 to transmit data to the working channel.
  • Working channel input 324 carries a signal normally routed to working channel output 326 via service processing logic 328 that is included in equipment 202 described above.
  • Working channel input 324 and working channel output 326 are connected to an inbound working channel and an outbound working channel respectively.
  • Working channel input 324 is monitored by fault handling logic 325 (i.e., fault handling logic 214 of Fig. 2), which includes a first signal fault detector 330 and an upstream fault indication (“UFI”) signal detector 332.
  • the working channel output 326 is in communication with fault handling logic 327 having a UFI generator 334 for generating a UFI signal to be detected by a UFI detector monitoring a working channel input 324 of an adjacent downstream node on the working channel.
  • Logic 327 also has a first LFI (Local Fault Indication) generator 421 in communication with the working channel output 326. This first LFI generator 421 is used only in conjunction with the detection of a signal fault on the protection channel, as is discussed below in connection with Fig. 6.
  • LFI Local Fault Indication
  • Protection channel input 336 carries a signal normally routed to protection channel output 338 via logic 328. Protection channel input 336 and protection channel output 338 are connected to an inbound protection channel and an outbound protection channel respectively.
  • Fault handling logic 325 includes a Downstream
  • DFI Fault Indication
  • LFI LFI generator
  • Logic 327 includes a second signal fault detector 342 and a DFI signal detector 344 that monitor protection channel input 336 for the presence of a signal fault or a DFI signal respectively.
  • a potential change to priority filter 301 is set up in response to a detection by UFI detector 332 and is completed in response to a detection by the second signal fault detector 342; a potential change to priority filter 303 is set up in response to a detection by first signal fault detector 330 and is completed in response to a detection by the DFI detector 344.
  • Working channel input 324 receives data Wi that includes data Wd that is specific to the instant node (and that will therefore be “dropped” or “deposited” at the instant node) and other data Wy that is not specific to the instant node (and that therefore will be passed along to the next node).
  • protection channel input 336 receives data Pi that includes data Pd that is specific to the instant node and other data Py that is not specific to the instant node.
  • the working channel normally carries only high priority data
  • the protection channel normally carries only low priority data, but other arrangements are possible, including one or more arrangements using a basis other than priority.
  • All of data Wi and all of data Pi pass through filters 301, 303 to logic 328, where data Wd and data Pd are extracted.
  • Logic 328 transmits data Wy and Py, along with new data Wa and Pa (i.e., "added” data), back to both filters 301, 303.
  • Filter 301 passes only data Py and Pa (collectively "Po") to protection channel output 338, and filter 303 passes only data Wy and Wa (collectively "Wo") to working channel output 326.
  • one or both of filters 301, 303. and consequently one or both of respective cards 300, 302 may be placed in bridge mode (also called “protection mode” or “bridged state”).
  • bridge mode causes all of data Wy, Py, Wa, and Pa to be passed from logic 328 to output 338.
  • bridge mode causes all of data Wy, Py, Wa, and Pa to be passed from logic 328 to output 326. Since logic 328 sends all of data Wy, Py, Wa, and Pa to both filters 301, 303, bridge mode does not necessarily result in any change to the operation of logic 328.
  • bridge mode can be adopted by one or more of cards 300, 302 to respond to an event such as a disruption in a way that is transparent and nonintrusive to logic 328 and to a system that communicates with the working and protective channels via logic 328.
  • an event such as a disruption in a way that is transparent and nonintrusive to logic 328 and to a system that communicates with the working and protective channels via logic 328.
  • the manner in which a ring of nodes having the architecture shown in Fig. 1 reconfigures the ring following a service disruption will be apparent from a detailed analysis of an example in which a disruption causes a signal fault on an inbound working channel leading to a node. The cause of the disruption is immaterial to the operation of the system.
  • the disruption can arise from a fiber cut of one or both fibers that carry that channel, a degradation of a signal carried by one or more channels in one or both fibers, or from a disruption of an entire node. What is significant is that a signal fault in any fiber leading to any node in the ring initiates a sequence of events that inevitably results in the reconfiguration of the ring to avoid the disruption.
  • a ring 546 includes a first node 548 in communication with an inbound working channel 548a, an outbound working channel 548b, an inbound protection channel 548c, and an outbound protection channel 548d. These channels are connected to the working channel input 524, the working channel output 526, the protection channel input 536, and the protection channel output 538 of the first node 548 respectively.
  • a disruption 550 in the inbound working channel 548a results in the detection of a signal fault by the first node 548.
  • the first signal fault detector 530 monitors its working channel input 524 for a signal fault.
  • a signal fault can be a total loss of a signal or merely a degradation of a signal.
  • the first signal fault detector 530 detects a signal fault at the working channel input 524, it instructs the UFI generator 534 to place a UFI signal on the working channel output 526, and instructs the second LFI generator 541 to place an LFI signal at the protection channel output 538.
  • the UFI generator 534 of the first node 548 operates in the manner described above to place a UFI signal on its outbound working channel 548b and an LFI signal on its outbound protection channel 548d. This results in the UFI and LFI signals shown in Fig.4A. Note that the UFI signal is now present on the signal entering a second node 552. The operation of this second node 552 is best understood with reference to Fig. 3.
  • the working channel input 524 is also monitored by the UFI detector 532.
  • the UFI detector 532 sets up a potential change to filter 301 to place respective card 300 in its bridged state upon the occurrence of either a signal loss or an LFI signal on the protection channel input 536.
  • the second node 552 passes the signal present at its working channel input 524 to its working channel output 526. This places the ring 546 in the state shown in Fig. 4B, in which the UFI signal originally generated at the first node 548 is provided to a third node 553 by way of an outbound working channel 552b.
  • the third node 553 is identical to the second node 552 and reacts to the UFI signal in the same manner as already described above.
  • the third node thus provides the UFI signal, originally generated by the first node 48, to the working channel input of the fourth node 554, as shown in Fig. 4C.
  • the internal architecture of the fourth node 554 is identical to that of the second node 552. Consequently, the operation of the fourth node 554 in response to the UFI signal present on its inbound working channel 554a is identical to that described above in connection with the second node 552. In the fourth node 554, therefore, a potential change to filter 301/303 is set up by its UFI detector 532 in response to the UFI signal now present on the inbound working channel 554a.
  • the first node 548 in response to the existence of a signal fault at its working channel input 524, instructed its second LFI generator 541 to place an LFI signal at its protection channel output 538.
  • This LFI signal is therefore present on the protection channel input 536 of the fourth node 554.
  • the change to filter 301 is completed to place card 300 in a W-to-P (working input to protection output) bridged state. In this state, the card 300 redirects data traffic on the inbound working channel 554a to the outbound protection channel 554d.
  • the completed change to filter 301 causes the DFI generator 539 to place a DFI signal on the protection channel output. This places the ring 546 in the state shown in Fig. 4C.
  • the fourth node 554 treats a loss of signal in the same manner as an LFI signal.
  • the DFI signal present on the outbound protection channel 554d associated with the fourth node 554 now propagates back through the third node 553, as shown in Fig. 4D, and through the second node 552, as shown in Fig. 4E. Because neither the third node 553 nor the second node 552 ever transmitted an LFI signal out their respective protection channel outputs 538, neither of those nodes ever set up a filter change with respect to their respective DFI detectors 544. As a result, the DFI signal is passed unimpeded to the protection channel input of the first node 548.
  • the first node 548 did send an LFI signal on its protection channel output 538.
  • the first signal fault detector 530 of the first node 548 set up a change to filter 303 of the first node 548. Therefore, the change to filter 303 is ready to be completed upon receipt, by the first node 48, of a DFI signal on the protection channel input 536.
  • This DFI signal is provided by the second node 552, as shown in Fig. 4E.
  • the change to filter 303 is completed, which places card 302 in a P-to-W (protection input to working output) bridged state. This places the ring 546 in the state shown in Fig.
  • control signals including UFI, DFI, and LFI may be transmitted using standard Ethernet packets or any other network technology supported by the PHYs and MAC. Addressing in the ring may use Multiprotocol Label Switching ("MPLS") which is a label-swapping standard for Layer 3 switching and which is related to routing, i.e., helping to determine the path through which a packet is being sent through a network.
  • MPLS Multiprotocol Label Switching
  • the LNDS connections mentioned above may be used to allow time sensitive data that is not specific to the instant node to be transmitted through the instant node, i.e., between the two cards 300, 302 of the instant node, without passing through the priority filter of either card.
  • the time sensitive data may include PACE packets serving TDM functions.
  • a node first checks to determine whether there exists a signal fault on its inbound working channel (step 56). If there is, the node transmits a UFI on the outbound working channel (step 58) and sends an LFI signal on its outbound protection channel (step 60). The node then monitors its inbound protection channel for the presence of a DFI signal (step 62). Upon receipt of a DFI signal, the node then forms a bridge, thereby routing traffic from its inbound protection channel to its outbound working channel (step 64).
  • the node checks to see if there is a UFI on its inbound working channel (step 66). If there is no UFI on its inbound working channel, then the ring is operating, normally and no further action need be taken (step 68). However, if there is a UFI on its inbound working channel, the node must determine whether it is to form a bridge.
  • the node examines its inbound protection channel to determine whether there is either a loss of signal (step 70) or a signal fault (step 72). If neither of these are present on its inbound protection channel, the node recognizes that there is no need for it to form a bridge (step 68). If either a loss of signal or a signal fault is present on its inbound protection channel, the node sends a DFI signal on its outbound protection channel to signal whichever node initiated the data protection process that one bridge has been formed and that it too should form a Midge (step 74). At the same time, or shortly thereafter, the node forms a bridge, thereby routing traffic from its inbound working channel to its outbound protection channel (step 76).
  • a first node when a first node detects a signal fault on its inbound protection channel (step 78), it sends a DFI signal on its outbound protection channel (step 80) and an LFI signal on its outbound working channel (step 82).
  • the DFI signal propagates around the ring in the same manner that the UFI signal propagated around the ring when the signal fault was on the inbound working channel instead of the inbound protection channel.
  • the first node then waits for a UFI signal on its working channel (step 84) and, upon receipt of such a signal, forms a bridge (step 86).
  • a second node that does not detect a signal fault on its inbound protection channel monitors its inbound protection channel for a DFI signal indicating a fault somewhere on the protection channel (step 88). If it detects no such DFI signal, the second node remains in its normal operating state (step 90). If it does detect such a signal, it must then determine whether it should form a bridge. To do so, the second node monitors the inbound working channel for either a loss of signal (step 92) or the presence of the LFI signal generated by the first node (step 94). If neither of these is present, the second node recognizes that it need not form a bridge, and it therefore remains in its normal operating mode (step 90).
  • the data protection system of the invention thus includes a system for protection of data on the working channel operating in parallel with an analogous system for the protection of data on the protection channel.
  • the ring 546 has the same configuration as a UPSR, the conventional UPSR data protection system can operate in parallel with the data protection system of the invention.
  • the technique may be implemented in hardware or software, or a combination of both, that may form a control plane and a data plane.
  • the technique is implemented in computer programs executing on one or more programmable computers, such as an embedded system or other computer running or able to run Nx Works (or Microsoft Windows 95, 98, 2000, Millennium Edition, NT; Unix; Linux; or MacOS); that each include a processor such as a Motorola PowerPC 8260 (or an Intel Pentium 4) possibly together with one or more FPGAs (field programmable gate arrays, e.g., by Xilinx, Inc.), a storage medium readable by the processor (including volatile and non- volatile memory and/or storage elements), possibly with at least one input device (e.g., a keyboard), and at least one output device.
  • Program code is applied to data entered (e.g., using the input device) to perform the method described above and to generate output information.
  • the output information is applied to one or more programmable computers, such as an embedded system or other computer
  • each program is implemented in a high level procedural or object-oriented programming language such as C++, Java, or Perl to communicate with a computer system.
  • the programs can be implemented in assembly or machine language, if desired.
  • the language may be a compiled or interpreted language.
  • each such computer program is stored on a storage medium or device, such as ROM or magnetic diskette, that is readable by a general or special purpose programmable computer for configuring and operating the computer when the storage medium or device is read by the computer to perform the procedures described in this document.
  • the system may also be considered to be implemented as a computer-readable storage medium, configured with a computer program, where the storage medium so configured causes a computer to operate in a specific and predefined manner.
  • all or a portion of the system and/or method may be used on a wireless or optical network or any ring topical system, such as a DWDM (dense wavelength division multiplexing) based system.
  • DWDM dense wavelength division multiplexing

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Small-Scale Networks (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
EP02734162A 2001-05-04 2002-05-02 Schutz von ringnetzdaten Withdrawn EP1386452A2 (de)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US28890101P 2001-05-04 2001-05-04
US28891201P 2001-05-04 2001-05-04
US288912P 2001-05-04
US288901P 2001-05-04
PCT/US2002/013995 WO2002091681A2 (en) 2001-05-04 2002-05-02 Protecting ring network data

Publications (1)

Publication Number Publication Date
EP1386452A2 true EP1386452A2 (de) 2004-02-04

Family

ID=26965319

Family Applications (2)

Application Number Title Priority Date Filing Date
EP02734114A Withdrawn EP1384341A2 (de) 2001-05-04 2002-05-02 Übertragung von daten zwischen tdm und packet-gestützten netzwerken
EP02734162A Withdrawn EP1386452A2 (de) 2001-05-04 2002-05-02 Schutz von ringnetzdaten

Family Applications Before (1)

Application Number Title Priority Date Filing Date
EP02734114A Withdrawn EP1384341A2 (de) 2001-05-04 2002-05-02 Übertragung von daten zwischen tdm und packet-gestützten netzwerken

Country Status (2)

Country Link
EP (2) EP1384341A2 (de)
WO (1) WO2002091681A2 (de)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102004056364A1 (de) 2004-11-22 2006-05-24 Bosch Rexroth Aktiengesellschaft Verfahren zum Betreiben eines Netzwerks mit Ringtopologie

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2784080B2 (ja) * 1990-05-09 1998-08-06 富士通株式会社 リングネットワーク及びその障害復旧方法並びにリングネットワークに用いられるノード
US5216666A (en) * 1991-12-12 1993-06-01 Alcatel Network Systems, Inc. 1:n ring-type signal protection apparatus
JPH0795227A (ja) * 1993-09-20 1995-04-07 Fujitsu Ltd パス保護切替リングネットワークおよびその障害復旧方法
GB9403223D0 (en) * 1994-02-19 1994-04-13 Plessey Telecomm Telecommunications network including remote channel switching protection apparatus
US6657952B1 (en) * 1997-11-28 2003-12-02 Nec Corporation Ring network for sharing protection resource by working communication paths
NL1012568C2 (nl) * 1999-07-12 2001-01-15 Koninkl Kpn Nv Optisch transmissienetwerk met protectieconfiguratie.
WO2001030006A1 (en) * 1999-10-18 2001-04-26 Nortel Networks Limited Communication network for transmitting and restoring an optical signal
IT1308858B1 (it) * 1999-10-29 2002-01-11 Cit Alcatel Metodo di segnalazione di guasti in reti di telecomunicazioni.

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO02091681A3 *

Also Published As

Publication number Publication date
WO2002091681A2 (en) 2002-11-14
EP1384341A2 (de) 2004-01-28
WO2002091681A3 (en) 2003-11-27

Similar Documents

Publication Publication Date Title
US8023819B2 (en) Method and apparatus for network fault detection and protection switching using optical switches with integrated power detectors
US7957324B2 (en) Utilizing bandwidth in ring network using path cost and protection techniques
US6680912B1 (en) Selecting a routing direction in a communications network using a cost metric
US6865149B1 (en) Dynamically allocated ring protection and restoration technique
US6292464B1 (en) Apparatus and method for self routing control mechanism for restoring fiber optic communications network connections
US20030031126A1 (en) Bandwidth reservation reuse in dynamically allocated ring protection and restoration technique
EP1262042B1 (de) Routenschalter für dynamische verkehrsumleitung aufgrund von verbindungsfehlererkennung
US20060203719A1 (en) Method and apparatus for protection switching in virtual private networks
EP1206858B1 (de) Vorrichtung und verfahren zur paketübertragung in einem ringnetzwerk
CA2233732C (en) System and method for achieving efficient coordination of protection switching
US20030009599A1 (en) Protecting ring network data
EP2557734B1 (de) Verfahren und Vorrichtung zur Bereitstellung eines Uplinks über einen Zugangsring
UA78303C2 (en) Method for routing data bursts with multi-protocol label switching in a ring data transmission network and a network node for the realization of the method
US6848062B1 (en) Mesh protection service in a communications network
Bergman et al. Distributed Algorithms for Attack Localization in All-Optical Networks.
US7593323B2 (en) Apparatus and methods for managing nodes on a fault tolerant network
US20030005095A1 (en) Method and system for programmable submarine network configuration plans to enable diverse service level agreements in telecommunication networks
US8730940B2 (en) Switching system
US6622258B1 (en) Data protection in a ring network
EP1386452A2 (de) Schutz von ringnetzdaten
US6683891B1 (en) Method and apparatus for passing control information in a bidirectional line switched ring configuration
US6950883B1 (en) Ring capacity efficient architecture
JP2000232481A (ja) コネクションレス型データ通信網における迂回方法およびシステム
WO2002007348A1 (en) Hybrid optical shared protection ring

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20031202

AK Designated contracting states

Kind code of ref document: A2

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR

AX Request for extension of the european patent

Extension state: AL LT LV MK RO SI

17Q First examination report despatched

Effective date: 20040204

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20040817