WO2000016113A1 - Systeme et procede de reutilisation reservee de parties intactes de trajets defectueux dans un reseau de telecommunications - Google Patents

Systeme et procede de reutilisation reservee de parties intactes de trajets defectueux dans un reseau de telecommunications Download PDF

Info

Publication number
WO2000016113A1
WO2000016113A1 PCT/US1999/020936 US9920936W WO0016113A1 WO 2000016113 A1 WO2000016113 A1 WO 2000016113A1 US 9920936 W US9920936 W US 9920936W WO 0016113 A1 WO0016113 A1 WO 0016113A1
Authority
WO
WIPO (PCT)
Prior art keywords
node
message
nodes
path
reuse
Prior art date
Application number
PCT/US1999/020936
Other languages
English (en)
Inventor
Paul T. Baniewicz
Sridhar Alagar
Bryan J. Mcglade
Sig H. Badt, Sr.
Ashley W. Brimmage
Frederick R. Ellefson
Original Assignee
Mci Worldcom, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mci Worldcom, Inc. filed Critical Mci Worldcom, Inc.
Priority to AU59197/99A priority Critical patent/AU5919799A/en
Publication of WO2000016113A1 publication Critical patent/WO2000016113A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04JMULTIPLEX COMMUNICATION
    • H04J3/00Time-division multiplex systems
    • H04J3/02Details
    • H04J3/14Monitoring arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0654Management of faults, events, alarms or notifications using network fault recovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/32Specific management aspects for broadband networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/40Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass for recovering from a failure of a protocol instance or entity, e.g. service redundancy protocols, protocol state redundancy or protocol service redirection

Definitions

  • This invention relates to telecommunications networks having 1633 -SX broadband digital cross -connect switches, and more particularly to a messaging method therefor by which the origin and destination nodes of a failed path can receive information on which spans or links remain usable in the failed path.
  • a telecommunications network comprises a plurality of nodes connected together by spans and links. These spans and links are fur the most part fiber optical cables.
  • a path is defined in the network as the connection between the two end nodes by which information or traffic can traverse.
  • One of these end nodes is defined as an origin node while the other is the destination node.
  • another path can be used as an alternate for rerouting the traffic.
  • DAA distributed restoration algorithm
  • a DRA provisioned network must take into account all such end to end paths that need to be restored in order to ensure the highest possible degree of restoration following a failure. There is therefore a need for an improved DRA provisioned path based restoration scheme that allows the intact portions of a failed path to be ascertained and made available for forming alternate restoration paths, to thereby improve the efficiency and the completeness of the restoration.
  • the present invention massaging technique provides information to both the origin and destination nodes of a failed path on which spans or links remain intact leading up to the point of failure.
  • the failure is first detected by the adjacent custodial nodes bracketing the fault.
  • Each of these custodial nodes adjacent to the failure then would initiate the propagation of a "reuse" message to either the origin node or the destination node.
  • This reuse message has a variable length route information field and an identifier identifying it as a reuse message.
  • each node through which the reuse message passes would append its own unique node identification (ID) to the route information field.
  • ID unique node identification
  • restoration logic By allowing the restoration logic to take into account the intact portions of the original paths, better restoration decision making use of the intact portions of the path can take place.
  • such restoration logic is only permitted to apply the intact portions to the restoration of the failed path that originally included the portions.
  • intact portions are restricted for use in restoring the failed path. Such restriction considerably simplifies the restoration process and avoids the possibility of unforeseen problems.
  • the present invention to provide a method of determining the portions of a failed path that remain usable for carrying traffic. It is moreover an objective of the present invention for identifying the reusable links or spans that connect nodes of a failed path so that these links or spans can be used by an alternate path for restoring the disrupted traffic.
  • FIGURE 1 conceptually illustrates a simplified telecommunications restoration network to provide certain definitions applicable to the present invention
  • FIGURE 2 illustrates a restoration subnetwork for illustrating concepts applicable to the present invention
  • FIGURE 3 conceptually shows a failure within a restoration subnetwork
  • FIGURE 4 illustrates two origins/destination nodes pairs for demonstrating the applicable scope of the present invention
  • FIGURES 5A and 5B illustrate the loose synchronization features of the present invention
  • FIGURE 6 shows the failure notification message flow applicable to the present invention
  • FIGURE 7 illustrates the flow of keep-alive messages according to the present invention
  • FIGURE 8 illustrates the flow of path verification messages according to the teachings of the present invention
  • FIGURE 9 shows a time diagram applicable to the failure notification and fault isolation process of the present invention
  • FIGURES 10 and 11 illustrate the AIS signal flow within the restoration subnetwork of the present invention
  • FIGURE 12 describes more completely the failure notification message flow within the restoration subnetwork according to the present invention
  • FIGURE 13 illustrates the beginning of an iteration of the restoration process of the present invention
  • FIGURE 14 provides a timed diagram applicable to the explore, return, max flow and connect phases of the first iteration of the restoration process of the present invention
  • FIGURE 15 provides a timed diagram associated with the explore phase of the process of the present invention.
  • FIGURE 16 illustrates the possible configuration of multiple origins/destination node pairs from a given origin node
  • FIGURE 17 depicts two steps of the explore phase of the first iteration of the restoration process
  • FIGURE 18 provides a timed diagram applicable to the return phase of the restoration process of the present invention
  • FIGURE 19 shows steps associated with the return phase of the present process
  • FIGURES 20, 21 and 22 illustrates the link allocation according to the return phase of the present invention
  • FIGURE 23 illustrates a typical return message for receipt by the origin node of a restoration subnetwork
  • FIGURE 24 provides a timed diagram for depicting the modified map derived from the return messages received at the origin node;
  • FIGURE 26 shows the max flow out ⁇ n+" for the max flow phase of the present process
  • FIGURE 27 illustrates an optimal routing applicable to the max flow output of the present invention
  • FIGURE 28 provides a timed diagram for showing the sequence of the connect phase for the first iteration of the process of the present invention
  • FIGURE 29 illustrates the connect messages for providing the alternate path routes between an origin node and destination node of a restoration subnetwork
  • FIGURES 30 and 31 show how the present invention deals with hybrid restoration subnetworks
  • FIGURES 32 and 33 illustrate the explore phase and return phase, respectively, applicable to hybrid networks
  • FIGURE 34 shows the time diagram including an extra iteration for processing hybrid networks according to the teachings of the present invention
  • FIGURES 35 and 36 illustrate a lower quality spare according to the teachings of the present invention
  • FIGURE 37 illustrate the use of a "I am custodial node" flag of the present invention
  • FIGURES 38 through 42 describe the restricted reuse features of the present invention
  • FIGURE 43 describes the path inhibit feature of the present invention
  • FIGURE 44 further describes the path inhibit feature of the present invention
  • FIGURE 45 is a path of a telecommunications network for illustrating the instant invention
  • FIGURE 46 illustrates the messages that are sent from the custodial nodes of the failed path of FIGURE
  • FIGURE 47 is another view of the failed path of FIGURE 45 in which messages are sent from the intermediate nodes to their respective downstream nodes;
  • FIGURE 48 is the failed path of FIGURE 45 showing a message reaching the destination node, the interconnections between the origin and destination nodes, and the use of a spare link for bypassing the fault;
  • FIGURE 49 is an illustration of the reuse message of the present invention.
  • FIGURE 1 shows telecommunications network portion 10, that includes node 12 that may communicate with node 14 and node 16, for example. Connecting between node 12 and 14 may be a set of links such as links 18 through 26, as well as for example, links 28 through 30 between node 12 and node 16. Node 14 and node 16 may also communicate between one another through links 32 through 36, for example, which collectively may be thought of as a span 38.
  • the term 1633SX is a cross-connect switch and is here called a "node.” Between nodes are links, which may be a DS-3, and STS-1, which is essentially the same thing as a DS-3, but which conforms to a different standard.
  • a link could be an STS-3, which is three STS-ls multiplexed together to form a single signal.
  • a link may also be a STS-12, which is twelve STS-ls multiplexed together, or a link could be an STS-12C, which is twelve STS-12s, which are actually locked together to form one large channel.
  • a link is a unit of capacity connecting between one node and another.
  • a span is to be understood as all of the links between two adjacent nodes. Adjacent nodes or neighbor nodes are connected by a bundle, which itself is made up of links.
  • links may be classified as working, spare, fail, or recovered.
  • a working link is a link that currently carries traffic. Spare links are operable links that are not currently being used. A spare link may be used whenever the network desires to use the link.
  • a failed link is a link that was working, but has failed.
  • a recovered link is a link that, as will be described more completely below, has been recovered.
  • FIGURE 2 illustrates the conceptual example of restoration subnetwork 40 that may include origin node 42 that through tandem nodes 44 and 46 connects to destination node 48.
  • a path such as paths 50, 52, 54, and 56 includes connections to nodes 42 through 48, for example, as well as links between these nodes.
  • each of the paths enters restoration subnetwork 40 from outside restoration subnetwork 40 at origin node 42.
  • each of nodes 42 through 48 includes an associated node identifier. Origin node 42 possesses a lower node identifier value, while destination node 48 possesses a higher node identifier value. In the restoration process of the present invention, the nodes compare node identification numbers.
  • the present invention establishes restoration subnetwork 40 that may be part of an entire telecommunications network 10.
  • restoration subnetwork 40 there may be numerous paths 50.
  • a path 50 includes a number of links 18 strung together and crossconnected through the nodes 44.
  • the path 50 does not start within restoration subnetwork 40, but may start at a customer premise or someplace else. In fact, a path 50 may originate outside a given telecommunications network 10.
  • the point at which the path 50 enters the restoration subnetwork 40 is origin node 42.
  • the point on origin node 42 at which path 50 comes into restoration subnetwork 40 is access/egress port 58.
  • the failure may occur between two tandem nodes.
  • the two tandem nodes on each side of the failure are designated as "custodial" nodes. If a single failure occurs in the network, there can be two custodial nodes. In the network, therefore, there can be many origin/destination nodes. There will be two origin nodes and two destination nodes. An origin node together with an associated destination node may be deemed an origin/destination pair. One failure may cause many origin/destination pairs .
  • FIGURE 3 illustrates the concept of custodial nodes applicable to the present invention. Referring again to restoration subnetwork 40, custodial nodes 62 and 64 are the tandem nodes positioned on each side of failed span 66.
  • FIGURE 4 illustrates the aspect of the present invention for handling more than one origin-destination node pair in the event of a span failure.
  • restoration subnetwork 40 may include, for example, origin node 42 that connects through custodial nodes 62 and 64 to destination node 48.
  • origin node 72 may connect through custodial node 62 and custodial node 64 to destination node 74.
  • FIGURE 4 shows failure 66 that establishes custodial nodes 62 and 64.
  • the present invention has application for each origin/destination pair in a given restoration subnetwork.
  • the following discussion describes the operation of the present invention for one origin/destination pair, obtaining an understanding of how the present invention handles a single origin/destination pair makes clear how the algorithm may be extended in the event of several origin/destination pairs occurring at the same time.
  • An important consideration for the present invention is that a single cut may produce numerous origin/destination pairs.
  • FIGURES 5A and 5B illustrate the concept of loose synchronization according to the present invention. "Loose synchronization" allows operation of the present method and system as though all steps were synchronized according to a centralized clock.
  • Known restoration algorithms suffer from race conditions during restoration that make operation of the restoration process unpredictable.
  • restoration subnetwork 40 includes origin node 42, that connects to tandem nodes 44 and 46. Data may flow from origin node 42 to tandem node 46, along data path 76, for example. Origin node 42 may connect to tandem node 44 via path 78. However, path 80 may directly connect origin node 42 with destination node 48. Path 82 connects between tandem node 44 and tandem node 46. Moreover, path 84 connects between tandem node 46 and destination node 48.
  • data may flow along path 76 from origin node 42 to tandem node 46, and from destination node 48 to origin node 42. Moreover, data may be communicated between tandem node 44 and tandem node 46. Destination node 48 may direct data to origin node 42 along data path 80, as well as to tandem node 46 using path 84.
  • each of the nodes in restoration subnetwork 40 sends a "step complete" message to its neighboring node.
  • step complete message exchanges occur between origin node 42 and tandem node 44 on data path 78, between origin node 42 and tandem node 46 on data path 76, and between origin node 42 and destination node 48 on data path 80.
  • tandem node 46 exchanges "step complete" messages with tandem node 44 on data path 82, and between tandem node 46 and destination node 48 on data path 84.
  • the term "hop count" is part of the message that travels from one node to its neighbor. Each time a message flows from one node to its neighbor, a "hop” occurs. Therefore, the hop count determines how many hops the message has taken within the restoration subnetwork.
  • the restoration algorithm of the present invention may be partitioned into steps. Loose synchronization assures that in each step a node processes the message it receives from its neighbors in that step. Loose synchronization also makes the node send a step complete message to every neighbor. If a node has nothing to do in a given step, all it does is send a step complete message. When a node receives a step complete message from all of its neighbors, it increments a step counter associated with the node and goes to the next step.
  • a node Once a node receives step complete messages from every neighbor, it goes to the next step in the restoration process. In looking at the messages that may go over a link, it is possible to see a number of messages going over the link. The last message, however, will be a step complete message. Thus, during the step, numerous data messages are exchanged between nodes. At the end of the step, all the nodes send step complete messages to their neighbors to indicate that all of the appropriate data messages have been sent and it is appropriate to go to the next step. As a result of the continual data, step complete, data, step complete, message traffic, a basic synchronization occurs.
  • step 1 The steps in the process of the present invention may be thought of most easily by considering them to be numbered.
  • step 2 There are predetermined activities that occur at each step and each node possesses its own step counter. However, there is no master clock that controls the entire restoration subnetwork.
  • the network restoration process of the present invention may be considered as a distributive restoration process. With this configuration, no node is any different from any other node. They all perform the same process independently, but in loose synchronization.
  • FIGURE 6 shows the typical form of a failure notification message through restoration subnetwork 40.
  • origin node 42 desires to start a restoration event, it first sends failure notification messages to tandem node 44 via data path 78, to tandem node 46 via data path 76, and destination node 48 via data path 80.
  • tandem node 44 sends failure notification message to tandem node 46 on path 82, as does destination node 48 to tandem node 46 on path, 84.
  • the process of the present invention therefore, begins with a failure notification message.
  • the failure notification message is broadcast throughout the restoration subnetwork to begin the restoration process from one node to all other nodes, once a node receives a failure message, it sends the failure notification message to its neighboring node, which further sends the message to its neighboring nodes.
  • the failure notification message reaches every node in the restoration subnetwork. Note that if there are multiple failures in a network, it is possible to have multiple failure notification messages flooding throughout the restoration subnetwork simultaneously.
  • the first failure notification message initiates the restoration algorithm of the present invention. Moreover, broadcasting the failure notification message is asynchronous in the sense that as soon as the node receives the failure notification message, it broadcasts the message to its neighbors without regard to any timing signals. It is the failure notification message that begins the loose synchronization process to begin the restoration process of the present invention at each node within the restoration subnetwork. Once a node begins the restoration process, a series of events occurs.
  • FIGURE 7 illustrates the communication of keep- alive messages that the restoration process of the present invention communicates on spare links, for the purpose of identifying neighboring nodes.
  • configuration 90 shows the connection via spare link 92 between node 94 and node 96.
  • node 94 has the numerical designation I'll", and port designation 11103".
  • node 96 has the numerical designation 3 and the port designation 5.
  • node 94 sends keep-alive message 98 to node 96, identifying its node number "11" and port number "103".
  • keep-alive message 100 flows to node 94, identifying the keep-alive message as coming from the node having the numerical value "3", and its port having the numerical value "5".
  • the present invention employs keep-alive signaling using C-Bit of the DS-3 formatted messages in restoration subnetwork 40, the available spare links carry DS-3 signals, wherein the C-bits convey special keep-alive messages.
  • each keep-alive message contains the node identifier and port number that is sending the message, the WAN address of the node, and an "I am custodial node" indicator to be used for assessing spare quality.
  • An important aspect of the present invention relates to signaling channels which occurs when cross- connect nodes communicate with one another.
  • One is called in-band, another is out-of- band.
  • in-band communication a signal travels over the same physical piece of media as the working traffic. The communication travels over the same physical media as the path or the same physical media as the link.
  • out-of-band signals there is freedom to deliver the signals between cross-connects in any way possible.
  • Out-of-band signals generally require a much higher data rate.
  • in-band messages are piggybacked on links, out-of-band message traffic may flow along any other possible path between two nodes.
  • certain messages must flow in-band. These include the keep-alive message, the path verification message, and the signal fail message.
  • a distinguishing feature between SONET links and DS-3 links is that each employs a different framing standard for which unique and applicable equipment must conform. It is not physically possible to have the same port serve as a SONET port and as a DS-3 port at the same time.
  • tandem path overhead which is a signaling channel that is part of the signal that is multiplexed together. It is possible to separate this signal portion from the SONET signaling channel.
  • the C-bit On DS-3 links, there are two possible signaling channels. There is the C-bit and the X-bit.
  • the C-bit channel cannot be used on working paths, but can only be used on spare or recovered links. This is because the DS-3 standard provides the option using the C-bit or not using the C-bit. If the C-bit format signal is used, then it is possible to use the C-bit for signaling. However, in this instance, working traffic does not use that format. Accordingly, the C-bit is not available for signaling on the working channels. It can be used only on spare links and on recovered links .
  • FIGURE 8 illustrates in restoration subnetwork 40 the flow of path verification messages from origin node 42 through tandem nodes 44 and 46 to destination node 48.
  • Path verification message 102 flows from origin node 42 through tandem nodes 44 and 46 to destination node 48.
  • Destination node 48 includes the label 15 and egress port 106 having the label 29.
  • Path verification message 104 flows through tandem node 46 and 44 to origin node 42 for the purpose of identifying destination node 48 as the destination node for working path 52.
  • a path verification message is embedded in a DS-3 signal using the X-bits which are normally used for very low speed single-bit alarm signaling.
  • the X-bit state is overridden with short bursts of data to communicate signal identity to receptive equipment downstream.
  • the bursts are of such short duration that other equipment relying upon traditional use of the X-bit for alarm signaling will not be disturbed.
  • the present invention also provides for confining path verification signals within a network.
  • path verification messages are imbedded in tra fic-bearing signals entering the network and removed from signals leaving the network. Inside of the network, propagation of such signals is bounded based upon the DRA-enablement status of each port.
  • the path verification messages identify the originating node and the destination node.
  • the path verification messages occur on working links that are actually carrying traffic.
  • the path verification message originates at origin node 42 and the restoration subnetwork and passes through tandem nodes until the traffic reaches destination node 48. Tandem nodes 44 and 46 between the origin node 42 and destination node 48, for example, can read the path verification message but they cannot modify it.
  • the path verification message is stripped from the working traffic to prevent its being transmitted from the restoration subnetwork.
  • the present invention uses the X-bit to carry path verification message 104.
  • one signal format that the present invention may use is the DS-3 signal format. While it is possible to easily provide a path verification message on SONET traffic, the DS-3 traffic standard does not readily permit using path verification message 104.
  • the present invention overcomes this limitation by adding to the DS-3 signal, without interrupting the traffic on this signal and without causing alarms throughout the network, path verification message 104 on the DS-3 frame X-bit.
  • the DS-3 standard specifies that the signal is provided in frames. Each frame has a special bit in it called the X-bit. In fact, there are two X-bits, X-l and X-2. The original purpose of the X-bit, however, was not to carry path verification message 104.
  • the present invention provides in the X-bit the path verification message. This avoids alarms and equipment problems that would occur if path verification message 104 were placed elsewhere.
  • An important aspect of using the X-bit for path-verification message 104 with the present embodiment relates to the format of the signal.
  • the present embodiment sends path verification message 104 at a very low data rate, for example, on the order of five bits per second.
  • path verification message 104 By sending path verification message 104 on the X-bit very slowly, the possibility of causing an alarm in the network is significantly reduced. Path verification message 104 is sent at a short burst, followed by a long waiting period, followed by a short burst, followed by a long waiting period, etc. This method of "sneaking" path verification message 104 past the alarms permits using path verification message 104 in the DS-3 architecture systems.
  • FIGURE 9 shows conceptually a timeline for the restoration process that the present invention performs.
  • time region 108 depicts the network status prior to a failure happening at point 110.
  • the failure notification and fault isolation events occur in time span 112.
  • the first generation of the present process occurs, as indicated by space 114. This includes explore phase 116 having, for example three steps 118, 120 and 122.
  • Return phase 124 occurs next and may include at least two steps 126 and 128. These steps are discussed more completely below.
  • failure notification starts the process by sending failure notification messages throughout the restoration subnetwork.
  • Fault isolation entails determining which nodes are the custodial nodes.
  • One reason that it is important to know the custodial nodes is that there are spares on the same span as the failed span.
  • the present invention avoids using those spares, because they are also highly likely to fail.
  • Fault isolation therefore, provides a way to identify which nodes are the custodial nodes and identifies the location of the fault along the path.
  • FIGURE 10 illustrates the flow of AIS signals 130 through restoration subnetwork 40.
  • the AIS message 130 travels through custodial node 62 to origin node 42 and out restoration subnetwork 40. Also, AIS message 130 travels through custodial node 64 and tandem node 46, to destination node 48 before leaving restoration subnetwork 40. This is the normal way of communicating AIS messages 130. Thus, normally every link on a failed path sees the same AIS signal.
  • FIGURE 11 illustrates the conversion of AIS signal 130 to "signal fail,, signals 132 and 134.
  • SF message 132 goes to origin node 42, at which point it is reconverted to AIS message 132.
  • signal 134 passes through tandem node 46 en route to destination node 48 , -which reconverts SF message 134 to AIS message 130.
  • FIGURES 10 and 11 therefore, illustrate how the DS-3 standard specifies operations within the restoration subnetwork.
  • a DS-3 path including origin node 42 and destination node 48, with one or more tandem nodes 44, 46.
  • Custodial nodes 62 and 64 are on each side of the link failure 66.
  • AIS signal 130 is a DS-3 standard signal that indicates that there is an alarm downstream. Moreover, AIS signal 130 could actually be several different signals. AIS signal 130 propagates downstream so that every node sees exactly the same signal.
  • AIS signal 130 With AIS signal 130, there is no way to determine which is a custodial node 62, 64 and which is the tandem node 44, 46. This is because the incoming signal looks the same to each receiving node. The present embodiment takes this into consideration by converting AIS signal 130 to a signal fail or SF signal 132. When tandem node 46 sees SF signal 134, it propagates it through until it reaches destination node 48 which converts SF signal 134 back to AIS signal 130.
  • the ISF signal is for a signal that comes into the restoration subnetwork and stands for incoming signal fail. An ISF signal occurs if a bad signal comes into the network, if it comes in as an AIS signal, there is the need to distinguish that, as well.
  • the SONET standard there is already an ISF signal.
  • the present invention adds the SF signal, as previously mentioned.
  • the DS-3 standard the SF signal already exists.
  • the present invention adds the ISF signal to the DS-3 standard. Consequently, for operation of the present invention in the DS-3 standard environment, there is the addition of the ISF signal. For operation in the SONET standard environment, the present invention adds the SF signal.
  • a modified DS-3 idle signal is propagated downstream in place of the usual Alarm Indication Signal (AIS) .
  • AIS Alarm Indication Signal
  • This alarm- produced idle signal differs from a normal idle signal by an embedded messaging in the C-bit maintenance channel to convey the presence of a failure within the realm of a particular network.
  • the replacement of AIS with idle is done to aid fault isolation by squelching downstream alarms.
  • Such signals may be converted back into AIS signals to maintain operational compatibility with equipments outside the network.
  • a comparable technique is performed in a SONET network, where STS-N AIS signals are replaced with ISF signal and the ZS byte conveys the alarm information.
  • Another aspect of the present invention is the ability to manage unidirectional failures.
  • failures that occur along one direction of a bidirectional link are handled by first verifying that the alarm signal persists for a period of time and then propagating an idle signal back along the remaining working direction.
  • This alarm produced idle signal differs from a normal idle signal by embedded messaging in the C-bit maintenance channel to convey the presence of a far end receive failure.
  • custodial nodes are promptly identified and restorative switching is simplified by treating unidirectional failures as if they were bidirectional failures.
  • FIGURE 12 illustrates the broadcast of failure notification messages from custodial nodes 62 and 64.
  • custodial node 62 sends a failure notification to origin node 42, as well as to tandem node 136. Tandem node 136 further broadcasts the failure notification message to tandem nodes 138 and 140.
  • custodial node 64 transmits a failure notification message to tandem node 46, which further transmits the failure notification message to destination node 48. Also, custodial node 64 broadcasts the failure notification message to tandem node 140.
  • FIGURE 13 illustrates the time diagram for the first iteration following fault isolation.
  • FIGURE 13 shows the time diagram for explore phase 116 and return phase 124 of iteration 1.
  • FIGURE 14 further illustrates the time diagram for the completion of iteration 1 and a portion of iteration 2.
  • iteration 1 includes explore phase 116, return phase 124, max flow phase 142 and connect phase 144.
  • Max flow phase 142 includes a single step 146.
  • connect phase 144 of iteration 2 shown by region 148 includes six steps, 150 through 160, and occurs simultaneously with explore phase 162 of iteration 2.
  • return phase 164 of iteration 2 also includes six steps 166 through 176.
  • Each iteration involves explore, return, maxflow, and connect phases.
  • the restored traffic addressed by connect message and the remaining unrestored traffic conveyed by the explore message are disjoint sets.
  • a path has a certain length in terms of hops.
  • a path may be three hops or four hops, for example.
  • a hop count may be set at three. This, means that alternate paths that are less than or equal to three hops are sought.
  • the next iteration may seek alternate paths that are less than or equal to six hops.
  • the number of iterations and the number of hop counts for each iteration is configurable. However, these may also be preset, depending on the degree of flexibility that a given implementation requires. Realize, however, that with increased configurability, increased complexity results. This increased complexity may, in some instances, generate the possibility for inappropriate or problematic configurations.
  • FIGURE 15 shows explore phase 116, which is the initial part of the first iteration 114.
  • FIGURE 16 shows restoration network portion 170 to express the idea that a single origin node 42 may have more than one destination node.
  • destination node 180 may be a destination node for origin node 42 through custodial nodes 62 and 66.
  • destination node 48 is a destination node for origin node 42. This occurs because two working paths, 182 and 184, flow through restoration subnetwork portion 170, both beginning at origin node 42.
  • messages begin at the origin nodes and move outward through the restoration subnetwork. Each explore message is stored and forwarded in a loosely synchronized manner.
  • a node receives the message in step 1, it forwards it in step 2.
  • the neighboring node that receives the explore message in step 1 transmits the explore message to its neighboring node in step 2. Because the present invention employs loose synchronization it does not matter how fast the message is transmitted from one neighbor to another, it will be sent at the next step irrespectively. If the explore phase is three steps long, it may flood out three hops and no more. The following discussion pertains to a single origin-destination pair, but there may be other origin/destination pairs performing the similar or identical functions at the same time within restoration subnetwork 40. If two nodes send the explore message to a neighboring node, only the first message received by the neighboring node is transmitted by the neighboring node.
  • the message that is second received by the neighboring node is recognized, but not forwarded. Accordingly, the first node to reach a neighboring node with an explore message is generally the closest node to the neighboring node. When an explore message reaches the destination node, it stops. This step determines the amount of spare capacity existing in the restoration subnetwork between the origin node and the destination node.
  • the first message that reaches origin node 42 and destination node 48 will be the shortest path. There are no race conditions within the present invention's operation.
  • the distance between the origin node and destination node is included. This distance, measured in hops, is always equal to or less than the number of steps allowed for the given explore phase. For example, if a destination node is five hops from the origin node by the shortest path, the explore phas with a three hop count limit will never generate a return message. On the other hand, an explore phase with a six hop count limit will return the five hop count information in the return message.
  • the explore message there is an identification of the origin-destination pair to identify which node sent the explore message and the destination node that is to receive the explore message.
  • the message may say, for example, that there is the need for thirteen DS-3s, because thirteen DS-3s failed. In practice, there may be not just DS-3s, but also STS-ls, STS-12C's, etc. The point being, however, that a certain amount of capacity is requested.
  • the explore phase is over once the predetermined number of steps have been completed. Thus, for example, if the explore phase is to last three steps, at step 4, the explore phase is over. This provides a well-defined end for the explore phase.
  • FIGURE 17 illustrates restoration subnetwork 40 for a single-origin destination pair, including origin node 42 and destination node 48.
  • origin node 42 at the beginning of the explore phase, takes step 1 to send an explore message to tandem node 44, tandem node 46 and tandem node 186.
  • tandem node 46 sends an explore message to tandem node 188 and to destination node 48.
  • tandem node 44 sends an explore message to tandem node 46
  • tandem node 46 sends an explore message to tandem node 188, and to destination node 48
  • tandem node 186 sends explore messages to tandem node 46 and to destination node 48. Note that explore messages at step 2 from tandem node 44 to tandem node 46 and from tandem node 186 to tandem node 46 are not forwarded by tandem node 46.
  • FIGURE 18 illustrates the time diagram for the next phase in the restoration process of the present invention, the return phase 24, which during the first iteration, includes three steps, 126, 128 and 129.
  • FIGURE 19 illustrates the return phase of the present invention, during the first iteration. Beginning at destination node 48, at step 4, return message flows on path 192 to tandem node 46, and on path 190 to tandem node 186. At step 5, the return message flows on path 76 to origin node 42. Also, from tandem node 186, a return message flows to origin node 42. During the return phase, a return message flows over the same path traversed by its corresponding explore phase, but in the opposite direction. Messages come from the destination node and flow to the origin node. In addition, the return phase messages are loosely synchronized as previously described. The return phase messages contain information relating to the number of spare links available for connecting the origin node to the destination node.
  • FIGURE 20 illustrates tandem node 44, that connects to tandem node 46 through span 38. Note that span 38 includes six links 32, 34, 36, 196, 198 and 200.
  • FIGURES 21 and 22 illustrate the allocation of links between the tandem nodes 44, 46 according to the preferred embodiment of the present invention.
  • span 38 between tandem nodes 44 and 46 carries the first explore message (5,3) declaring the need for four links for node 46, such as scenario 202 depicts.
  • Scenario 204 shows further a message (11,2) requesting eight link flows from tandem node 44, port 2.
  • FIGURE 22 illustrates how the present embodiment allocates the six links of span 38.
  • each of tandem nodes 44 and 46 knows to allocate three links for each origin destination pair.
  • three links for example links 32, 34 and 36 are allocated to the (5,3) origin destination pair.
  • Links 196, 198 and 200 may be allocated to the origin/destination pair (11,2).
  • FIGURE 23 illustrates the results of the return phase of the present invention.
  • Restoration subnetwork 40 includes origin node 42, tandem nodes 208, 210 and 212, as well as tandem node 44, for example.
  • return messages carry back with them a map of the route they followed and how much capacity they were allocated on each span.
  • Origin node 42 collects all the return messages.
  • Tandem node 208 was allocated ten links to tandem node 210.
  • Tandem node 210 is allocated three links, with tandem node 17.
  • tandem node 17 is allocated seven links with tandem node 44.
  • the next phase in the first iteration of the process of the present invention is the maxflow phase.
  • the maxflow is a one-step phase and, as FIGURE 24 depicts, for example, is the seventh step of the first iteration. All of the work in the maxflow phase for the present embodiment occurs at origin node 42.
  • each origin node has a model of part of the network. This is the part that has been allocated to the respective origin/destination pair by the tandem nodes.
  • FIGURE 25 illustrates that within origin node 42 is restoration subnetwork model 214, which shows what part of restoration subnetwork 40 has been allocated to the origin node 42-destination node 48 pair.
  • model 214 shows that eight links have been allocated between origin node 42 and tandem node 46, and that eleven links have been allocated between tandem node 46 and destination node 48.
  • Model 214 further shows that a possible three links may be allocated between tandem node 46 and tandem node 186.
  • origin node 42 calculates alternate paths through restoration subnetwork 40. This is done using a maxflow algorithm.
  • the maxflow output of FIGURE 26, therefore, is a flow matrix indicating the desired flow of traffic between origin node 42 and destination node 48. Note that the maxflow output uses neither tandem node 44 nor tandem node 188.
  • FIGURE 27 illustrates a breadth-first search that maxflow phase 142 uses to find routes through the maxflow phase output.
  • the first route allocates two units, first from origin node 42, then to tandem node 186, then to tandem node 46, and finally to destination node 48.
  • a second route allocates three units, first from origin node 42 to tandem node 186, and finally to destination node 48.
  • a third route allocates eight units, first from origin node 42 to tandem node 46. From tandem node 46, these eight units go to destination node 48.
  • the last phase in the first iteration in the process of the present embodiment includes connect phase 144.
  • connect phase includes steps 8 through 13 of the first iteration, here having reference numerals 150, 152, 154, 156, 220 and 222, respectively.
  • the connect phase is loosely synchronized, as previously described, such that each connect message moves one hop in one step.
  • Connect phase 144 distributes information about what connections need to be made from, for example, origin node 42 through tandem nodes 46 and 186, to reach destination node 48.
  • messages flow along the same routes as identified during maxflow phase 142.
  • a first message, Ml flows from origin node 42 through tandem node 186, through tandem node 46 and finally to destination node 48, indicating the connection for two units.
  • a second message, M2 flows from origin node 42 through tandem node 186 and then directly to destination node 48, for connecting a three-unit flow path.
  • a third connect message, M3, emanates from origin node 42 through tandem node 46, and then the destination node 48 for allocating eight units.
  • Connect phase 144 is synchronized so that each step in a message travels one hop. For implementing the process of the present invention in an existing or operational network, numerous extensions are required.
  • the present invention provides different priorities for working paths and different qualities for spare links. Fault isolation presents a particular challenge in operating or existing environments, that the present invention addresses. Restricted reuse and spare links connected into paths are additional features that the present invention provides. Inhibit functions such as path-inhibit and node-inhibit are additional features to the present invention.
  • the present invention also provides features that interface with existing restoration processes and systems, such as coordination with an existing restoration algorithm and process or similar system. To ensure the proper operation of the present invention, the present embodiment provides an exerciser function for exercising or simulating a restoration process, without making the actual connections for subnetwork restoration.
  • FIGURES 30 through 33 illustrate how the present embodiment addresses the hybrid networks.
  • a hybrid network is a combination of asynchronous and SONET links. Restrictions in the way that the present invention handles hybrid networks include that all working paths must either be SONET paths with other than DS-3 loading, or DS-3 over asynchronous and SONET working paths with DS-3 access/egress ports.
  • restoration subnetwork 40 may include SONET origin A/E port 42, that connects through SONET tandem port 44, through sonnet tandem port 46 and finally to sonnet destination A/E port 48.
  • origin A/E port 42 is a DS- 3 port, with tandem port 44 being a sonnet node, and tandem port 46 being a DS-3 port, for example.
  • 106 of destination node 48 is a DS-3 port.
  • origin node 42 requests different types of capacity.
  • tandem nodes 44, 46 allocate different types of capacity.
  • connect phase 144 An important aspect of connect phase 144 is properly communicating in the connect message the type of traffic that needs to be connected. This includes, as mentioned before, routing DS-3s, STS-ls, OC-3s, and 0C-12Cs, for example. There is the need to keep track of all of the implementation details for the different types of traffic. For this purpose, the present invention provides different priorities of working paths and different qualities of spare links. With the present embodiment of the invention, working traffic is prioritized between high priority and low priority working traffic. SONET traffic includes other rules to address as well. For instance, a SONET path may include an OC-3 port, which is basically three STS-1 ports, with an STS-1 representing the SONET equivalent of a DS-3 port.
  • an OC-3 node can carry the same traffic as can three STS-1.
  • An OC-3 node can also carry the same traffic as three DS-3s or any combination of three STS- 1 and DS-3 nodes.
  • an OC-3 node may carry the same traffic as an STS-3. So, an OC-3 port can carry the same traffic as three DS-3, three STS-1, or one OC-3.
  • an OC-12 may carry an OC-12C. It may also carry the same traffic as up to four OC-3 ports, up to 12 STS-1 ports, or up to twelve DS-3 ports. With all of the possible combinations, it is important to make sure that the large capacity channels flow through the greatest capacity at first.
  • a hybrid network is a network that includes both SONET and asynchronous links, such as DS-3 links.
  • the present invention provides restoration of restoration subnetwork 40 that may include both types of links.
  • the SONET standard provides that SONET traffic is backward compatible to DS-3 traffic.
  • a SONET link may include a DS-3 signal inside it.
  • a restoration subnetwork that includes both SONET and DS- 3 can flow DS-3-signals, provided that both the origin A/E port 42 and the destination A/E port 48 are DS-3 ports. If this were not the case, there would be no way to send path verification messages 104 within restoration subnetwork 40.
  • the explore message of the present invention therefore, contains a request for capacity and decides how many DS-3s and how many SONET links are necessary. There could be the need for an STS-1, an STS-3C, or an STS-12C, for example. Moreover, in the return phase it is necessary to include in the return message the information that there is more than one kind of capacity in the network. When traffic routes through the network it must be aware of these rules. For instance, a DS-3 failed working link can be carried by a SONET link, but not vice versa. In other words, a DS-3 cannot carry a SONET failed working path.
  • FIGURES 32 and 33 illustrate this feature.
  • origin node 42 may generate explore message to tandem node 44 requesting five DS-3s, three STS-ls, two STS-3(c)s, and one STS- 12(c)s.
  • FIGURE 33 depicts, from the return phase, origin node 42 receives return message from tandem node 44, informing origin node 42 that it received five DS- 3s, one STS-1, one STS-3(c), and no STS-12s.
  • the present invention For a hybrid restoration subnetwork 40, and in the maxflow phase, the present invention first routes OC- 12C failed working capacity over OC-12 spare links. Then, the max flow phase routes OC-3C, failed working capacity, over OC-12 and OC-3 spare links. Next, the present embodiment routes STS-1 failed working links over OC-12, OC-3 and STS-1 spare links. Finally, the max flow phase routes DS-3 failed working links over OC-12, OC-3, STS-1, and DS-3 spare links. In the connect phase, the restoration subnetwork of the present invention responds to hybrid network in a manner so that tandem nodes get instructions to cross- connect more than one kind of traffic.
  • FIGURE 34 relates to the property of the present invention of assigning different priorities for working paths, and different qualities for spare links.
  • the present embodiment of the invention includes 32 levels of priority for working paths; priority configurations occur at origin node 42, for example.
  • the preferred embodiment provides four levels of quality for spare links, such as the following.
  • a SONET 1 for N protected spare link on a span that has no failed links has the highest quality.
  • the next highest quality is a SONET 1 for N protect port on a span that has no failed links.
  • the next highest quality is a SONET 1 for N protected port on the span that has a failed link.
  • the lowest quality is a SONET 1-for-N protect port on a span that has a failed link.
  • priorities relate to working paths, and different qualities for spare links.
  • the feature of priority working paths and different quality spare links for some uses of the present process it is possible to simplify the different levels of priority and different levels of quality into simply high and low.
  • high priority working links may be those having priorities 1 through 16, while low priority working links are those having priorities 17 through 32.
  • High quality spares may be, for example, quality 1 spares, low quality spares may be those having qualities 2 through .
  • the present invention may provide a method for restoring traffic through the restoration subnetwork. For example, the present invention may first try to restore high priority failed working links on high- quality spare links, and do this as fast as possible. Next, restoring high-quality failed working links on low-quality spares may occur. Restoring low-priority failed working paths on low-quality spare links occurs next. Finally, restoring low priority failed working paths on high quality spare links.
  • the present invention adds an extra iteration at the end of normal iterations.
  • the extra iteration has the same number of steps as the iteration before it. Its function, however, is to address the priorities for working paths and qualities for spare links.
  • the present invention will restore high priority working paths over high-quality spare links.
  • the invention restores high-priority working paths over low-quality spare links, then low-priority working paths over low-quality spare links, and finally low- priority working paths over high-quality spare links.
  • the network restoration process of the present invention including the explore, return, and connect messaging phases may be repeated more than once in response to a single failure episode with progressively greater hop count limits.
  • the first set of iterations are confined in restoring only high priority traffic. Subsequent or extra iterations may be used seek to restore whatever remains of lesser priority traffic. This approach give high priority traffic a preference in terms of path length.
  • FIGURES 35-37 provide illustrations for describing in more detail how the present invention handles fault isolation.
  • spare link 92 Between tandem notes 44 and 46 appear spare link 92. Between custodial nodes 62 and 64 are working link 18 having failure 66 and spare link 196. If a spare link, such as spare link 196, is on a span, such as span 38 that has a failed working link, that spare link has a lower quality than does a spare link, such as spare link 92 on a span that has no failed links.
  • spare link 92 between tandem notes 46 and 48 is part of a span that includes no failed link. In this example, therefore, spare link 92 has a higher quality than does spare link 196.
  • spare ports are sorted first by type (i.e., bandwidth for STS-12, STS-3, then by quality and thirdly by port label numbers.
  • Paths to be restored are sorted primarily by type and secondarily by an assigned priority value. This quality of a given restoration path is limited by the lowest quality link along the path.
  • a process is performed upon these lists in multiple passes to assign traffic to spare ports while making best use of high capacity, high-quality resources. This includes, for example, stuffing high priority STS-1' s onto any STS- 12 's that are left after all other STS-12 and STS-3 traffic has been assigned.
  • Rules determine the proper way of handling different priorities of working paths and different qualities of spares in performing the restoration process.
  • there may be, for example, 32 priority levels.
  • the working traffic priority may depend on business-related issues, such as who is the customer, how much money did the customer pay for communications service, what is the nature of the traffic. Higher priority working channels are more expensive than are lower priority channels. For example, working are assigned priorities according to these types of considerations.
  • Predetermined configuration information of this type may be stored in the origin node of the restoration subnetwork. Thus, for every path in the origin node priority information is stored. Although functionally there is no difference between a high priority working path and lower priority working path, though higher priority working paths will have their traffic restored first and lower priority working paths will be restored later.
  • the present embodiment includes four qualities of spare links. Spare link quality has to do with two factors. A link may either be protected or nonprotected by other protection schemes.
  • the present invention uses certain rules. The first rule is to attempt to restore the higher priority failed working paths on the highest quality spare links. The next rule is to restore high quality failed working paths on both high quality and low quality spares. The third rule is to restore low priority failed working paths on low quality spares. The last thing to do is to restore low priority working paths over high and low quality spares.
  • the present invention also it possible for a node to know when it is a custodial node. Because there are no keep-alive messages on working links, however, the custodial node does not know on what span the failed link resides. Thus, referring to FIGURE 36, custodial node 64 knows that custodial node 62 is on the other end of spare link 196. The difficulty arises, however, in the ability for custodial nodes 62 and 64 to know that working link 18 having failure 66 and spare link 196 are on the same span, because neither custodial node 62 nor custodial node 64 knows on what span is working link 18.
  • FIGURE 37 illustrates how the present embodiment overcomes this limitation.
  • Custodial node 64 sends a "I am custodial node, , flag in the keep alive messages that it sends on spare links, such as to non-custodial tandem node 46.
  • custodial node 64 and custodial node 62 both send "I am custodial node” flags on spare 196, to each other.
  • the receiving non-custodial node, such as tandem node 46 is not itself a custodial node, then it may ignore the "I am custodial node", flag. Otherwise, the receiving node determines that the failure is on the link between itself and the custodial node from which the receiving custodial node receives the "I am custodial node” flag.
  • the present embodiment provides this functionality by the use of an "I am custodial node” flag that "piggybacks" the keep alive message. Recalling that a custodial node is a node on either side of a failed link, when the custodial node is identified, the "I am custodial node” flag is set. If the flag appears on a spare link, that means that the neighboring link is the custodial node. This means that the node is adjacent to a failure. If the node receiving the flag is also a custodial node, L ⁇ n the spare is on the span that contains the failed link.
  • FIGURES 38-42 illustrate the restricted re-use feature of the present invention.
  • the present invention also includes a restricted re-use function.
  • a recovered link relates to the feature of restricted re-use. Given a path with a failure in it, a recovered link may exist between two nodes. The recovered link is a good link but is on a path that has failed.
  • FIGURE 38 shows restoration subnetwork 40 that includes origin node 42 on link 18 and through custodial nodes 62 and 64 connects to destination node 48. Failure 66 exists between custodial nodes 62 and 64.
  • the restricted re-use feature of the present invention involves what occurs with recovered links, such as recovered link 224.
  • FIGURE 39 illustrates the restricted re-use concept that the present invention employs.
  • Link 18 enters origin node 42 and continues through tandem node 226 on link 228 and 230 through custodial node 64 through recovered link 48.
  • Restricted re-use includes modifications to the explore and return phases of the present invention wherein the process determines where recovered links are in the network.
  • the process finds the recovered links and sends this information to the origin node.
  • the origin node collects information about where the recovered links are in the network to develop a map of the recovered links in the restoration subnetwork.
  • the tandem nodes send information directly to the origin node via the wide are network about where the re-use links are.
  • FIGURE 40 through 42 illustrate how the present embodiment achieves restricted re-use.
  • origin node 42 connects through tandem node 44 via link 78, to tandem node 46 via link 82, to tandem node 186 via link 84, and to destination node 48 via link 190.
  • tandem node 46 and tandem node 186 appears failures 66.
  • the origin node 42 will acquire a map of recovered links.
  • FIGURE 40 shows within origin node 42, recovered links 232, 234, and 236 are stored in origin node 42.
  • This map is created by sending in-band messages, re-use messages, during the explore phase, along recovered links from the custodial nodes to the origin and destination nodes, such as origin node 42 and destination node 48.
  • FIGURE 41 illustrates, in the explore phase, reuse messages emanate from tandem node 46 to tandem node 44 and from there to origin node 42. From tandem node 186, the re- use message goes to destination node 48.
  • the destination node sends the information that it has acquired through re-use messages to the origin node by piggybacking it on return messages.
  • designation node 48 sends on link 192 a return plus re-use message to tandem node 46.
  • tandem node 46 sends a return plus re-use message on link 76 to origin node 42.
  • origin node 42 With the restricted re-use feature and in the max flow phase, origin node 42 knows about recovered links and "pure" spare links. When the origin node runs the max flow algorithm, the recovered links are thrown in with the pure spare links. When the breadth-first- search is performed, the present invention does not mix recovered links from different failed working paths on the same alternate path.
  • Another feature of the present invention relates to spare links connected into paths.
  • spare links In the event of spare links being connected into paths, often these paths may have idle signals on them or a test signal. If a spare link has a test signal on it, it is not possible to distinguish it from a working path. In this instance, the present invention avoids using spare links with "working" signals on them
  • the origin In the max flow phase, the origin has discovered what may be thought of as pure spare link. The origin node also receives information about recovered links, which the present invention limits to restricted re- use.
  • the pure spare and recovered links In running the max flow algorithm during the max flow phase of the present process, the pure spare and recovered links and used to generate a restoration map of the restoration subnetwork, first irrespective of whether the links are pure, spare or recovered.
  • FIGURES 43 and 44 illustrate the path inhibit features of the present invention.
  • the present invention provides a way to turn off subnetwork restoration on a particular port.
  • origin node 42 includes path 2 to tandem node 44. Note that no link appears between node 42 and 44.
  • the process of the present invention inhibits restoration on a path by blocking the restoration process at the beginning of the explore phase.
  • the origin node either does not send out an explore message at all or sends out an explore message that does not request capacity to restore the inhibited path. This is an instruction that goes to the origin node.
  • the process of the present invention is to inform origin node 42, for example, to inhibit restoration on a path by sending it a message via the associated wide area network.
  • tandem node 46 sends a path inhibit message to origin node 42.
  • Tandem node 46 receives, for example, a TLl command telling it to temporarily inhibit the restoration process on a port. It sends a message to origin node 42 for that path via wide area network as arrow 246 depicts.
  • Tandem node 46 sends inhibit path message 246 with knowledge of the Internet protocol address of its source node because it is part of the path verification message. There may be some protocol involved in performing this function. This purpose would be to cover the situation wherein one node fails while the path is inhibited.
  • Another feature of the present invention is that it permits the inhibiting of a node.
  • the node inhibit function it is possible to temporarily inhibit the restoration process of the present invention on a given node. This may be done, for example, by a TLl command.
  • a node continues to send its step-complete messages in this condition.
  • the exerciser function operates with the node in this condition.
  • the restoration process must be locally disabled so that any test signals and alarm conditions may be asserted without triggering restoration processing.
  • a port that is commanded into a test access, loopback, or DRA-disabled mode shall notify the origin node of the path to suppress DRA protection along the path.
  • Additional provisions include automatic timeout of the disabled mode and automatic loopback detection/restoration algorithm suppression when a port receives an in- band signal bearing its own local node ID.
  • Direct node-node communications are accomplished through a dedicated Wide Area Network.
  • This approach bypasses the use of existing in-band and out-of-band call processing signaling and network control links for a significant advantage in speed and simplicity.
  • the WAN approach offers robustness by diversity.
  • a triggering mechanism for distributed restoration process applies a validation timer to each of a collection of alarm inputs, keeps a count of the number of validated alarms at any point in time, and generates a trigger output whenever the count exceeds a preset threshold value. This approach reduces false or premature DRA triggering and gives automatic protect switching a chance to restore individual link failures. It also allows for localizing tuning of trigger sensitivity based on quantity and coincidence of multiple alarms.
  • the preferred embodiment provides a step
  • Completion Timer in Synchronous DRA. For each DRA process initiated within a network node, logic is provided for automatically terminating the local DRA process whenever step completion messages are not received within a certain period of time as monitored by a failsafe timer. Other causes for ending the process are loss of keep alive signals through an Inter-node WAN link, normal completion of final DRA iteration, consumption of all available spare ports, or an operation support system override command.
  • Another aspect of the present invention is a method for Handling Staggered Failure Events in DRA.
  • an initial link failure or a set of nearly simultaneous failures, trigger a sequence of DRA processing phases involving message flow through the network.
  • Other cuts that occur during messaging may similarly start restoration processing and create confusion and unmanageable contentions for spare resources.
  • the present technique offers an improvement over known methods.
  • any subsequent cuts that occur are "queued" until the next Explore phase.
  • Explore messaging for new cuts is withheld while a final Explore/Return/Connect iteration occurs in response to a previous cut.
  • the present invention includes failure notification messages that include information about the software revision and hop count table contents that are presumed to be equivalent among all nodes. Any nodes that receive such messages and find that the local software revision or hop count table contents disagree with those of the incoming failure notification message shall render themselves ineligible to perform further DRA processing. However, a node that notices a mismatch and disable DPA locally will still continue to propagate subsequent failure notification messages.
  • the present invention provides a way to Audit restoration process data within nodes that include asserting and verifying the contents of data tables within all of the nodes in a restoration-protected network. In particular, such data may contain provisioned values such as node id, WAN addresses, hop count sequence table, and defect threshold.
  • the method includes having the operations support system disable the restoration process nodes, write and verify provisionable data contents at each node, then re- enabling the restoration process when all nodes have correct data tables.
  • a failure simulation can be executed within the network without disrupting normal traffic. This process includes an initial broadcast of a description of the failure scenario, modified DRA messages that indicate they are "exercise only" messages, and logic within the nodes that allows the exercise to be aborted if a real failure event occurs during the simulation.
  • Another aspect of the present invention is the ability to coordinate with other restoration processes such as, for example, the RTR restoration system. With the present invention, this becomes a challenge because the port that is protected by the restoration process of the present invention is often also protected by other network restoration algorithms.
  • Another aspect of the present invention is the exerciser function.
  • the exerciser function for the restoration process of the present invention has two purposes, one is a sanity check to make sure that the restoration process is operating properly. The other is an exercise for capacity planning to determine what the restoration process would do in the event of a link failure.
  • the exerciser function operates the same software as does the restoration process during subnetwork restoration, but with one exception. During the exerciser function, connections are not made. Thus, when it comes time to make a connection, the connection is just not made.
  • the drop-dead timer and emergency shut down protect against bugs or defects in the software. If the restoration process of the present invention malfunctions due to a software problem, and the instructions become bound and aloof, it is necessary to free the restoration subnetwork.
  • the dropdead timer and emergency shut down provide these features.
  • the drop-dead timer is actuated in the event that a certain maximum allowed amount of time in the restoration process occurs. By establishing a maximum operational time the restoration network can operate for 30 seconds, for example, but no more. If the 30 second point occurs, the restoration process turns off.
  • An emergency shut down is similar to a drop-dead timer, but is manually initiated. For example, with the present invention, it is possible to enter a TLl command to shut down the restoration process.
  • the emergency shut down feature therefore, provides another degree of protection to compliment the drop dead timer.
  • Out-of-band signaling permits messages to be delivered over any communication channel that is available.
  • the present invention uses a restoration process wide area network.
  • several messages get sent out of band. These include the explore message, the return message, the connect message, the step complete message, as well as a message known as the exercise message which has to do with an exerciser feature of the present invention.
  • the wide area network of the present invention operates under the TCP/IP protocol, but other protocols and other wide area networks may be employed. In order to use the wide area network in practicing the present invention, there is the need for us to obtain access to the network.
  • access to the wide area network is through two local area network Ethernet ports. The two Ethernet ports permit communication with the wide area network.
  • the Ethernet is half duplex, in the sense that the restoration subnetwork sends data in one direction on one Ethernet while information flows to the restoration subnetwork in the other direction on the other Ethernet port.
  • the wide area network of the present invention includes a backbone which provides the high bandwidth portion of the wide area network.
  • the backbone includes the same network that the restoration subnetwork protects.
  • the failure in the restoration subnetwork could potentially cut the wide area network. This may make it more fragile.
  • the cross-connects of the present invention there is a control system that includes a number of computers within the cross-connect switch.
  • the crossconnect may include possibly hundreds of computers. These computers connect in the hierarchy in three levels in the present embodiment.
  • the computers that perform processor-intensive operations appear at the bottom layer or layer 3.
  • Another layer of computers may control, for example, a shelf of cards. These computers occupy layer 2.
  • the layer 1 computers control the layer 2 computers.
  • the computers at layer 1 perform the instructions of the restoration process of the present invention.
  • This computer may be centralized in the specific shelf where all layer 1 computers are in one place together with the computer executing the restoration process instructions. Because the computer performing the restoration process of the present invention is a layer 1 computer, it is not possible for the computer itself to send in-band messages.
  • in-band messages are generally sent and received by layer 2 and/or layer 3 computers, and are not sent by layer 1 computers, such as the one operating the restoration instructions for the process of the present invention.
  • Fault isolation also occurs at layer 2 and layer 3 computers within the cross-connects. This is because fault isolation involves changing the signals in the optical fibers. This must be done by machines at lower layers. Moreover, a port, which could be a DS-3 port or a SONET port, has a state in the lower layer processors keep track of the port state. In essence, therefore, there is a division of labor between layer 2 and 3 computers and the layer 1 computer performing the instructions for the restoration process of the present invention. With reference to FIGURE 45, an end to end path in a telecommunications network provisioned with a distributed restoration algorithm is shown to include an origin node and a destination node, represented by 0 and D, respectively.
  • Interconnecting the origin node and destination node are a number of nodes, for example the intermediate nodes N1-N5.
  • Each of these nodes in fact is a digital cross-connect switch such as the 1633-SX switch made by the Alcatel Company.
  • Each of these switches has a number of ports to which are connected a number of links for interconnecting each switch to other switches of the network.
  • each adjacent pair of nodes is connected by a span or link such as 302, 304, 306, 308, 310 and 312.
  • each span can have a number of links and each adjacent pair of nodes may in fact have a number of interconnected spans.
  • no other nodes of the telecommunications network are shown to be connected to the path of FIGURE 45.
  • a fault has occurred in span 306.
  • Such fault may be for example a cut in which one or more links of the span have been cut, or in the worst case scenario, the whole span has been cut.
  • the nodes bracketing or sandwiching the fault 314 are the first nodes to receive an alarm signal, which then is propagated by those nodes to nodes downstream thereof.
  • custodial nodes N2 and N3 each receive an alarm.
  • Nodes N2 and N3 would in turn propagate the received alarm to nodes downstream thereof such as for example nodes Nl and the origin node for custodial node N2, and nodes N4, N5 and the destination node for custodial node N3.
  • fault 314 at span 306 the communicative path of FIGURE 45 becomes non-functioning. This is despite the fact that there is only one fault, namely fault 314 for the whole path. Putting it differently, there is only one span, namely span 306, that has malfunctioned. Yet data from the origin node can no longer be routed to the destination node in the path shown in FIGURE 1. This is so in spite the fact that span or links 302, 304, 308, 310 and 312 each remain operational.
  • the main objective of the present invention is to be able to utilize the functioning spans or links of a failed path so that there may be a better utilization of the available resources of the telecommunications network.
  • the network of the instant invention is provisioned with the ability, in its distributed restoration algorithm, for the custodial nodes of a fault to send out a message that informs nodes downstream thereof of any portions of the failed path that remain intact and functional.
  • FIGURE 46 The first step of the inventive scheme is illustrated in FIGURE 46.
  • a "reuse" message is sent from each of nodes N2 and N3 to their respective adjacent nodes Nl and N4.
  • the reuse message propagated from N2 is designated 316 while the reuse message propagated from N3 is designated 318.
  • Each of those messages in turn is similar to the messages disclosed in copending application serial number ALCA-1100-7 entitled Signal Conversion For Fault Isolation, the disclosure of which is being incorporated by reference hereto.
  • the reuse message is shown to include an identifier field 320 to which an identifier, represented by R, has been added to designate the message as being a reuse message.
  • the message of FIGURE 49 further includes a variable length route information field 322 to which the identification ID for each node can be added.
  • Other fields of the FIGURE 49 message not germane to the discussion of the instant invention are left blank and are not shown in the messages shown in FIGURES 46-48.
  • reuse message 316 has in its route information field the node ID of node N2.
  • reuse message 318 has in its route information field the node ID of node N3.
  • node Nl In receipt of reuse message 316, node Nl would append to the route information field its own node ID, before propagating the reuse message onward to the origin node, by way of link 302. Similarly, upon receipt of the reuse message 318, node N4 would append its own node ID to the route information field of reuse message 318, before propagating the reuse message 318 to node N5 by way of link 310. See FIGURE 47.
  • the reuse message be it 316 or 318, gets propagated from one node to other nodes downstream thereof, additional node IDs are appended to the message, until the message gets to the end node of the path, for example the origin node shown in FIGURE 47.
  • the origin node reads from the route information field of reuse message 316 to find out what intact portions there are of the failed path.
  • origin node can readily ascertain from reuse message 316 that nodes N2 and Nl are the nodes that have forwarded the reuse message. Therefore, the span or links interconnecting those nodes, as well as the span or link that interconnects node Nl to itself are operating properly.
  • the fault that causes the path to fail occurs somewhere beyond node N2, and therefore the elements before node N2 remain usable and can be restricted for use by an alternate route for rerouting the traffic that had been disrupted by fault 314.
  • FIGURE 47 Also shown in FIGURE 47 is the reuse message 318, as sent by custodial node N3. As shown, reuse message 318 has been propagated by node N4 to node N5. As seen by node N5, reuse message 318 has in its route information field node N3 and node N4. Therefore, node N5 knows that the path connecting it to node N3 remains good. Node N5 then appends its own node ID to the route information field of reuse message 318 before propagating it, via link 312, to the destination node.
  • the destination node is now in receipt of reuse message 318. From the route information field of reuse message 318, the destination node can ascertain that fault 314 occurs beyond node N3 and that links 308, 310 and 312 interconnecting nodes N3, N4, N5 remain usable.
  • the conveying of information between the intermediate nodes, such as between nodes N3, N4, N5 and the destination node is done by means of in-band massaging between those nodes.
  • the propagation of the reuse message between nodes N2, Nl and the origin nodes are done by in-band massaging.
  • the destination node repackages that reuse message into another "reuse" message 320 and transmits that message to the origin node by means of a wide area network (WAN) massaging connection 322.
  • WAN wide area network
  • the origin node becomes aware of all intact portions of the failed path shown in FIGURE 48. It can then formulate an alternate path by using, for example, the spare link 324 that interconnects node Nl to N5.
  • the alternate restoration path is able to use links 302 and 312 of the failed path for rerouting the traffic from the origin node to the destination node.
  • other alternate route (s) interconnecting the origin node to the destination node could also be used.
  • the useful links of the failed path of FIGURE 48 are, for the most part, restricted for routing information from the origin node to the destination node.
  • intact links 304, 308 and 310 are reserved for the use of the origin node and the destination node for routing data therebetween.
  • FIGURE 48 illustrates that a different reuse message 320 is sent by the destination node to the origin node, it should be appreciated that a reuse message can also be sent from the origin node to the destination node 322 to inform the destination node of links or spans of the failed path that remain functional. In fact, both end nodes of the failed path can inform each other of intact portions of the failed path, if needed.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

Dans un réseau de télécommunications pourvu d'un algorithme de rétablissement distribué basé sur un trajet, les noeuds d'origine (O) et de destination (D) d'un trajet défectueux (314) sont évalués à partir des parties du trajet restant intactes par des messages de 'réutilisation' (316 et 318) envoyés depuis les noeuds de garde (N2, N3) contigus à la défaillance. Lorsque chaque message de réutilisation atteint un noeud intermédiaire (N1, N4), l'identification du noeud intermédiaire est rattachée à un champ du message, de façon à établir, simultanément à la propagation des messages de réutilisation le long des parties intactes du trajet défectueux, une liste cumulative de noeuds rencontrés par les messages circulant depuis les noeuds de garde vers les noeuds d'origine et de destination. De ce fait, le noeud d'origine ou de destination, quand il reçoit un message de réutilisation, peut lire à partir du champ possédant la liste cumulative des noeuds une description des parties intactes restantes du trajet original. On pourrait réserver ces parties intactes au rétablissement du trajet défectueux à son état original non défectueux, de manière à limiter l'utilisation des ressources pour rétablir le trajet défectueux.
PCT/US1999/020936 1998-09-11 1999-09-13 Systeme et procede de reutilisation reservee de parties intactes de trajets defectueux dans un reseau de telecommunications WO2000016113A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU59197/99A AU5919799A (en) 1998-09-11 1999-09-13 System and method for restricted reuse of intact portions of failed paths in a telecommunications network

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US15200798A 1998-09-11 1998-09-11
US09/152,007 1998-09-11

Publications (1)

Publication Number Publication Date
WO2000016113A1 true WO2000016113A1 (fr) 2000-03-23

Family

ID=22541188

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1999/020936 WO2000016113A1 (fr) 1998-09-11 1999-09-13 Systeme et procede de reutilisation reservee de parties intactes de trajets defectueux dans un reseau de telecommunications

Country Status (2)

Country Link
AU (1) AU5919799A (fr)
WO (1) WO2000016113A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1958379A1 (fr) * 2006-09-19 2008-08-20 Huawei Technologies Co., Ltd. Propagation d'anomalies et protection pour chemins de données orientés connexion dans des réseaux à commutation par paquets
US8867338B2 (en) 2006-09-19 2014-10-21 Futurewei Technologies, Inc. Faults Propagation and protection for connection oriented data paths in packet networks

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4956835A (en) * 1987-11-06 1990-09-11 Alberta Telecommunications Research Centre Method and apparatus for self-restoring and self-provisioning communication networks
US5435003A (en) * 1993-10-07 1995-07-18 British Telecommunications Public Limited Company Restoration in communications networks

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4956835A (en) * 1987-11-06 1990-09-11 Alberta Telecommunications Research Centre Method and apparatus for self-restoring and self-provisioning communication networks
US5435003A (en) * 1993-10-07 1995-07-18 British Telecommunications Public Limited Company Restoration in communications networks

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1958379A1 (fr) * 2006-09-19 2008-08-20 Huawei Technologies Co., Ltd. Propagation d'anomalies et protection pour chemins de données orientés connexion dans des réseaux à commutation par paquets
EP1958379A4 (fr) * 2006-09-19 2008-12-10 Huawei Tech Co Ltd Propagation d'anomalies et protection pour chemins de données orientés connexion dans des réseaux à commutation par paquets
US8018843B2 (en) 2006-09-19 2011-09-13 Futurewei Technologies, Inc. Faults propagation and protection for connection oriented data paths in packet networks
US8867338B2 (en) 2006-09-19 2014-10-21 Futurewei Technologies, Inc. Faults Propagation and protection for connection oriented data paths in packet networks

Also Published As

Publication number Publication date
AU5919799A (en) 2000-04-03

Similar Documents

Publication Publication Date Title
EP0972410B1 (fr) Procede et systeme de retablissement de reseau de telecommunications reparti
US20030133417A1 (en) Method and message therefor of monitoring the spare capacity of a dra network
US6411598B1 (en) Signal conversion for fault isolation
US6496476B1 (en) System and method for restricted reuse of intact portions of failed paths
US5636203A (en) Method and system for identifying fault locations in a communications network
US6654341B1 (en) Virtual line switching ring
US5550805A (en) Failure restoration method in a mesh network
US5657320A (en) Method and system for resolving contention of spare capacity circuits of a telecommunications network
CA2127080C (fr) Methode de gestion de sous-reseau formant un reseau optique synchrone en anneau
US6366556B1 (en) Self-healing networks using virtual rings
EP0745294B1 (fr) Reseau de telecommunications comprenant un dispositif de protection pour la commutation d'une voie
US7630297B2 (en) Trail/path protection for SDH/SONET networks
US20030214962A1 (en) Method and apparatus for bandwidth optimization in network ring topology
WO1999011090A1 (fr) Production du declenchement d'une commutation de protection
US6278690B1 (en) Local area network for reconfiguration in the event of line ruptures or node failure
US6337846B1 (en) Quantification of the quality of spare links in a telecommunications network
JP3423185B2 (ja) 自己救済型ネットワーク、その伝送路切り替え方法および伝送装置
EP2088695B1 (fr) Procede de numerotation de trafic de service sur un anneau de protection de chemin
WO2000016113A1 (fr) Systeme et procede de reutilisation reservee de parties intactes de trajets defectueux dans un reseau de telecommunications
EP1159851A1 (fr) Procedes et systemes de retablissement de reseau de telecommunication distribue
EP1453233A2 (fr) Procédé et appareil d'approvisionnement dynamique de connexions fiables en présence des pannes multiples
ITMI982791A1 (it) Metodo per ottimizzare,in caso di guasto,la disponibilita' dei canalia bassa priorita' in un anello transoceanico a fibra ottica tipo ms-sp
US20030048747A1 (en) Transmission device
JP2002135281A (ja) 古典的ms−springネットワークにおいてタイムスロット交換を管理する方法
JPH08214020A (ja) 複数のリングノードのうちの所定のリングノードに用いる方法とリングノード伝送システムにおいて通信回路を確定的にスケルチする方法

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW SD SL SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase