EP2329281A1 - Protection for provider backbone bridge traffic engineering - Google Patents

Protection for provider backbone bridge traffic engineering

Info

Publication number
EP2329281A1
EP2329281A1 EP09813399A EP09813399A EP2329281A1 EP 2329281 A1 EP2329281 A1 EP 2329281A1 EP 09813399 A EP09813399 A EP 09813399A EP 09813399 A EP09813399 A EP 09813399A EP 2329281 A1 EP2329281 A1 EP 2329281A1
Authority
EP
European Patent Office
Prior art keywords
protection
section
path
fault
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP09813399A
Other languages
German (de)
French (fr)
Other versions
EP2329281A4 (en
Inventor
Nigel Bragg
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Rockstar Bidco LP
Original Assignee
Nortel Networks Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nortel Networks Ltd filed Critical Nortel Networks Ltd
Publication of EP2329281A1 publication Critical patent/EP2329281A1/en
Publication of EP2329281A4 publication Critical patent/EP2329281A4/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04JMULTIPLEX COMMUNICATION
    • H04J14/00Optical multiplex systems
    • H04J14/02Wavelength-division multiplex systems
    • H04J14/0278WDM optical network architectures
    • H04J14/0283WDM ring architectures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • H04L12/4675Dynamic sharing of VLAN information amongst network nodes
    • H04L12/4679Arrangements for the registration or de-registration of VLAN attribute values, e.g. VLAN identifiers, port VLAN membership
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0654Management of faults, events, alarms or notifications using network fault recovery
    • H04L41/0659Management of faults, events, alarms or notifications using network fault recovery by isolating or reconfiguring faulty entities
    • H04L41/0661Management of faults, events, alarms or notifications using network fault recovery by isolating or reconfiguring faulty entities by reconfiguring faulty entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery
    • H04L45/04Interdomain routing, e.g. hierarchical routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/22Alternate routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/40Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass for recovering from a failure of a protocol instance or entity, e.g. service redundancy protocols, protocol state redundancy or protocol service redirection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04JMULTIPLEX COMMUNICATION
    • H04J14/00Optical multiplex systems
    • H04J14/02Wavelength-division multiplex systems
    • H04J14/0287Protection in WDM systems
    • H04J14/0289Optical multiplex section protection
    • H04J14/0291Shared protection at the optical multiplex section (1:1, n:m)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/28Routing or path finding of packets in data switching networks using route fault recovery

Definitions

  • This invention is generally related to network communications, and more particularly to protection for provider backbone bridge traffic engineering.
  • PBB-TE Provider Backbone Bridge Traffic Engineering
  • e2e protection an end-to-end 1 : 1 protection paradigm, referred to in this document as "e2e protection”.
  • e2e protection This provides a robust protection mechanism which can be used across an arbitrary mesh of network connectivity.
  • the underlying physical connectivity of many networks frequently uses rings of fiber, which makes protection over ring topologies an important scenario.
  • matched pairs of nodes are used to interconnect communication links of logically adjacent rings.
  • a primary path between endpoints traverses links between ones of the matched pairs of nodes, i.e., primary path nodes.
  • a protection path traverses different links between the corresponding nodes of the matched pairs of nodes, i.e., protection path nodes.
  • Each path in PBB-TE is associated with a VLAN ID (VID).
  • VIP VLAN ID
  • traffic is switched to the protection path by the headend endpoint changing the VID used on data frames.
  • the end-to-end 1 : 1 protection paradigm works well, it has some drawbacks. For example, different rings may be associated with different geographic domains that are managed and operated by different organizations within the carrier, and each organization may wish to schedule maintenance outages without coordinating with other organizations.
  • the frequency of faults on the extended e2e path can become significant enough that probability of a second fault occurring on the protection path before a first fault is repaired becomes unacceptable.
  • An extended e2e protection paradigm can be used to mitigate this, but the number of required protection paths grows significantly as a function of the number of rings and extent of protection, e.g., protection from multiple faults across multiple rings. For example, four end-to-end paths are required for decoupling of a pair of rings in cascade since there are four possible paths. In the case of three rings in cascade, six paths are required for protection against two independent faults on any pair of rings, and eight paths are required for full protection against a single simultaneous fault on each ring. Maintaining a large number of paths can be problematic because forwarding state is directly related to the number of paths installed, and every path adds a Continuity Fault Management ("CFM”) session to the terminating nodes.
  • CFM Continuity Fault Management
  • a method for providing protection in a provider bridge backbone network comprises: in response to a fault, utilizing section protection if possible, where a section is defined between an ingress point and an egress point that do not span the entire provider bridge backbone network; and utilizing end-to-end protection if the fault cannot be overcome with section protection.
  • apparatus for communicating between endpoints using a provider bridge backbone network comprises: an ingress point node and an egress point node which operate together to provide protection for a section of the network between the ingress point node and the egress point node, where the section does not span the entire provider bridge backbone network, the network operating in response to a fault to utilize the section protection if possible, and to utilize end-to-end protection between the endpoints if the fault cannot be overcome with section protection.
  • Advantages associated with the invention include more efficient use of network resources and enhanced protection. Although the multiplicity of paths required for comprehensive protection each require forwarding state to be installed in nodes to dictate the path to be taken by traffic, data traffic only travels on one end-to-end path at any time according to the 1: 1 "head-end switching" model used by PBB-TE. This overcomes the inefficient use of network resources of previous 1+1 embodiments of section protection, which have also previously made uneconomic the deployment of section protection in combination with end-to-end path protection.
  • Figure 1 illustrates an end-to-end 1 :1 protection paradigm.
  • Figure 2 illustrates a paradigm with end-to-end protection, and section protection applied to the primary path only.
  • Figure 3 illustrates section protection for both the primary and protection paths.
  • Figure 4 illustrates an embodiment of the invention that will be used as a basis for describing responses to various different fault conditions shown in figures 5 through 10.
  • Figure 5 illustrates an upstream failure in the primary route.
  • Figure 6 illustrates a downstream failure in the primary route.
  • Figure 7 illustrates how the responses shown in figures 5 and 6 potentially conflict under the requirement for a single Forwarding Database per bridge.
  • Figure 8 illustrates a solution to the problem shown in figure 7 based on VID swap.
  • Figures 9 and 10 illustrate a sympathetic switch solution to the problem shown in figure 7.
  • Data communication networks may include various computers, servers, nodes, routers, switches, bridges, hubs, proxies, and other network devices coupled to and configured to pass data to one another. These devices will be referred to herein as "nodes.” Data is communicated through the data communication network by passing protocol data units, such as Internet Protocol packets, Ethernet Frames, data cells, sections, or other logical associations of data, between the nodes by utilizing one or more communication links between the nodes. A particular protocol data unit may be handled by multiple nodes and cross multiple communication links as it travels between its source and its destination over the network.
  • protocol data units such as Internet Protocol packets, Ethernet Frames, data cells, sections, or other logical associations of data
  • Figure 2 illustrates a protection paradigm with both end-to-end and section protection in the context of two endpoint nodes 200, 202 connected via three cascaded rings which are interconnected by matched pairs of nodes (204, 206), (208, 210).
  • a primary path 212 associated with links 214, 216, 218 is protected on an end-to-end basis by protection path 220 associated with links 222, 224, 226.
  • One or more sections of the primary path are also protected on a local basis, where a "section" is a link, ring, trunk or other portion of a network.
  • link 214 may be protected by path 228 via link 222
  • link 216 may be protected by path 230 via link 224
  • link 218 may be protected by path 232 via link 226.
  • the fault status of each of the paths through a section is independently monitored by a CFM session between the section endpoints.
  • section protection is utilized to overcome the fault if possible, and otherwise end-to-end protection is utilized.
  • the timeout period before a fault is indicated by end-to-end CFM sessions may be set to be longer than the corresponding section timeout period so that unnecessary end-to-end protection switches are not triggered.
  • section protection mechanism described here may be employed over any topology, with the single constraint that the two paths forming the protected section must not cross between protection opening and closure.
  • Protection for a given section may be closed on a single matched node, or corresponding nodes at the ingress and egress of the section.
  • primary link 214 and the corresponding protection path 228 carried via link 222 are closed on node 204, which is matched with node 206. Consequently, a fault in link 214 can be overcome by utilizing link 228 for section protection without switching away from node 204, or needing active involvement by node 206 in the switchover process.
  • end-to-end protection would be invoked as a consequence of failure of the primary end-to-end CFM session over path 212, and traffic would be switched to the links and nodes associated with protection path 220, including using node 206 rather than node 204. This advantageously mitigates problems associated with protection synchronization between matched nodes.
  • both the primary and protection paths are provided with section protection. More particularly, in addition to the paths and links described with regard to figure 2, link 222 is protected by path 300 via link 214, link 224 is protected by path 302 via link 216, and link 226 is protected by path 304 via link 218. Protection for each section is independently opened and closed on both the primary and protection paths. CFM Connectivity Check sessions are maintained for the primary and protection paths between the endpoints 240, 242 to continuously determine the status of the two end-to-end paths.
  • Two CFM sessions 306 (one clockwise, the other counter-clockwise) determine the status of the two paths between nodes 200 and 204 using the VID used by the primary e2e path, and two further CFM sessions 307 determine the status of the two paths between nodes 200 and 206 using the VID used by the protection e2e path.
  • Two CFM sessions 308 determine the status of the two paths between nodes 204 and 208 using the VID used by the primary e2e path
  • two further CFM sessions 309 determine the status of the two paths between nodes 206 and 210 using the VID used by the protection e2e path, .
  • Individual section protection CFM sessions need not be created for every end-to-end path.
  • the two sessions 308 could be used for all routes entering and leaving the middle ring via nodes 204 and 208.
  • section protection for the primary and protection paths it is possible to tolerate one failure per ring, including the case of failure of one matched node (which faults two rings), while only doubling of the amount of state information stored at matched nodes.
  • FIG. 4 illustrates an embodiment of the invention that will be used as a basis for describing responses to various different fault conditions shown in figures 5 through 10. With no loss of generality, the effect is illustrated in all cases for traffic flowing from left to right only, and "upstream” and “downstream” are used with respect to that direction of flow.
  • backbone edge bridges (BEBs) 400, 402 are in communication via rings. The rings interface at matched pairs of backbone core bridges (BCBs) 404a, 404b, 406a, 406b.
  • BCB includes four provider network ports (PNPs), for example 408a, 408b, 408c, 408d.
  • PNPs provider network ports
  • Each BEB includes a customer backbone port (CBP) 410 and two PNPs 412a, 412b.
  • a primary path 420 between the BEBs is protected by an e2e protection path 424 and a section protection path 422 between BCBs 404a and 406b. Section protection for the e2e protection path is not shown in order to provide a clearer figure.
  • CFM sessions are maintained between the following pairs: (BEB 400, BCB 404b); (BEB 400, BCB 404a); (BCB 404b, BCB 406b); (BCB 404a, BCB 406a); (BCB 406b, BEB 402); and (BCB 406a, BEB 402).
  • FIG. 5 illustrates a fault 500 in the primary path 420 which is upstream of BCB 404a.
  • traffic is rerouted by BEB 400 through PNP 412a to BCB 404b and then to BCB 404a, along the section protection path for 420 along the first section.
  • BCB 404a returns the rerouted traffic to the primary path 420 at PNP 408d.
  • FIG. 6 illustrates a failure in the primary route downstream of BCB 404a.
  • traffic is rerouted via the section protection for the second section. More particularly, BCB 404a reroutes traffic received at its PNP 408c via which the traffic proceeds to BCB 404b and BCB 406b.
  • BCB 406b forwards the traffic to BCB 406a, which returns the rerouted traffic to the primary path at its PNP 408d.
  • the rerouted frames are not altered in any way at the protection opening point BCB 404a; they can and do use the same VID value (that associated with the primary e2e path).
  • FIG. 7 illustrates how the responses shown in figures 5 and 6 require that the BCB matched node 404b has two forwarding paths for section protection of the primary e2e path which are used under different circumstances. Although the two paths cannot be active simultaneously, BCB 404b has no direct means of determining which path will be used and when, and it is advantageous in terms of state and complexity to maintain this lack of active involvement. Simultaneous installation of both of these forwarding paths potentially represents a conflict. In particular, different routes are associated with the same address (that of endpoint BEB 402) at BCB 404b. This is a problem because the BCB typically has only one forwarding database (FDB). One straightforward solution to this problem is to have a different forwarding database at each PNP. However, that is contrary to the Ethernet bridging standards IEEE 802. IQ and IEEE 802. lah, in which the FDB is applicable to all bridge ports, which is problematic if it is desired to comply with those standards.
  • FDB forwarding database
  • FIG 8 illustrates another solution to the problem illustrated in figure 7.
  • the illustrated solution is based on a VID swap operation.
  • a VID swap is performed across the BCB switch on the section protection path, either from upstream node to buddy node, or from buddy node to downstream node.
  • the VID swap is performed at PNP 408a of BCB 404b, and again at PNP 408d, such that traffic exiting PNP 408d has the same VID as traffic entering PNP 408a, but there is no address conflict within BCB 404b because the paths are associated with different VIDs. Consequently, a single FDB per VLAN can be maintained in compliance with the Ethernet standard.
  • FIGS 9 and 10 illustrate a further protection switching solution for downstream and upstream faults, respectively, in which extra state, in the form of CFM sessions, is installed on matched nodes, but there is still no explicit synchronization required between pairs of matched nodes such as 404a and 404b.
  • additional pairs of CCM sessions (clockwise and counter-clockwise) are maintained between the matched node opening the section protection on the primary e2e path and that closing the protection on the protection e2e path.
  • These "diagonal" sessions between matched nodes allow the upstream matched node on a section protection path to determine directly whether the downstream part of the section protection path, to the section protection closure point, is operational.
  • a diagonal CCM session 900 is maintained between BCB 406a and BCB 404b.
  • the diagonal sessions allow the network to determine directly whether BCB 404b can reach the section closure point at PNP 408d of BCB 406a. If a fault 902 occurs in the primary path, BCB 404b forwards traffic clockwise around the protection path to BCB 406a, because the buddy matched node 404a has also detected the fault directly from failure of its primary CCM session with BCB 406a, and switched traffic onto the section protection path.
  • An upstream fault 1000 will not be detected by CCM session 900 so traffic is forwarded by default (i.e., when CFM session 900 is running correctly) by BCB 404b as if primary path on the upstream ring is faulted, i.e., fault 1000 is assumed. Note that the behaviour of BCB 404b does not matter in the case of a fault 1001 on the link between the matched nodes, which breaks both paths, because both rings are now faulted, and a subsequent fault on the primary e2e path through both sections can only be recovered by an e2e protection switch..

Abstract

Network protection between endpoints includes both end-to-end and local section protection. A primary path between the endpoints includes a plurality of links, and is protected on an end-to-end basis by a protection path associated with different links. At least one sections of the primary path is also protected on a local basis, where a "section" is a link, ring, trunk or other portion of a network. One or more sections of the protection path may also be protected on a local basis. In response to detection of a fault condition, section protection is utilized to overcome the fault if possible, and otherwise end-to-end protection is utilized. Invoking section protection does not imply a switchover from the primary end-to-end path to the protection end-to-end path. Rather, the primary end-to-end path is rerouted in the affected section.

Description

Protection for Provider Backbone Bridge Traffic Engineering
Field of the Invention
[001] This invention is generally related to network communications, and more particularly to protection for provider backbone bridge traffic engineering.
Cross-Reference to Related Applications
[002] A claim of priority is made to U.S. Provisional Patent Application 61/096,011, entitled SECTION PROTECTION FOR PROVIDER BACKBONE BRIDGE TRAFFIC ENGINEERING, filed September 11, 2008.
Background of the Invention
[003] Provider Backbone Bridge Traffic Engineering ("PBB-TE") uses an end-to-end 1 : 1 protection paradigm, referred to in this document as "e2e protection". This provides a robust protection mechanism which can be used across an arbitrary mesh of network connectivity. However, the underlying physical connectivity of many networks frequently uses rings of fiber, which makes protection over ring topologies an important scenario. In a network of cascaded rings as illustrated in figure 1, matched pairs of nodes are used to interconnect communication links of logically adjacent rings. A primary path between endpoints traverses links between ones of the matched pairs of nodes, i.e., primary path nodes. A protection path traverses different links between the corresponding nodes of the matched pairs of nodes, i.e., protection path nodes. Each path in PBB-TE is associated with a VLAN ID (VID). In the event of a fault in a link or node of the primary path, traffic is switched to the protection path by the headend endpoint changing the VID used on data frames. [004] Although the end-to-end 1 : 1 protection paradigm works well, it has some drawbacks. For example, different rings may be associated with different geographic domains that are managed and operated by different organizations within the carrier, and each organization may wish to schedule maintenance outages without coordinating with other organizations. Further, in long distance communication deployments, the frequency of faults on the extended e2e path can become significant enough that probability of a second fault occurring on the protection path before a first fault is repaired becomes unacceptable. An extended e2e protection paradigm can be used to mitigate this, but the number of required protection paths grows significantly as a function of the number of rings and extent of protection, e.g., protection from multiple faults across multiple rings. For example, four end-to-end paths are required for decoupling of a pair of rings in cascade since there are four possible paths. In the case of three rings in cascade, six paths are required for protection against two independent faults on any pair of rings, and eight paths are required for full protection against a single simultaneous fault on each ring. Maintaining a large number of paths can be problematic because forwarding state is directly related to the number of paths installed, and every path adds a Continuity Fault Management ("CFM") session to the terminating nodes.
Summary of the Invention [005] In accordance with an embodiment of the present invention, a method for providing protection in a provider bridge backbone network comprises: in response to a fault, utilizing section protection if possible, where a section is defined between an ingress point and an egress point that do not span the entire provider bridge backbone network; and utilizing end-to-end protection if the fault cannot be overcome with section protection.
[006] In accordance with another embodiment of the present invention, apparatus for communicating between endpoints using a provider bridge backbone network comprises: an ingress point node and an egress point node which operate together to provide protection for a section of the network between the ingress point node and the egress point node, where the section does not span the entire provider bridge backbone network, the network operating in response to a fault to utilize the section protection if possible, and to utilize end-to-end protection between the endpoints if the fault cannot be overcome with section protection.
[007] Advantages associated with the invention include more efficient use of network resources and enhanced protection. Although the multiplicity of paths required for comprehensive protection each require forwarding state to be installed in nodes to dictate the path to be taken by traffic, data traffic only travels on one end-to-end path at any time according to the 1: 1 "head-end switching" model used by PBB-TE. This overcomes the inefficient use of network resources of previous 1+1 embodiments of section protection, which have also previously made uneconomic the deployment of section protection in combination with end-to-end path protection. Further, by utilizing section protection for the primary and protection end-to-end paths it is possible to tolerate one failure per ring, including the case of failure of one matched node (which faults two rings), while only doubling of the amount of state information stored at matched nodes. However, it should be understood that the invention is not limited to ring architectures. [008] These and other advantages of the invention will be more apparent from the detailed description and the drawing.
Brief Description of the Figures
[009] Figure 1 illustrates an end-to-end 1 :1 protection paradigm. [0010] Figure 2 illustrates a paradigm with end-to-end protection, and section protection applied to the primary path only.
[0011] Figure 3 illustrates section protection for both the primary and protection paths. [0012] Figure 4 illustrates an embodiment of the invention that will be used as a basis for describing responses to various different fault conditions shown in figures 5 through 10.
[0013] Figure 5 illustrates an upstream failure in the primary route. [0014] Figure 6 illustrates a downstream failure in the primary route. [0015] Figure 7 illustrates how the responses shown in figures 5 and 6 potentially conflict under the requirement for a single Forwarding Database per bridge. [0016] Figure 8 illustrates a solution to the problem shown in figure 7 based on VID swap. [0017] Figures 9 and 10 illustrate a sympathetic switch solution to the problem shown in figure 7.
Detailed Description
[0018] Data communication networks may include various computers, servers, nodes, routers, switches, bridges, hubs, proxies, and other network devices coupled to and configured to pass data to one another. These devices will be referred to herein as "nodes." Data is communicated through the data communication network by passing protocol data units, such as Internet Protocol packets, Ethernet Frames, data cells, sections, or other logical associations of data, between the nodes by utilizing one or more communication links between the nodes. A particular protocol data unit may be handled by multiple nodes and cross multiple communication links as it travels between its source and its destination over the network.
[0019] The particulars described herein are for purposes of describing the illustrated embodiments of the present invention to provide what is believed to be a useful and readily understood description of principles and conceptual aspects of the invention. No attempt is made to show structural aspects of the invention in more detail than is necessary for a fundamental understanding of the invention.
[0020] Figure 2 illustrates a protection paradigm with both end-to-end and section protection in the context of two endpoint nodes 200, 202 connected via three cascaded rings which are interconnected by matched pairs of nodes (204, 206), (208, 210). A primary path 212 associated with links 214, 216, 218 is protected on an end-to-end basis by protection path 220 associated with links 222, 224, 226. One or more sections of the primary path are also protected on a local basis, where a "section" is a link, ring, trunk or other portion of a network. For example, link 214 may be protected by path 228 via link 222, link 216 may be protected by path 230 via link 224, and link 218 may be protected by path 232 via link 226. The fault status of each of the paths through a section is independently monitored by a CFM session between the section endpoints. In response to detection of a fault condition, section protection is utilized to overcome the fault if possible, and otherwise end-to-end protection is utilized. For example, the timeout period before a fault is indicated by end-to-end CFM sessions may be set to be longer than the corresponding section timeout period so that unnecessary end-to-end protection switches are not triggered. Note that invoking section protection does not imply a switchover from the primary e2e path to the protection e2e path. Rather, the primary e2e path is rerouted in the affected section only. Consequently, at least some of the problems associated with the end-to- end 1 : 1 protection paradigm can be mitigated. Although figure 2 specifically illustrates rings, the section protection mechanism described here may be employed over any topology, with the single constraint that the two paths forming the protected section must not cross between protection opening and closure.
[0021 ] It must be understood that although the multiplicity of paths required for comprehensive protection each require forwarding state to be installed in nodes to dictate the path to be taken by traffic, the 1 : 1 "head-end switching" model used by PBB-TE means that traffic only ever travels on one end-to-end path at any time. This overcomes the inefficient use of network resources of previous 1+1 embodiments of section protection, which have also previously made uneconomic the deployment of section protection in combination with end-to-end path protection.
[0022] Protection for a given section may be closed on a single matched node, or corresponding nodes at the ingress and egress of the section. For example, primary link 214 and the corresponding protection path 228 carried via link 222 are closed on node 204, which is matched with node 206. Consequently, a fault in link 214 can be overcome by utilizing link 228 for section protection without switching away from node 204, or needing active involvement by node 206 in the switchover process. In the less likely event of a fault of node 204, end-to-end protection would be invoked as a consequence of failure of the primary end-to-end CFM session over path 212, and traffic would be switched to the links and nodes associated with protection path 220, including using node 206 rather than node 204. This advantageously mitigates problems associated with protection synchronization between matched nodes.
[0023] Referring to Figure 3, in one embodiment both the primary and protection paths are provided with section protection. More particularly, in addition to the paths and links described with regard to figure 2, link 222 is protected by path 300 via link 214, link 224 is protected by path 302 via link 216, and link 226 is protected by path 304 via link 218. Protection for each section is independently opened and closed on both the primary and protection paths. CFM Connectivity Check sessions are maintained for the primary and protection paths between the endpoints 240, 242 to continuously determine the status of the two end-to-end paths. Two CFM sessions 306 (one clockwise, the other counter-clockwise) determine the status of the two paths between nodes 200 and 204 using the VID used by the primary e2e path, and two further CFM sessions 307 determine the status of the two paths between nodes 200 and 206 using the VID used by the protection e2e path. Two CFM sessions 308 determine the status of the two paths between nodes 204 and 208 using the VID used by the primary e2e path, and two further CFM sessions 309 determine the status of the two paths between nodes 206 and 210 using the VID used by the protection e2e path, . Individual section protection CFM sessions need not be created for every end-to-end path. For example, the two sessions 308 could be used for all routes entering and leaving the middle ring via nodes 204 and 208. By utilizing section protection for the primary and protection paths it is possible to tolerate one failure per ring, including the case of failure of one matched node (which faults two rings), while only doubling of the amount of state information stored at matched nodes.
[0024] Figure 4 illustrates an embodiment of the invention that will be used as a basis for describing responses to various different fault conditions shown in figures 5 through 10. With no loss of generality, the effect is illustrated in all cases for traffic flowing from left to right only, and "upstream" and "downstream" are used with respect to that direction of flow. As shown in figure 4, backbone edge bridges (BEBs) 400, 402 are in communication via rings. The rings interface at matched pairs of backbone core bridges (BCBs) 404a, 404b, 406a, 406b. Each BCB includes four provider network ports (PNPs), for example 408a, 408b, 408c, 408d. Each BEB includes a customer backbone port (CBP) 410 and two PNPs 412a, 412b. A primary path 420 between the BEBs is protected by an e2e protection path 424 and a section protection path 422 between BCBs 404a and 406b. Section protection for the e2e protection path is not shown in order to provide a clearer figure. In order to detect faults and trigger protection switching, CFM sessions are maintained between the following pairs: (BEB 400, BCB 404b); (BEB 400, BCB 404a); (BCB 404b, BCB 406b); (BCB 404a, BCB 406a); (BCB 406b, BEB 402); and (BCB 406a, BEB 402).
[0025] Figure 5 illustrates a fault 500 in the primary path 420 which is upstream of BCB 404a. In response to the failure detected by the failure of the (BEB 400, BCB 404a) CFM session, traffic is rerouted by BEB 400 through PNP 412a to BCB 404b and then to BCB 404a, along the section protection path for 420 along the first section.. BCB 404a returns the rerouted traffic to the primary path 420 at PNP 408d.
[0026] Figure 6 illustrates a failure in the primary route downstream of BCB 404a. In response to this failure condition traffic is rerouted via the section protection for the second section. More particularly, BCB 404a reroutes traffic received at its PNP 408c via which the traffic proceeds to BCB 404b and BCB 406b. BCB 406b forwards the traffic to BCB 406a, which returns the rerouted traffic to the primary path at its PNP 408d. The rerouted frames are not altered in any way at the protection opening point BCB 404a; they can and do use the same VID value (that associated with the primary e2e path).
[0027] Figure 7 illustrates how the responses shown in figures 5 and 6 require that the BCB matched node 404b has two forwarding paths for section protection of the primary e2e path which are used under different circumstances. Although the two paths cannot be active simultaneously, BCB 404b has no direct means of determining which path will be used and when, and it is advantageous in terms of state and complexity to maintain this lack of active involvement. Simultaneous installation of both of these forwarding paths potentially represents a conflict. In particular, different routes are associated with the same address (that of endpoint BEB 402) at BCB 404b. This is a problem because the BCB typically has only one forwarding database (FDB). One straightforward solution to this problem is to have a different forwarding database at each PNP. However, that is contrary to the Ethernet bridging standards IEEE 802. IQ and IEEE 802. lah, in which the FDB is applicable to all bridge ports, which is problematic if it is desired to comply with those standards.
[0028] Figure 8 illustrates another solution to the problem illustrated in figure 7. The illustrated solution is based on a VID swap operation. In accordance with this solution, a VID swap is performed across the BCB switch on the section protection path, either from upstream node to buddy node, or from buddy node to downstream node. In the specifically illustrated example the VID swap is performed at PNP 408a of BCB 404b, and again at PNP 408d, such that traffic exiting PNP 408d has the same VID as traffic entering PNP 408a, but there is no address conflict within BCB 404b because the paths are associated with different VIDs. Consequently, a single FDB per VLAN can be maintained in compliance with the Ethernet standard. [0029] Figures 9 and 10 illustrate a further protection switching solution for downstream and upstream faults, respectively, in which extra state, in the form of CFM sessions, is installed on matched nodes, but there is still no explicit synchronization required between pairs of matched nodes such as 404a and 404b. In this solution additional pairs of CCM sessions (clockwise and counter-clockwise) are maintained between the matched node opening the section protection on the primary e2e path and that closing the protection on the protection e2e path. These "diagonal" sessions between matched nodes allow the upstream matched node on a section protection path to determine directly whether the downstream part of the section protection path, to the section protection closure point, is operational. For example, a diagonal CCM session 900 is maintained between BCB 406a and BCB 404b. The diagonal sessions allow the network to determine directly whether BCB 404b can reach the section closure point at PNP 408d of BCB 406a. If a fault 902 occurs in the primary path, BCB 404b forwards traffic clockwise around the protection path to BCB 406a, because the buddy matched node 404a has also detected the fault directly from failure of its primary CCM session with BCB 406a, and switched traffic onto the section protection path. An upstream fault 1000 will not be detected by CCM session 900 so traffic is forwarded by default (i.e., when CFM session 900 is running correctly) by BCB 404b as if primary path on the upstream ring is faulted, i.e., fault 1000 is assumed. Note that the behaviour of BCB 404b does not matter in the case of a fault 1001 on the link between the matched nodes, which breaks both paths, because both rings are now faulted, and a subsequent fault on the primary e2e path through both sections can only be recovered by an e2e protection switch..
[0030] While the invention is described through the above exemplary embodiments, it will be understood by those of ordinary skill in the art that modification to and variation of the illustrated embodiments may be made without departing from the inventive concepts herein disclosed. Moreover, while the preferred embodiments are described in connection with various illustrative structures, one skilled in the art will recognize that the system may be embodied using a variety of specific structures. Accordingly, the invention should not be viewed as limited except by the scope and spirit of the appended claims.

Claims

WHAT IS CLAIMED IS:
1. A method for providing protection in a provider bridge backbone network comprising: in response to a fault, utilizing section protection if possible, where a section is defined between an ingress point and an egress point that do not span the entire provider bridge backbone network; and utilizing end-to-end protection if the fault cannot be overcome with section protection.
2. The method of claim 1 wherein end-to-end protection includes a primary path and a protection path, and section protection includes protection for at least one section of the primary path, and including the step of independently opening and closing section protection for each section on the primary path.
3. The method of claim 1 including the further step of utilizing continuity fault management sessions to determine the fault status of all paths through a section which are available to all traffic entering and leaving the section of the provider bridge backbone network via first and second nodes of the section.
4. The method of claim 1 wherein section protection is closed on a single matched node of a pair at each end of a section, and including the further step of utilizing section protection without synchronizing the single matched nodes with their corresponding matched nodes.
5. The method of claim 1 including the further step of utilizing a continuity fault management session between one matched node lying on an end-to-end primary path and another matched node lying on an end-to-end protection path to determine whether connectivity exists between a section protection path and the downstream protection closure point with the corresponding section primary path.
6. The method of claim 1 including enabling at least one node to participate in at least two protection sections without synchronization with other nodes by maintaining a plurality of forwarding databases for the least one node.
7. The method of claim 1 including determining via first continuity fault management sessions whether the fault can be overcome with end-to-end protection, and determining via second continuity fault management sessions whether the fault can be overcome with section protection, wherein a timeout period for the first continuity fault management sessions is longer than a timeout period for the second continuity fault management sessions.
8. The method of claim 1 including, at each section protection opening point, placing frames for a given destination on the primary path through the section or on a protection path through the section based on the fault status of the respective paths and an end-to-end VLAN identifier, without alteration of the VLAN identifier.
9. The method of claim 5 including, at a node participating in protection of both upstream and downstream sections, placing traffic on a path to the protection closure point of the upstream section or on a path to the protection closure point of the downstream section based on an end-to-end VLAN identifier and the status of downstream sections.
10. Apparatus for communicating between endpoints using a provider bridge backbone network comprising: an ingress point node and an egress point node which operate together to provide protection for a section of the network between the ingress point node and the egress point node, where the section does not span the entire provider bridge backbone network, the network operating in response to a fault to utilize the section protection if possible, and to utilize end-to-end protection between the endpoints if the fault cannot be overcome with section protection.
11. The apparatus of claim 10 wherein end-to-end protection includes a primary path and a protection path, and section protection includes protection for at least one section of the primary path, and section protection for each section is independently opened and closed.
12. The apparatus of claim 10 wherein continuity fault management sessions are utilized to determine the fault status of all paths through a section which are available to all traffic entering and leaving the section of the provider bridge backbone network via first and second nodes of the section.
13. The apparatus of claim 10 wherein section protection is closed on a single matched node of a pair at each end of a section, and wherein section protection is utilized without synchronizing the single matched nodes with their corresponding matched nodes.
14. The apparatus of claim 10 wherein a continuity fault management session between one matched node lying on an end-to-end primary path and another matched node lying on an end-to-end protection path to determine whether connectivity exists between a section protection path and the downstream protection closure point with the corresponding section primary path.
15. The apparatus of claim 10 wherein at least one node is enabled to participate in at least two protection sections without synchronization with other nodes by maintaining a plurality of forwarding databases for the least one node.
16. The apparatus of claim 10 wherein first continuity fault management sessions are used to determine whether the fault can be overcome with end-to-end protection, and second continuity fault management sessions are used to determine whether the fault can be overcome with section protection, and wherein a timeout period for the first continuity fault management sessions is longer than a timeout period for the second continuity fault management sessions.
17. The apparatus of claim 10 wherein at each section protection opening point frames for a given destination are placed on the primary path through the section or on a protection path through the section based on the fault status of the respective paths and an end-to-end VLAN identifier, without alteration of the VLAN identifier.
18. The apparatus of claim 14 wherein at a node participating in protection of both upstream and downstream sections, traffic is placed on a path to the protection closure point of the upstream section or on a path to the protection closure point of the downstream section based on an end-to-end VLAN identifier and the status of downstream sections.
EP09813399A 2008-09-11 2009-06-22 Protection for provider backbone bridge traffic engineering Withdrawn EP2329281A4 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US9601108P 2008-09-11 2008-09-11
PCT/US2009/048143 WO2010030428A1 (en) 2008-09-11 2009-06-22 Protection for provider backbone bridge traffic engineering

Publications (2)

Publication Number Publication Date
EP2329281A1 true EP2329281A1 (en) 2011-06-08
EP2329281A4 EP2329281A4 (en) 2011-12-07

Family

ID=42005414

Family Applications (1)

Application Number Title Priority Date Filing Date
EP09813399A Withdrawn EP2329281A4 (en) 2008-09-11 2009-06-22 Protection for provider backbone bridge traffic engineering

Country Status (6)

Country Link
EP (1) EP2329281A4 (en)
JP (1) JP5485998B2 (en)
KR (1) KR20110073445A (en)
CN (1) CN102150053A (en)
CA (1) CA2735000A1 (en)
WO (1) WO2010030428A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102496910B (en) * 2011-12-02 2014-04-23 广州捷能电力科技有限公司 Fault analyzing method of multi-device internet
KR20140011530A (en) 2012-06-29 2014-01-29 한국전자통신연구원 Method and apparatus for managing connection path failure between data centers for cloud computing
JP5841905B2 (en) * 2012-07-03 2016-01-13 株式会社日立製作所 COMMUNICATION SYSTEM, COMMUNICATION NETWORK MANAGEMENT DEVICE, AND COMMUNICATION NETWORK MANAGEMENT METHOD

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002069104A2 (en) * 2001-02-28 2002-09-06 Firstwave Intelligent Optical Networks, Inc. Node architecture and management system for optical networks
US20020167898A1 (en) * 2001-02-13 2002-11-14 Thang Phi Cam Restoration of IP networks using precalculated restoration routing tables
US20070076719A1 (en) * 2005-10-05 2007-04-05 Nortel Networks Limited Provider backbone bridging - provider backbone transport internetworking

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001223727A (en) * 2000-02-10 2001-08-17 Nippon Telegr & Teleph Corp <Ntt> Multi-ring path switching system
JP2005513916A (en) * 2001-12-21 2005-05-12 ミュアヘッド、チャールズ・エス Virtual dedicated network service supply chain management system
US6917759B2 (en) * 2002-01-31 2005-07-12 Nortel Networks Limited Shared mesh signaling algorithm and apparatus
PL2204949T3 (en) * 2005-11-11 2018-01-31 Accenture Global Services Ltd End-to-end test and diagnostic manager as well as corresponding system and method
US8085676B2 (en) * 2006-06-29 2011-12-27 Nortel Networks Limited Method and system for looping back traffic in QIQ ethernet rings and 1:1 protected PBT trunks
US7768928B2 (en) * 2006-07-11 2010-08-03 Corrigent Systems Ltd. Connectivity fault management (CFM) in networks with link aggregation group connections

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020167898A1 (en) * 2001-02-13 2002-11-14 Thang Phi Cam Restoration of IP networks using precalculated restoration routing tables
WO2002069104A2 (en) * 2001-02-28 2002-09-06 Firstwave Intelligent Optical Networks, Inc. Node architecture and management system for optical networks
US20070076719A1 (en) * 2005-10-05 2007-04-05 Nortel Networks Limited Provider backbone bridging - provider backbone transport internetworking

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of WO2010030428A1 *

Also Published As

Publication number Publication date
WO2010030428A1 (en) 2010-03-18
CA2735000A1 (en) 2010-03-18
JP5485998B2 (en) 2014-05-07
CN102150053A (en) 2011-08-10
EP2329281A4 (en) 2011-12-07
JP2012502583A (en) 2012-01-26
KR20110073445A (en) 2011-06-29

Similar Documents

Publication Publication Date Title
CA2711712C (en) Interworking an ethernet ring network and an ethernet network with traffic engineered trunks
CN101364926B (en) Method and apparatus for network protection
US8724519B2 (en) Technique for dual homing interconnection between communication networks
US9509591B2 (en) Technique for dual homing interconnection between communication networks
US8289839B2 (en) Scaling BFD sessions for neighbors using physical / sub-interface relationships
US8687519B2 (en) Forced medium access control (MAC) learning in bridged ethernet networks
US8792337B2 (en) Method and apparatus for providing an uplink over an access ring
EP1958364B1 (en) Vpls remote failure indication
US9106524B2 (en) Protection for provider backbone bridge traffic engineering
Ergenç et al. On the reliability of ieee 802.1 cb frer
Chiesa et al. A survey of fast recovery mechanisms in the data plane
US9716639B2 (en) Protection switching method and system
CN103078777A (en) Method and device for eliminating loop in resilient packet ring network
EP2329281A1 (en) Protection for provider backbone bridge traffic engineering
Ferrari et al. Multipath redundancy for industrial networks using IEEE 802.1 aq Shortest Path Bridging
EP2528263B1 (en) Method for implementing protection group overlay, and method and system for ethernet protection switching
Kirrmann Highly available automation networks standard redundancy methods; rationales behind the IEC 62439 standard suite
James A scalable architecture for high availability seamless redundancy (HSR)
Lee et al. Modeling and algorithm for multiple spanning tree provisioning in resilient and load balanced ethernet networks
CN105703929A (en) Management path switching method, management path switching device and management path switching system
Costa et al. A rrr redbox for safety-critical networked embedded systems
Zhang et al. Demonstration of Transport and Protection Schemes in a Multi-Service Testbed for MPLS-TP Networks
Ahmad et al. Solution of Looping Problem in Learning Bridges
Headquarters Cisco Data Center Interconnect Design and Implementation Guide System Release 1.0
IL191454A (en) Vpls remote failure indication

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20110310

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO SE SI SK TR

AX Request for extension of the european patent

Extension state: AL BA RS

A4 Supplementary search report drawn up and despatched

Effective date: 20111109

RIC1 Information provided on ipc code assigned before grant

Ipc: H04L 29/14 20060101ALN20111103BHEP

Ipc: H04L 12/24 20060101ALN20111103BHEP

Ipc: H04L 12/56 20060101ALI20111103BHEP

Ipc: H04J 14/02 20060101ALI20111103BHEP

Ipc: G01R 31/08 20060101AFI20111103BHEP

DAX Request for extension of the european patent (deleted)
RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: ROCKSTAR BIDCO, LP

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20160105