WO2008132203A2 - Recovering from a failure in a communications network - Google Patents
Recovering from a failure in a communications network Download PDFInfo
- Publication number
- WO2008132203A2 WO2008132203A2 PCT/EP2008/055180 EP2008055180W WO2008132203A2 WO 2008132203 A2 WO2008132203 A2 WO 2008132203A2 EP 2008055180 W EP2008055180 W EP 2008055180W WO 2008132203 A2 WO2008132203 A2 WO 2008132203A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- node
- client
- failure
- network
- nodes
- Prior art date
Links
- 238000000034 method Methods 0.000 claims abstract description 22
- 230000009977 dual effect Effects 0.000 claims abstract description 20
- 238000010926 purge Methods 0.000 claims abstract description 15
- 230000008859 change Effects 0.000 claims abstract description 8
- 230000004044 response Effects 0.000 claims abstract description 7
- 238000005516 engineering process Methods 0.000 claims description 5
- 238000001514 detection method Methods 0.000 claims description 3
- 238000011084 recovery Methods 0.000 claims description 3
- 230000007246 mechanism Effects 0.000 description 7
- 230000000903 blocking effect Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 238000011144 upstream manufacturing Methods 0.000 description 3
- 230000032683 aging Effects 0.000 description 2
- 230000001419 dependent effect Effects 0.000 description 2
- 239000000835 fiber Substances 0.000 description 2
- 230000007704 transition Effects 0.000 description 2
- 230000002776 aggregation Effects 0.000 description 1
- 238000004220 aggregation Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 230000035484 reaction time Effects 0.000 description 1
- 238000010561 standard procedure Methods 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0805—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
- H04L43/0817—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/42—Loop networks
- H04L12/437—Ring fault isolation or reconfiguration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/0654—Management of faults, events, alarms or notifications using network fault recovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/40—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass for recovering from a failure of a protocol instance or entity, e.g. service redundancy protocols, protocol state redundancy or protocol service redirection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q3/00—Selecting arrangements
- H04Q3/0016—Arrangements providing connection between exchanges
- H04Q3/0062—Provisions for network management
- H04Q3/0075—Fault management techniques
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2101/00—Indexing scheme associated with group H04L61/00
- H04L2101/60—Types of network addresses
- H04L2101/618—Details of network addresses
- H04L2101/622—Layer-2 addresses, e.g. medium access control [MAC] addresses
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2101/00—Indexing scheme associated with group H04L61/00
- H04L2101/60—Types of network addresses
- H04L2101/677—Multiple interfaces, e.g. multihomed nodes
Definitions
- the present invention relates to telecommunications networks, in general, and in particular to recovering from a failure in a communications network using dual homing protection for connection of a client to the network.
- Dual homing protection for the client equipment in a communications network is a scenario that is gaining high interest for its characteristics of reliability and resilience. It is more complicated than a single homing protection since it involves two different nodes in the communications network and no standard Link Aggregation can be used.
- a Metro Multi-Protocol Label Switching (MPLS) network is an example only, but the problem described below exists irrespective of the actual technology used in the Metro transport network: MPLS, Provider Bridge, Q-in-Q, PBB (Provider Backbone Bridges), PBB-TE (Provider Backbone Bridges - Traffic Engineering), Ethernet, Synchronous Digital Hierarchy (SDH) or other.
- STP Spanning Tree Protocol
- RSTP Rapid Spanning Tree Protocol
- FIG. 1 an example of normal operation conditions is illustrated. Taking into account the two links in dual homing (i.e. 102 and 104), assuming that STP is implemented, the port on node 110 related to link 104 is in Blocking State and the port on node 108 related to link 102 is in Forwarding State.
- LSPs Label Switched Paths
- a failure 202 condition occurs to the customer link 102 related to port in Forwarding State on node 108 (it can be a fibre cut, a client port or card failure or a port or card failure on the Metro node) the STP or the RSTP detects the problem and acts consequently.
- the reaction time is very short, while it is longer in case of a plain STP.
- FIG. 2 where the transition phase is illustrated.
- transition phase it is meant the situation where the STP or RSTP puts in Forwarding State the port that was in Blocking State, and therefore the upstream traffic is carried by an LSP 122 on the right side of the Metro ring.
- the head-end node 112 has no other way to realise that something happened except when it starts receiving traffic sent by the client 106 from another line card.
- the Media Access Control address (MAC address) learning mechanism is such that the head-end node 112 starts sending traffic downstream accordingly.
- the mechanism described is potentially subject to problems, which are dependent upon the nature of the traffic, and whose duration is quite unpredictable.
- the traffic pattern is strongly mono-directional (from the head-end node to the client), the head-end node has no way to realise that something has changed in the network if it does not receive any packets in the upstream direction (which are going to feed the MAC learning mechanism). This may lead to a significant traffic failure on the network, since the traffic that is sent downstream in FIG. 2 will simply be lost (because sent out from the wrong port by the head-end node 112).
- the other way in which the head-end node 112 can react to the change is when the ageing mechanism deletes its MAC address entries related to the specific client, and therefore a new MAC learning phase is started by means of flooding.
- the problem with this solution is that a typical ageing time for MAC address entries is 300 s (i.e. 5 minutes!).
- Possible remedies to this issue include participation of the head-end node in the STP or RSTP mechanism.
- the head-end node running and participating in the STP or RSTP is heavy and unpractical, for a series of reasons, such as the necessity to potentially run many instances of STP or RSTP in the head-end node (which is a big problem in case of many clients protected in dual homing) and the fact that the STP or RSTP would have to provide a control plane functionality for the MPLS network (or, in general, for the Provider Network, whatever technology is adopted).
- STP or RSTP would be run inside the Provider Network determining which ports need to be used in the trunk part of the network, thus actually improperly acting like a part of the Provider's control plane.
- an improved method of recovering from a failure in a communications network using dual homing protection would be advantageous and in particular one that is simple and can equally manage recovering from client link or port failure and from network node failure.
- the invention seeks to preferably mitigate, alleviate or eliminate one or more of the disadvantages mentioned above singly or in any combination.
- a method of recovering from a failure of a link connecting a client to a node or from a failure of a node in a communications network using dual homing protection comprises a plurality of nodes and at least one of said nodes is connected to another network, a first node, of said plurality of nodes, is connected to the client and a second node, of said plurality of nodes, is also connected to the client.
- One of the ports related to the links connecting the client with the nodes is in an active state and the other port is in a stand-by state.
- the method comprises the following steps: detecting the failure, changing the port status from active to stand-by and the other port from stand-by to active.
- the node in the active state In response to the change of the status, from stand-by to active, the node in the active state sends to the node connected to the another network a request to purge its MAC address table. In the next step, in response to said request, the node connected to the another network purges its MAC address table and then performs flooding in order to fill in the purged MAC address table with updated information. Once the MAC address table is updated traffic to and from the client is directed via the link having the related port in the active state.
- the present invention beneficially allows for a very fast, reliable and predictable recovery time for the Layer 2 traffic being exchanged by clients or client networks, which are connected in dual homing to a transport network made available by a provider (Provider Network), in the event of a failure to the client traffic.
- the present invention can be beneficially effective in case of both link failure towards the client (or port or card failure in the client equipment) and failure of one of the provider network nodes involved in the dual homing protection.
- the present invention is beneficially independent of any traffic patterns or characteristics, and therefore the time it takes to be effective is predictable.
- the present invention is also applicable to various technologies in which the Provider Network can be implemented, since it only requires very simple and minimal information to be sent to the node or the nodes which need to purge their MAC address tables related to the client that has experienced the failure.
- the present invention also applies to cases where the dual homing protection is realised with protocols or methods other than STP and RSTP, whose basic mechanism relies on putting ports of the client equipment and/or of the network node in an active state or in a stand-by state.
- FIG. 1 is a diagram illustrating a ringed communications network with dual homing protection in normal operation
- FIG. 2 is a diagram illustrating a ringed communications network with dual homing protection in with a failure developed in a client link;
- FIG. 3 is a diagram illustrating a ringed communications network with dual homing protection in with a failure developed in a network node
- FIG. 4 is a diagram illustrating a ringed communications network with dual homing protection recovered from the failure
- FIG. 5 is a flowchart illustrating a method of recovering from a failure in a ringed communications network with dual homing protection in one embodiment of the present invention.
- the present invention is discussed herein below in the context of a Multi-Protocol Label Switching provider network.
- MPLS Transport MPLS
- Provider Bridge Q-in-Q
- PBB Provider Backbone Bridges
- PBB-TE Provider Backbone Bridges - Traffic Engineering
- Ethernet SDH and other.
- a method of recovering from a failure in a ringed network using dual homing protection towards the clients is presented.
- the ring topology has been chosen for its simplicity of description.
- one of the links towards the client for example, a first link 102 connecting the client 106 with a first node 108 has the related port on node 108 in forwarding (i.e. active) state.
- the second link 104 connecting the client 106 with a second node 110 has the related port on node 110 in blocking state (i.e. stand-by, which term also covers a fail status).
- the communications network 100 is a transport network made available by a provider and also known as a Provider Network.
- the failure can be detected based on logic criteria or based on physical criteria.
- the physical criteria refer to detection of lack of connection on a physical layer (i.e. the link is down).
- Operation, Administration and Maintenance (OAM) messages or RSTP Bridge Protocol Data Unit that can be (in case of OAM) or are periodically sent between connected ports can be used to detect the failure. If such message is not received on a particular port of the client or the network node for n (typically three) consecutive times it indicates a failure on either the link connected to these ports or a device connected to said link. This is an example of detection of a failure based on logical criteria.
- the failure 202 that this invention is designed to cope with can develop in the link 102 connecting the client 106 to the node (this includes a fibre cut, a client port or card failure or a port or card failure on the Provider Network node), as illustrated in FIG. 2 or the failure may develop, 302, in the network node 108, as illustrated in FIG. 3.
- the RSTP instances change 504 the status of the port related to the first link 102 from forwarding to discarding and the status of the port related to the second link 104 from discarding to forwarding.
- the node connected to the port related to link in forwarding state i.e. the second node 110 connected to the second link 104 sends 506 to the node 112 connected to another network 114 a request to purge MAC address table of said node 112 connected to another network 114.
- the node 112 is connected to another part of the same client network rather than to another network 114.
- the node 112 connected to another network 114 is called a head-end node and this is the node that connects the provider network to IP network (e.g. the Internet) and it is the head-end node 112 that is requested to purge its MAC address table.
- IP network e.g. the Internet
- the request to purge MAC address table is sent 506 to all network nodes operating in said Virtual Private Network (VPN).
- VPN Virtual Private Network
- the MAC address table of the head-end node 112 is purged 508 in response to said request (residential application) and in the embodiment with the VPN application the MAC address tables of all network nodes operating in said VPN are purged.
- the step of purging 508 the MAC address table in the head-end node 112 only the entries related to the client 106 affected by the failure are deleted.
- the head-end node 112 Because after deletion of the entries of the MAC address table, which are related to the client node 106, the head-end node will not know where to send the traffic coming from the other network 114 and whose destination is the client node 106 the head-end node 112 starts a learning phase by performing flooding 510. In the operation of flooding 510 the head-end node 112 multicasts the traffic for which it does not know what output port to use to reach its destination towards the nodes of the network involved in the same services, so that once it gets the related upstream traffic from one of its ports, the relevant entries can be inserted in the MAC address table. Same is applicable to all metro nodes 108, 110, 112 that have their MAC address tables purged in the case of Virtual Private Network.
- the flooding 510 is performed by the head-end node or the nodes operating in Virtual Private Network only when there is traffic to be sent to MAC addresses which are not in the MAC address table (included all those relevant to client 106).
- the head-end node 112 in the case of residential application
- the metro nodes 110 - 112 in the case of VPN application
- the traffic 120, 122 to and from the client is directed 512 via the link having the related port in forwarding status, which is the situation illustrated in FIG. 4.
- a Rapid Spanning Tree Protocol was used as an example. It is, however, equally possible to use other mechanisms like Spanning Tree Protocol (STP) or, even proprietary protocols, for the control of the dual homing protection scheme.
- STP Spanning Tree Protocol
- the terminology used in Spanning Tree Protocol is slightly different and the active state of a port is known as “forwarding state” and the stand-by state of a port is known as “blocking state”.
- the application of STP instead of RSTP should be clear for a person skilled in the art based on the description of embodiments given above.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Environmental & Geological Engineering (AREA)
- Small-Scale Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
A method of recovering from a failure of a link connecting a client to a node or of a node in a communications network using a dual homing protection and comprising a plurality of nodes. One of said nodes is connected to another network. A first node and a second node are connected to the client, and one of the ports related to the links connecting the client with the nodes is in an active state and the other is in a stand-by state. The method comprises detecting the failure (502), changing (504) both ports status. In response to the status change, sending, (506) to the node connected to the other network, a request to purge its MAC address table, purging (508) the MAC address table and flooding (510) nodes of the communications network in order to fill in the purged MAC address table with updated information, directing (512) traffic to and from the client via the link having the related port in the active state.
Description
RECOVERING FROM A FAILURE IN A COMMUNICATIONS NETWORK
Field of the Invention
The present invention relates to telecommunications networks, in general, and in particular to recovering from a failure in a communications network using dual homing protection for connection of a client to the network.
Background of the Invention
Dual homing protection for the client equipment in a communications network is a scenario that is gaining high interest for its characteristics of reliability and resilience. It is more complicated than a single homing protection since it involves two different nodes in the communications network and no standard Link Aggregation can be used. A Metro Multi-Protocol Label Switching (MPLS) network is an example only, but the problem described below exists irrespective of the actual technology used in the Metro transport network: MPLS, Provider Bridge, Q-in-Q, PBB (Provider Backbone Bridges), PBB-TE (Provider Backbone Bridges - Traffic Engineering), Ethernet, Synchronous Digital Hierarchy (SDH) or other.
The use of an instance of a Spanning Tree Protocol (STP) or a Rapid Spanning Tree Protocol (RSTP) only for dual homing protection purposes involves some potential issues, which have to do with the overall network efficiency, and the way the underlying Layer 2 service is provided. The same issues may apply to alternative protocols which share with STP and RSTP the same functional behaviour (they may be proprietary solutions using the same basic concepts).
In FIG. 1 an example of normal operation conditions is illustrated. Taking into account the two links in dual homing (i.e. 102 and 104), assuming that STP is implemented, the port on node 110 related to link 104 is in Blocking State and the port on node 108 related to link 102 is in Forwarding State. In an MPLS Provider Network 100, this means, for example, that the two Label Switched Paths (LSPs) 116, 118 on the left
side of the network, in this case a Metro ring for the sake of simplicity, are used to carry the traffic related to the protected client 106 in both directions. This is the normal state.
If a failure 202 condition occurs to the customer link 102 related to port in Forwarding State on node 108 (it can be a fibre cut, a client port or card failure or a port or card failure on the Metro node) the STP or the RSTP detects the problem and acts consequently. In the case of RSTP the reaction time is very short, while it is longer in case of a plain STP. The situation is shown in FIG. 2, where the transition phase is illustrated. By transition phase it is meant the situation where the STP or RSTP puts in Forwarding State the port that was in Blocking State, and therefore the upstream traffic is carried by an LSP 122 on the right side of the Metro ring. In this example of hubbed traffic patterns, which is typical of residential applications, the head-end node 112 has no other way to realise that something happened except when it starts receiving traffic sent by the client 106 from another line card. Once traffic is received from the client, the Media Access Control address (MAC address) learning mechanism is such that the head-end node 112 starts sending traffic downstream accordingly.
The mechanism described is potentially subject to problems, which are dependent upon the nature of the traffic, and whose duration is quite unpredictable. In fact, when the traffic pattern is strongly mono-directional (from the head-end node to the client), the head-end node has no way to realise that something has changed in the network if it does not receive any packets in the upstream direction (which are going to feed the MAC learning mechanism). This may lead to a significant traffic failure on the network, since the traffic that is sent downstream in FIG. 2 will simply be lost (because sent out from the wrong port by the head-end node 112).
The other way in which the head-end node 112 can react to the change is when the ageing mechanism deletes its MAC address entries related to the specific client, and therefore a new MAC learning phase is started by means of flooding. The problem with this solution is that a typical ageing time for MAC address entries is 300 s (i.e. 5 minutes!).
Possible remedies to this issue include participation of the head-end node in the STP or RSTP mechanism. However, the head-end node running and participating in the STP or RSTP is heavy and unpractical, for a series of reasons, such as the necessity to potentially run many instances of STP or RSTP in the head-end node (which is a big problem in case of many clients protected in dual homing) and the fact that the STP or RSTP would have to provide a control plane functionality for the MPLS network (or, in general, for the Provider Network, whatever technology is adopted). In fact, in this way STP or RSTP would be run inside the Provider Network determining which ports need to be used in the trunk part of the network, thus actually improperly acting like a part of the Provider's control plane.
Another method known in the art is notifying the topology change to the head-end node and requiring purging the MAC address entries related to the specific physical ports involved in the change driven by STP or RSTP. This is done using standard methods, like those made available by Label Distribution Protocol (LDP). The disadvantage of this solution is that it requires use of a complete protocol, which may not be needed for other purposes, and it can cope only with client link failures.
Hence, an improved method of recovering from a failure in a communications network using dual homing protection would be advantageous and in particular one that is simple and can equally manage recovering from client link or port failure and from network node failure.
Summary of the Invention Accordingly, the invention seeks to preferably mitigate, alleviate or eliminate one or more of the disadvantages mentioned above singly or in any combination.
According to the first aspect of the present invention a method of recovering from a failure of a link connecting a client to a node or from a failure of a node in a communications network using dual homing protection is disclosed. Said communications network comprises a plurality of nodes and at least one of said nodes is connected to
another network, a first node, of said plurality of nodes, is connected to the client and a second node, of said plurality of nodes, is also connected to the client. One of the ports related to the links connecting the client with the nodes is in an active state and the other port is in a stand-by state. The method comprises the following steps: detecting the failure, changing the port status from active to stand-by and the other port from stand-by to active. In response to the change of the status, from stand-by to active, the node in the active state sends to the node connected to the another network a request to purge its MAC address table. In the next step, in response to said request, the node connected to the another network purges its MAC address table and then performs flooding in order to fill in the purged MAC address table with updated information. Once the MAC address table is updated traffic to and from the client is directed via the link having the related port in the active state.
Further features of the present invention are as claimed in the dependent claims.
The present invention beneficially allows for a very fast, reliable and predictable recovery time for the Layer 2 traffic being exchanged by clients or client networks, which are connected in dual homing to a transport network made available by a provider (Provider Network), in the event of a failure to the client traffic. In fact, the present invention can be beneficially effective in case of both link failure towards the client (or port or card failure in the client equipment) and failure of one of the provider network nodes involved in the dual homing protection. The present invention is beneficially independent of any traffic patterns or characteristics, and therefore the time it takes to be effective is predictable. The present invention is also applicable to various technologies in which the Provider Network can be implemented, since it only requires very simple and minimal information to be sent to the node or the nodes which need to purge their MAC address tables related to the client that has experienced the failure. The present invention also applies to cases where the dual homing protection is realised with protocols or methods other than STP and RSTP, whose basic mechanism relies on putting ports of the client equipment and/or of the network node in an active state or in a stand-by state.
Brief description of the drawings
The present invention will be understood and appreciated more fully from the following detailed description taken in conjunction with the drawings in which:
FIG. 1 is a diagram illustrating a ringed communications network with dual homing protection in normal operation;
FIG. 2 is a diagram illustrating a ringed communications network with dual homing protection in with a failure developed in a client link;
FIG. 3 is a diagram illustrating a ringed communications network with dual homing protection in with a failure developed in a network node;
FIG. 4 is a diagram illustrating a ringed communications network with dual homing protection recovered from the failure;
FIG. 5 is a flowchart illustrating a method of recovering from a failure in a ringed communications network with dual homing protection in one embodiment of the present invention.
Description of embodiments of the invention
The present invention is discussed herein below in the context of a Multi-Protocol Label Switching provider network. However, it should be understood that it is not limited to MPLS networks, but also applies to other transport network technologies, e.g. T-MPLS (Transport MPLS), Provider Bridge, Q-in-Q, PBB (Provider Backbone Bridges), PBB-TE (Provider Backbone Bridges - Traffic Engineering), Ethernet, SDH and other.
With reference to FIG. 1 and FIG. 5 a method of recovering from a failure in a ringed network using dual homing protection towards the clients is presented. The ring topology has been chosen for its simplicity of description. In normal operating conditions one of the links towards the client, for example, a first link 102 connecting the client 106
with a first node 108 has the related port on node 108 in forwarding (i.e. active) state. The second link 104 connecting the client 106 with a second node 110 has the related port on node 110 in blocking state (i.e. stand-by, which term also covers a fail status). This means that all the traffic between the client and the network passes through the link whose ports are active, which is the first link 102, and the first node 108 connected to this link. If a fault develops in the first link 102 or in the first node 108 the fault is detected, in a preferred embodiment, by a Rapid Spanning Tree Protocol run by the client 106 and at least one of the nodes 108, 110. It must be noted that in the case of a link failure both nodes 108 and 110 can participate together with the client 106 in the RSTP procedure. If, however, it is the first network node 108 that failed, the RSTP procedure is carried out by the client 106 and the second network node 110.
In one embodiment the communications network 100 is a transport network made available by a provider and also known as a Provider Network.
The failure can be detected based on logic criteria or based on physical criteria. The physical criteria refer to detection of lack of connection on a physical layer (i.e. the link is down). Operation, Administration and Maintenance (OAM) messages or RSTP Bridge Protocol Data Unit that can be (in case of OAM) or are periodically sent between connected ports can be used to detect the failure. If such message is not received on a particular port of the client or the network node for n (typically three) consecutive times it indicates a failure on either the link connected to these ports or a device connected to said link. This is an example of detection of a failure based on logical criteria. The failure 202 that this invention is designed to cope with can develop in the link 102 connecting the client 106 to the node (this includes a fibre cut, a client port or card failure or a port or card failure on the Provider Network node), as illustrated in FIG. 2 or the failure may develop, 302, in the network node 108, as illustrated in FIG. 3.
Once the failure is detected the RSTP instances change 504 the status of the port related to the first link 102 from forwarding to discarding and the status of the port related to the second link 104 from discarding to forwarding.
In response to the change of the status ot the ports related to links the node connected to the port related to link in forwarding state (i.e. the second node 110 connected to the second link 104) sends 506 to the node 112 connected to another network 114 a request to purge MAC address table of said node 112 connected to another network 114. In one embodiment the node 112 is connected to another part of the same client network rather than to another network 114. In yet another embodiment there may be more than one node connected to another network in the Provider Network 100.
In an embodiment of residential application the node 112 connected to another network 114 is called a head-end node and this is the node that connects the provider network to IP network (e.g. the Internet) and it is the head-end node 112 that is requested to purge its MAC address table. Please note that more complex network scenarios can actually apply where there are two head-end nodes. In this case both head-end nodes need to be required to purge their MAC address tables. In an alternative embodiment of a commercial application (e.g. corporate network based on Layer 2 Virtual Private Network) the request to purge MAC address table is sent 506 to all network nodes operating in said Virtual Private Network (VPN).
In the next step the MAC address table of the head-end node 112 is purged 508 in response to said request (residential application) and in the embodiment with the VPN application the MAC address tables of all network nodes operating in said VPN are purged.
In a preferred embodiment, in the step of purging 508 the MAC address table in the head-end node 112, only the entries related to the client 106 affected by the failure are deleted.
Because after deletion of the entries of the MAC address table, which are related to the client node 106, the head-end node will not know where to send the traffic coming from the other network 114 and whose destination is the client node 106 the head-end node 112 starts a learning phase by performing flooding 510. In the operation of flooding 510 the head-end node 112 multicasts the traffic for which it does not know what output port to use to reach its destination towards the nodes of the network involved in the same services,
so that once it gets the related upstream traffic from one of its ports, the relevant entries can be inserted in the MAC address table. Same is applicable to all metro nodes 108, 110, 112 that have their MAC address tables purged in the case of Virtual Private Network.
In a preferred embodiment the flooding 510 is performed by the head-end node or the nodes operating in Virtual Private Network only when there is traffic to be sent to MAC addresses which are not in the MAC address table (included all those relevant to client 106).
Once the learning phase has been completed and the head-end node 112 (in the case of residential application) or the metro nodes 110 - 112 (in the case of VPN application) have their MAC address tables filled in with updated information the traffic 120, 122 to and from the client is directed 512 via the link having the related port in forwarding status, which is the situation illustrated in FIG. 4.
In the presented embodiment a Rapid Spanning Tree Protocol was used as an example. It is, however, equally possible to use other mechanisms like Spanning Tree Protocol (STP) or, even proprietary protocols, for the control of the dual homing protection scheme. The terminology used in Spanning Tree Protocol is slightly different and the active state of a port is known as "forwarding state" and the stand-by state of a port is known as "blocking state". The application of STP instead of RSTP should be clear for a person skilled in the art based on the description of embodiments given above.
Claims
1. A method of recovering from a failure of a link (102, 104) connecting a client (106) to a node (108, 110) or from a failure of a node (108, 110) in a communications network (100) using dual homing protection, said network (100) comprising a plurality of nodes (108 - 112) and at least one of said nodes (112) is connected to another network (114), a first node (108), of said plurality of nodes, is connected to the client (106) and a second node (110), of said plurality of nodes, is connected to the client (106), wherein one of the ports related to the links (102, 104) connecting the client (106) with the nodes (108, 110) is in an active state and the other port is in a stand-by state, the method comprises: a) detecting the failure (502); b) changing (504) the port status from active to stand-by and the other port from stand-by to active; c) in response to the change of the status from stand-by to active, sending (506) to the node connected to the another network (114), by the node whose port is in the active state, a request to purge its MAC address table; d) purging (508) the MAC address table of the node connected to the another network (114) in response to said request and performing flooding (510) in order to fill in the purged MAC address table with updated information; e) directing (512) traffic to and from the client (106) via the link having the related port in the active state.
2. The method according to claim 1, wherein in the step of purging (508) the MAC address table in the node connected to the another network (114) the entries related to the client (106) affected by the failure are deleted.
3. The method according to any one of preceding claims, wherein for the nodes operating in a Virtual Private Network the request to purge a MAC address table is sent (506) to every node operating in said Virtual Private Network.
4. The method according to any one of preceding claims, wherein the steps of detection (502) of the failure and changing the port status is carried out according to a Spanning Tree Protocol or a Rapid Spanning Tree Protocol.
5. The method according to claim 4, wherein the procedure according to Spanning Tree Protocol or a Rapid Spanning Tree Protocol is performed by the client (106) and at least one of the nodes (108, 110) connected to the client (106).
6. The method according to any one of preceding claims, wherein the flooding (510) is performed by the node connected to the another network (114) when there is traffic to be sent to the client.
7. The method according to claim 3, wherein the flooding (510) is performed by all the nodes operating in the Virtual Private Network.
8. The method according to claim 1, where the communications network (100) can be implemented in MPLS, T-MPLS, Provider Bridge, PBB, PBB-TE, Ethernet, SDH or other technology.
9. A communications network (100) using dual homing protection adapted to carry out recovery from a failure of a link (102, 104) connecting a client (106) to a node (108, 110) or from a failure of a node (108, 110), wherein the recovery is carried out according to the method of any one of claims 1 - 8.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0707915.5 | 2007-04-25 | ||
GB0707915A GB2448711A (en) | 2007-04-25 | 2007-04-25 | Recovering from a failure in a communications network |
Publications (3)
Publication Number | Publication Date |
---|---|
WO2008132203A2 true WO2008132203A2 (en) | 2008-11-06 |
WO2008132203A3 WO2008132203A3 (en) | 2009-01-15 |
WO2008132203A8 WO2008132203A8 (en) | 2009-07-23 |
Family
ID=38135356
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2008/055180 WO2008132203A2 (en) | 2007-04-25 | 2008-04-28 | Recovering from a failure in a communications network |
Country Status (2)
Country | Link |
---|---|
GB (1) | GB2448711A (en) |
WO (1) | WO2008132203A2 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101930900B1 (en) * | 2016-12-19 | 2018-12-20 | 주식회사 케이티 | Apparatus and method for constructing connection information of optical network equipment |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101902382B (en) * | 2009-06-01 | 2015-01-28 | 中兴通讯股份有限公司 | Ethernet single ring network address refreshing method and system |
US8102760B2 (en) * | 2009-06-30 | 2012-01-24 | Alcatel Lucent | Method for reconvergence after failure in a dual-homing network environment |
CN101964718B (en) * | 2009-07-23 | 2015-09-16 | 中兴通讯股份有限公司 | Ethernet dual homed link protection changing method and system |
CN101989944B (en) | 2009-07-31 | 2014-11-05 | 中兴通讯股份有限公司 | Method for local protection of Ethernet tunnel and shared node of protection domain working segment |
CN102006222B (en) * | 2010-11-16 | 2015-06-24 | 中兴通讯股份有限公司 | Service link switching method and service link switching device |
CN102209037B (en) | 2011-06-15 | 2014-03-26 | 华为技术有限公司 | Media access control address switching method, network equipment and user equipment |
CN107995111B (en) * | 2016-10-26 | 2021-08-06 | 中兴通讯股份有限公司 | Service forwarding method, link change notification method, convergence device and access device |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6202114B1 (en) * | 1997-12-31 | 2001-03-13 | Cisco Technology, Inc. | Spanning tree with fast link-failure convergence |
JP4021841B2 (en) * | 2003-10-29 | 2007-12-12 | 富士通株式会社 | Control packet processing apparatus and method in spanning tree protocol |
JP4020753B2 (en) * | 2002-10-25 | 2007-12-12 | 富士通株式会社 | Ring switching method |
WO2006065795A2 (en) * | 2004-12-14 | 2006-06-22 | Alcatel Lucent | Ring rapid spanning tree protocol |
-
2007
- 2007-04-25 GB GB0707915A patent/GB2448711A/en not_active Withdrawn
-
2008
- 2008-04-28 WO PCT/EP2008/055180 patent/WO2008132203A2/en active Application Filing
Non-Patent Citations (3)
Title |
---|
ALI M ET AL: "Issues and approaches on extending ethernet beyond LANs" IEEE COMMUNICATIONS MAGAZINE, IEEE SERVICE CENTER, PISCATAWAY, US, vol. 42, no. 3, 1 March 2004 (2004-03-01), pages 80-86, XP011108916 ISSN: 0163-6804 * |
CHIRUVOLU, F.; CARTIER, J.F.;: "Selective Customer TCN Snooping accross a Provider Domain"[Online] March 2003 (2003-03), pages 1-8, XP002499278 Retrieved from the Internet: URL:http://www.ieee802.org/1/files/public/docs2003/IEEE_BPDU_handling_v5.pdf> [retrieved on 2008-10-10] * |
MARC LASSERRE VACH KOMPELLA (EDITORS): "Virtual Private LAN Services over MPLS; draft-ietf-l2vpn-vpls-ldp-07.txt" IETF STANDARD-WORKING-DRAFT, INTERNET ENGINEERING TASK FORCE, IETF, CH, vol. l2vpn, no. 7, 1 July 2005 (2005-07-01), XP015041095 ISSN: 0000-0004 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101930900B1 (en) * | 2016-12-19 | 2018-12-20 | 주식회사 케이티 | Apparatus and method for constructing connection information of optical network equipment |
Also Published As
Publication number | Publication date |
---|---|
WO2008132203A8 (en) | 2009-07-23 |
GB2448711A (en) | 2008-10-29 |
GB0707915D0 (en) | 2007-05-30 |
WO2008132203A3 (en) | 2009-01-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9100269B2 (en) | Provisioned provider link state bridging (PLSB) with routed back-up | |
US10623307B2 (en) | Method and system for asymmetric redundancy mechanisms in multi-homed network access topologies | |
US9172630B2 (en) | Method for client data transmission through a packet switched provider network | |
JP5548673B2 (en) | Redundant Ethernet automatic protection switching access to virtual private LAN services | |
US8488444B2 (en) | Fast remote failure notification | |
US7610360B1 (en) | Transient tolerant verification of communications paths between devices | |
EP2498454A1 (en) | Method, device and system for processing service traffic based on pseudo wires | |
US8724452B2 (en) | Technique for protecting communication traffic in a connection having redundancy | |
US20150334006A1 (en) | Method to do fast traffic switchover based on server layer status | |
US20080031129A1 (en) | Smart Ethernet edge networking system | |
US20130272114A1 (en) | Pseudo wire switching method and device | |
WO2008132203A2 (en) | Recovering from a failure in a communications network | |
US8787398B2 (en) | Linear route protection | |
WO2007144870A1 (en) | Technique for providing interconnection between communication networks | |
Hariyawan | Comparison analysis of recovery mechanism at MPLS network | |
EP2129042A1 (en) | A multicast network system, node and a method for detecting a fault of a multicast network link | |
US7680923B1 (en) | Connectivity assessment for label distribution protocol (LDP) networks | |
US11121964B2 (en) | Data path retention during control plane failures in a multiprotocol label switching network | |
Cavendish et al. | Operation, administration, and maintenance in MPLS networks | |
Santos et al. | Improving carrier ethernet recovery time using a fast reroute mechanism | |
James | Applying ADM and OpenFlow to Build High Availability Networks | |
Tomar et al. | MPLS-A Fail Safe Approach to Congestion Control | |
Northcote | The Bi-Mesh Survivable Network–Fast Recovery from Node Failure in MPLS enabled Networks | |
Hussain et al. | Network Resilience in Multiprotocol Label Switching | |
Sprecher et al. | MPLS-TP Ring Protection draft-weingarten-mpls-tp-ring-protection-03. txt |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 08749802 Country of ref document: EP Kind code of ref document: A2 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 08749802 Country of ref document: EP Kind code of ref document: A2 |