KR20160106467A - Controller based protection apparatus and method for software defined network - Google Patents
Controller based protection apparatus and method for software defined network Download PDFInfo
- Publication number
- KR20160106467A KR20160106467A KR1020150071821A KR20150071821A KR20160106467A KR 20160106467 A KR20160106467 A KR 20160106467A KR 1020150071821 A KR1020150071821 A KR 1020150071821A KR 20150071821 A KR20150071821 A KR 20150071821A KR 20160106467 A KR20160106467 A KR 20160106467A
- Authority
- KR
- South Korea
- Prior art keywords
- network
- protection
- path
- protection switching
- working path
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0805—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
- H04L43/0811—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking connectivity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/0654—Management of faults, events, alarms or notifications using network fault recovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/06—Generation of reports
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Environmental & Geological Engineering (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Relates to the field of protection of networks, and more particularly to protection devices and methods of software defined networks (SDN).
In terms of network protection requirements, there is a 50ms protection requirement for network protection based on the fact that if a failure of the voice connection is corrected within 50ms, the person is not aware of the failure. However, the 50ms protection requirement was derived in an age when most network traffic was focused on voice. Today, there are various types of application services, including data, streaming and video, and as a result, the need for 50ms protection requirements is becoming smaller and smaller.
On the other hand, SDN technology is evolving to provide improved scalability, reliability and agility when compared to conventional networks. There is a new need for controller-based protection devices and methods that enable SDNs to provide high availability and small latency in such environments. In addition, this controller-based protection method can improve the reliability of the network and can be expected to be used in various forms.
According to one side, a protection device of a software defined network (SDN) is provided. Wherein the protection device of the software defined network comprises a controller for performing protection switching on at least one working path in a software defined network and a controller for setting a first event in which the protection switching is performed, And may include a processor for establishing a protection path in advance. In addition, the processor may perform the protection switching by setting the protection path to a new working path when the first event occurs.
According to another aspect, a method of protecting a software defined network is provided. Wherein the protection method of the software defined network comprises establishing a protection switching method corresponding to each of the at least one level network protection devices disposed in at least one working path connecting the consumer virtual network and the physical network, The at least one level network protection device in the first working path may perform the set protection switching method when a message relating to an operational fault is received from the first working path in the path.
According to one embodiment, configuring the protection switching method may include setting an event that occurs in the at least one working path to the operational fault. In addition, the step of setting the protection switching method may further comprise setting a protection path in advance before receiving the message associated with the operation failure. In addition, the step of performing the protection switching method may perform the protection switching by setting the protection path as a new working path when the message is received.
According to another embodiment, the step of performing the protection switching may include a step of, when receiving the message, determining a restoration path in the at least one working path and setting the restoration path as a new working path to perform protection switching Step < / RTI > In addition, one of the at least one working path may be determined as the restoration path corresponding to a predetermined setting value.
According to yet another embodiment, the method of protecting a software defined network separates the at least one working path into a sub-connection in the same domain and an inter-connection that connects between neighboring domains Step < / RTI > In addition, the step of setting the protection switching method may respectively set the first protection switching method corresponding to the sub-connection and the second protection switching method corresponding to the inter-connection, respectively. The step of performing the protection switching method may further include performing protection switching according to the first protection switching method when receiving the message associated with the sub-connection, receiving the message associated with the inter-connection The protection switching can be performed according to the second protection switching method.
According to another aspect, a method of protecting a software defined network is provided. Said method comprising: establishing a first event in which protection switching is performed on at least one working path in a software defined network; and setting a protection path for said at least one working path in advance May be established. In addition, the protection method of the software defined network may further include, when the first event occurs, performing the protection switching by setting the protection path as a new working path.
According to one embodiment, the protection method of the software defined network comprises setting a second event occurring in the at least one working path and determining a restoration path in the software defined network when the second event occurs The method comprising the steps of: In addition, the step of determining the restoration path may determine the first working path corresponding to the predetermined set value among the at least one working path as the restoration path.
1A and 1B are block diagrams illustrating a network protection apparatus according to one embodiment.
2 is a block diagram illustrating a network protection apparatus according to one embodiment.
3 is an exemplary diagram illustrating a multi-level network protection apparatus in accordance with one embodiment.
4 is a block diagram illustrating a method of protecting a software defined network according to one embodiment.
5 is a block diagram illustrating a method of protecting a network in a multi-domain according to one embodiment.
6 is a block diagram illustrating a network protection method for a transport network.
In the following, some embodiments will be described in detail with reference to the accompanying drawings. However, the scope of the present invention is not limited or limited by these embodiments. Like reference symbols in the drawings denote like elements.
The terms used in the following description are chosen to be generic and universal in the art to which they are related, but other terms may exist depending on the development and / or change in technology, customs, preferences of the technician, and the like. Accordingly, the terminology used in the following description should not be construed as limiting the technical thought, but should be understood in the exemplary language used to describe the embodiments.
Also, in certain cases, there may be a term chosen arbitrarily by the applicant, in which case the meaning of the detailed description in the corresponding description section. Therefore, the term used in the following description should be understood based on the meaning of the term, not the name of a simple term, and the contents throughout the specification.
FIGS. 1A and 1B illustrate an example of a network protection apparatus according to an exemplary embodiment of the present invention. 1A, a
Referring to FIG. 1B, a
2 is a block diagram illustrating a network protection apparatus according to one embodiment. According to one embodiment, the
The
In another embodiment, the
3 is an exemplary diagram illustrating a multi-level network protection apparatus according to one embodiment. 3, a plurality of
Each of the plurality of consumer
To protect the connection path, a multi-level network protection device can set each protection method according to each level of network protection device. In addition, the multi-level network protection device may configure each network protection method independently of the last connected
Illustratively, assume that the first level
In another embodiment, when the third
4 is a block diagram illustrating a method of protecting a software defined network according to one embodiment. A method of protecting a software defined network (400) includes deploying (410) at least one level network protection device, establishing (420) a protection switching method corresponding to the at least one level network protection device And if the message related to the operation failure is received, performing the set protection switching method (430).
Step 410 is where each of the at least one level network protection device is placed on at least one working path in the software defined network. More specifically, the at least one working path may be a path connecting at least one consumer virtual network to at least one physical network. In addition, in
Step 420 is to establish a protection switching method corresponding to each of the at least one level network protection devices. More specifically, the protection switching method can be any one of a controller-based network protection method and a controller-based network restoration method. In addition,
Step 430 is a step of performing the set protection switching method when receiving a message related to an operation failure from the working path. Illustratively, when a message associated with an operational fault is received from a first working path in at least one working path, at least one level network protection device in the first working path can perform a protection switching method. In one embodiment, if a controller-based network recovery method is configured in
5 is a block diagram illustrating a method of protecting a network in a multi-domain according to one embodiment. A
Step 510 is a step of separating at least one working path in the software defined network into either one of sub-connection and inter-connection, respectively. In one embodiment, the sub-connection may be a working path that exists in the same domain. In another embodiment, the inter-connection may be a working path connecting between different neighboring domains. Within a software defined network, the consumer virtual network may request network protection for connection to the physical network. In addition, the multi-domain may be a network in which there is a working path connecting different domains within a software defined network. However, there are nodes in the multi-domain that use different network policies, network device vendors and protocols to implement the same network protection method in end-to-end connection Difficulties exist. Accordingly, the network protection method of the present invention can provide a method for separating at least one working path into either one of sub-connection and inter-connection, respectively, so that different network protection methods can be performed.
Step 520 is a step of setting a first protection switching method corresponding to the sub-connection and a second protection switching method corresponding to the inter-connection, respectively. In
6 is a block diagram illustrating a network protection method for a transport network. A
Step 610 is the step of establishing a protection switching method for the transport network connected to the first level network protection device from at least one level network protection device present in the software defined network. In one embodiment, the transport network may be an IP (Internet Protocol) over Ethernet (Ethernet) network. In another embodiment, the transport network may be an IP over MPLS-TE (Multi-Protocol Label Switching-Traffic Engineering) network. In yet another embodiment, the transmission network may be an IP over WDM (Wavelength Division Multiplexing) network. Although the above description describes embodiments of three transmission networks, it is not intended to limit or limit the scope of the present invention, and the transmission network of the above description may be any of the various types of protocols used for data transmission and reception today . In addition, the protection switching method can be either a controller-based network protection method or a controller-based network restoration method.
Step 620 is a step of performing a protection switching method corresponding to the transmission network. More specifically,
The embodiments described above may be implemented in hardware components, software components, and / or a combination of hardware components and software components. For example, the devices, methods, and components described in the embodiments may be implemented within a processor, a controller, an arithmetic logic unit (ALU), a digital signal processor, a microcomputer, a field programmable gate array such as an array, a programmable logic unit (PLU), a microprocessor, or any other device capable of executing and responding to instructions. The processing device may execute an operating system (OS) and one or more software applications running on the operating system. The processing device may also access, store, manipulate, process, and generate data in response to execution of the software. For ease of understanding, the processing apparatus may be described as being used singly, but those skilled in the art will recognize that the processing apparatus may have a plurality of processing elements and / As shown in FIG. For example, the processing apparatus may comprise a plurality of processors or one processor and one controller. Other processing configurations are also possible, such as a parallel processor.
The software may include a computer program, code, instructions, or a combination of one or more of the foregoing, and may be configured to configure the processing device to operate as desired or to process it collectively or collectively Device can be commanded. The software and / or data may be in the form of any type of machine, component, physical device, virtual equipment, computer storage media, or device , Or may be permanently or temporarily embodied in a transmitted signal wave. The software may be distributed over a networked computer system and stored or executed in a distributed manner. The software and data may be stored on one or more computer readable recording media.
The method according to an embodiment may be implemented in the form of a program command that can be executed through various computer means and recorded in a computer-readable medium. The computer-readable medium may include program instructions, data files, data structures, and the like, alone or in combination. The program instructions to be recorded on the medium may be those specially designed and configured for the embodiments or may be available to those skilled in the art of computer software. Examples of computer-readable media include magnetic media such as hard disks, floppy disks and magnetic tape; optical media such as CD-ROMs and DVDs; magnetic media such as floppy disks; Magneto-optical media, and hardware devices specifically configured to store and execute program instructions such as ROM, RAM, flash memory, and the like. Examples of program instructions include machine language code such as those produced by a compiler, as well as high-level language code that can be executed by a computer using an interpreter or the like. The hardware devices described above may be configured to operate as one or more software modules to perform the operations of the embodiments, and vice versa.
While the present invention has been particularly shown and described with reference to exemplary embodiments thereof, it is to be understood that the invention is not limited to the disclosed exemplary embodiments. For example, it is to be understood that the techniques described may be performed in a different order than the described methods, and / or that components of the described systems, structures, devices, circuits, Lt; / RTI > or equivalents, even if it is replaced or replaced. Therefore, other implementations, other embodiments, and equivalents to the claims are also within the scope of the following claims.
Claims (20)
A processor for setting a protection path in advance before the first event occurs,
A protection device of a software defined network.
Wherein the processor sets the protection path to a new working path when the first event occurs, thereby performing the protection switching.
Wherein the processor sets a second event that occurs within the at least one working path and determines a recovery path within the software defined network if the second event occurs.
Wherein the processor determines one restoration path as the working path corresponding to a predetermined set value among at least one restoration path.
Establishing a protection switching method corresponding to each of at least one level network protection device disposed in at least one working path connecting a consumer virtual network and a physical network; And
Wherein said at least one level network protection device in said first working path performs said set protection switching method when a message associated with an operational fault is received from a first working path of said at least one working path
The method comprising the steps of:
Wherein configuring the protection switching method comprises deploying each of the at least one level network protection device at a particular level within the at least one working path and deploying the at least one level network protection device in a multi level structure Way.
Wherein configuring the protection switching method comprises setting an event that occurs in the at least one working path to the operational fault.
Wherein setting the protection switching method further comprises setting a protection path in advance before receiving the message associated with the operational fault.
Wherein the step of performing the protection switching method comprises the steps of setting the protection path as a new working path in the case of receiving the message to perform protection switching.
Wherein the step of performing the protection switching method further comprises the step of, when receiving the message, determining a restoration path in the at least one working path and setting the restoration path as a new working path to perform protection switching Definition How to protect your network.
Wherein the step of performing the protection switching method determines one restoration path as the working path corresponding to a predetermined set value among at least one restoration path.
Separating the at least one working path into a sub connection in the same domain and an interconnection connecting between neighboring domains,
Further comprising the steps of:
Wherein the setting of the protection switching method sets the first protection switching method corresponding to the sub-connection and the second protection switching method corresponding to the inter-connection, respectively.
Wherein the step of performing the protection switching method comprises the steps of: performing protection switching according to the first protection switching method when receiving the message associated with the sub-connection, and when receiving the message associated with the inter- To the second protection switching method in accordance with the second protection switching method.
Wherein establishing the protection switching method establishes a protection switching method for a transport network connected to a first level network protection device of the at least one level network protection device.
Wherein the transmission network is a software defined network that is any one of an IP (Internet Protocol) over Ethernet network, an IP over MPLS-TE network, and an IP over WDM (Wavelength Division Multiplexing) How to protect.
Establishing a protection path for the at least one working path before the first event occurs
The method comprising the steps of:
When the first event occurs, performing the protection switching by setting the protection path as a new working path
Further comprising the steps of:
Establishing a second event occurring within the at least one working path; And
Determining a restoration path in the software defined network when the second event occurs;
Further comprising the steps of:
Wherein the step of determining the restoration path determines the first restoration path as the working path corresponding to a preset value among at least one restoration path.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/059,025 US20160261456A1 (en) | 2015-03-02 | 2016-03-02 | Controller based protection method and apparatus for software defined network |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150029313 | 2015-03-02 | ||
KR20150029313 | 2015-03-02 |
Publications (2)
Publication Number | Publication Date |
---|---|
KR20160106467A true KR20160106467A (en) | 2016-09-12 |
KR101965402B1 KR101965402B1 (en) | 2019-04-03 |
Family
ID=56950304
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020150071821A KR101965402B1 (en) | 2015-03-02 | 2015-05-22 | Controller based protection apparatus and method for software defined network |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR101965402B1 (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20140032913A (en) * | 2012-09-07 | 2014-03-17 | 한국전자통신연구원 | Method and appratus for protection switching |
US20150043383A1 (en) * | 2013-08-07 | 2015-02-12 | Telefonaktiebolaget L M Ericsson (Publ) | Automatic establishment of redundant paths with cautious restoration in a packet network |
US20160020942A1 (en) * | 2014-07-16 | 2016-01-21 | Mandar Joshi | Linear path protection in a centralized controller environment |
-
2015
- 2015-05-22 KR KR1020150071821A patent/KR101965402B1/en active IP Right Grant
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20140032913A (en) * | 2012-09-07 | 2014-03-17 | 한국전자통신연구원 | Method and appratus for protection switching |
US20150043383A1 (en) * | 2013-08-07 | 2015-02-12 | Telefonaktiebolaget L M Ericsson (Publ) | Automatic establishment of redundant paths with cautious restoration in a packet network |
US20160020942A1 (en) * | 2014-07-16 | 2016-01-21 | Mandar Joshi | Linear path protection in a centralized controller environment |
Also Published As
Publication number | Publication date |
---|---|
KR101965402B1 (en) | 2019-04-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
RU2636689C2 (en) | Automatic establishment of redundant paths with careful restoration in packet switching network | |
EP2972831B1 (en) | Extended tag networking | |
EP2564564B1 (en) | Virtual switching overlay for cloud computing | |
Song et al. | Control path management framework for enhancing software-defined network (SDN) reliability | |
US20160119255A1 (en) | Partial Software Defined Network Switch Replacement in IP Networks | |
US9621260B2 (en) | Proactive optical restoration system | |
EP3211832B1 (en) | Fault detection method and device | |
CN104539443A (en) | Communicating network path and status information in multi-homed networks | |
EP3065350B1 (en) | Link discovery method, system and device | |
EP2652918B1 (en) | Segment recovery in connection-oriented network | |
KR20160087530A (en) | Method for recovery of service chain path, service function forwarding node using the same, and network system using the same | |
EP3629535A1 (en) | Method, device, and system for implementing mux machine | |
US20160261456A1 (en) | Controller based protection method and apparatus for software defined network | |
KR20180122513A (en) | Method and framework for traffic engineering in network hypervisor of sdn-based network virtualization platform | |
US20160142286A1 (en) | Dual node interconnection protection switching method and apparatus | |
EP2526652B1 (en) | Method, apparatus and communication network for providing restoration survivability | |
JP2009506592A (en) | Apparatus and method for managing nodes on a fault tolerant network | |
US20060077922A1 (en) | System method & apparatus for routing traffic in a telecommunications network | |
EP3125478B1 (en) | Method, device, and system for determining intermediate routing node | |
KR101965402B1 (en) | Controller based protection apparatus and method for software defined network | |
US11509398B2 (en) | Control apparatus and control method | |
CN105812274B (en) | Service data processing method and related equipment | |
US10432505B2 (en) | Systems, apparatuses, and methods for rerouting network traffic | |
US20220116267A1 (en) | Fault recovery control method, communication apparatus, communication system, and program | |
EP2698961B1 (en) | Method, system and devices for securing traffic on a traffic path in a computer network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
E902 | Notification of reason for refusal | ||
E701 | Decision to grant or registration of patent right | ||
GRNT | Written decision to grant |