WO2008132203A2 - Recovering from a failure in a communications network - Google Patents

Recovering from a failure in a communications network Download PDF

Info

Publication number
WO2008132203A2
WO2008132203A2 PCT/EP2008/055180 EP2008055180W WO2008132203A2 WO 2008132203 A2 WO2008132203 A2 WO 2008132203A2 EP 2008055180 W EP2008055180 W EP 2008055180W WO 2008132203 A2 WO2008132203 A2 WO 2008132203A2
Authority
WO
WIPO (PCT)
Prior art keywords
node
client
failure
network
nodes
Prior art date
Application number
PCT/EP2008/055180
Other languages
French (fr)
Other versions
WO2008132203A8 (en
WO2008132203A3 (en
Inventor
Riccardo Martinotti
Andrea Corti
Raoul Fiorone
Original Assignee
Telefonaktiebolaget Lm Ericsson (Publ)
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telefonaktiebolaget Lm Ericsson (Publ) filed Critical Telefonaktiebolaget Lm Ericsson (Publ)
Publication of WO2008132203A2 publication Critical patent/WO2008132203A2/en
Publication of WO2008132203A3 publication Critical patent/WO2008132203A3/en
Publication of WO2008132203A8 publication Critical patent/WO2008132203A8/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0805Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
    • H04L43/0817Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/42Loop networks
    • H04L12/437Ring fault isolation or reconfiguration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0654Management of faults, events, alarms or notifications using network fault recovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/40Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass for recovering from a failure of a protocol instance or entity, e.g. service redundancy protocols, protocol state redundancy or protocol service redirection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q3/00Selecting arrangements
    • H04Q3/0016Arrangements providing connection between exchanges
    • H04Q3/0062Provisions for network management
    • H04Q3/0075Fault management techniques
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2101/00Indexing scheme associated with group H04L61/00
    • H04L2101/60Types of network addresses
    • H04L2101/618Details of network addresses
    • H04L2101/622Layer-2 addresses, e.g. medium access control [MAC] addresses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2101/00Indexing scheme associated with group H04L61/00
    • H04L2101/60Types of network addresses
    • H04L2101/677Multiple interfaces, e.g. multihomed nodes

Definitions

  • the present invention relates to telecommunications networks, in general, and in particular to recovering from a failure in a communications network using dual homing protection for connection of a client to the network.
  • Dual homing protection for the client equipment in a communications network is a scenario that is gaining high interest for its characteristics of reliability and resilience. It is more complicated than a single homing protection since it involves two different nodes in the communications network and no standard Link Aggregation can be used.
  • a Metro Multi-Protocol Label Switching (MPLS) network is an example only, but the problem described below exists irrespective of the actual technology used in the Metro transport network: MPLS, Provider Bridge, Q-in-Q, PBB (Provider Backbone Bridges), PBB-TE (Provider Backbone Bridges - Traffic Engineering), Ethernet, Synchronous Digital Hierarchy (SDH) or other.
  • STP Spanning Tree Protocol
  • RSTP Rapid Spanning Tree Protocol
  • FIG. 1 an example of normal operation conditions is illustrated. Taking into account the two links in dual homing (i.e. 102 and 104), assuming that STP is implemented, the port on node 110 related to link 104 is in Blocking State and the port on node 108 related to link 102 is in Forwarding State.
  • LSPs Label Switched Paths
  • a failure 202 condition occurs to the customer link 102 related to port in Forwarding State on node 108 (it can be a fibre cut, a client port or card failure or a port or card failure on the Metro node) the STP or the RSTP detects the problem and acts consequently.
  • the reaction time is very short, while it is longer in case of a plain STP.
  • FIG. 2 where the transition phase is illustrated.
  • transition phase it is meant the situation where the STP or RSTP puts in Forwarding State the port that was in Blocking State, and therefore the upstream traffic is carried by an LSP 122 on the right side of the Metro ring.
  • the head-end node 112 has no other way to realise that something happened except when it starts receiving traffic sent by the client 106 from another line card.
  • the Media Access Control address (MAC address) learning mechanism is such that the head-end node 112 starts sending traffic downstream accordingly.
  • the mechanism described is potentially subject to problems, which are dependent upon the nature of the traffic, and whose duration is quite unpredictable.
  • the traffic pattern is strongly mono-directional (from the head-end node to the client), the head-end node has no way to realise that something has changed in the network if it does not receive any packets in the upstream direction (which are going to feed the MAC learning mechanism). This may lead to a significant traffic failure on the network, since the traffic that is sent downstream in FIG. 2 will simply be lost (because sent out from the wrong port by the head-end node 112).
  • the other way in which the head-end node 112 can react to the change is when the ageing mechanism deletes its MAC address entries related to the specific client, and therefore a new MAC learning phase is started by means of flooding.
  • the problem with this solution is that a typical ageing time for MAC address entries is 300 s (i.e. 5 minutes!).
  • Possible remedies to this issue include participation of the head-end node in the STP or RSTP mechanism.
  • the head-end node running and participating in the STP or RSTP is heavy and unpractical, for a series of reasons, such as the necessity to potentially run many instances of STP or RSTP in the head-end node (which is a big problem in case of many clients protected in dual homing) and the fact that the STP or RSTP would have to provide a control plane functionality for the MPLS network (or, in general, for the Provider Network, whatever technology is adopted).
  • STP or RSTP would be run inside the Provider Network determining which ports need to be used in the trunk part of the network, thus actually improperly acting like a part of the Provider's control plane.
  • an improved method of recovering from a failure in a communications network using dual homing protection would be advantageous and in particular one that is simple and can equally manage recovering from client link or port failure and from network node failure.
  • the invention seeks to preferably mitigate, alleviate or eliminate one or more of the disadvantages mentioned above singly or in any combination.
  • a method of recovering from a failure of a link connecting a client to a node or from a failure of a node in a communications network using dual homing protection comprises a plurality of nodes and at least one of said nodes is connected to another network, a first node, of said plurality of nodes, is connected to the client and a second node, of said plurality of nodes, is also connected to the client.
  • One of the ports related to the links connecting the client with the nodes is in an active state and the other port is in a stand-by state.
  • the method comprises the following steps: detecting the failure, changing the port status from active to stand-by and the other port from stand-by to active.
  • the node in the active state In response to the change of the status, from stand-by to active, the node in the active state sends to the node connected to the another network a request to purge its MAC address table. In the next step, in response to said request, the node connected to the another network purges its MAC address table and then performs flooding in order to fill in the purged MAC address table with updated information. Once the MAC address table is updated traffic to and from the client is directed via the link having the related port in the active state.
  • the present invention beneficially allows for a very fast, reliable and predictable recovery time for the Layer 2 traffic being exchanged by clients or client networks, which are connected in dual homing to a transport network made available by a provider (Provider Network), in the event of a failure to the client traffic.
  • the present invention can be beneficially effective in case of both link failure towards the client (or port or card failure in the client equipment) and failure of one of the provider network nodes involved in the dual homing protection.
  • the present invention is beneficially independent of any traffic patterns or characteristics, and therefore the time it takes to be effective is predictable.
  • the present invention is also applicable to various technologies in which the Provider Network can be implemented, since it only requires very simple and minimal information to be sent to the node or the nodes which need to purge their MAC address tables related to the client that has experienced the failure.
  • the present invention also applies to cases where the dual homing protection is realised with protocols or methods other than STP and RSTP, whose basic mechanism relies on putting ports of the client equipment and/or of the network node in an active state or in a stand-by state.
  • FIG. 1 is a diagram illustrating a ringed communications network with dual homing protection in normal operation
  • FIG. 2 is a diagram illustrating a ringed communications network with dual homing protection in with a failure developed in a client link;
  • FIG. 3 is a diagram illustrating a ringed communications network with dual homing protection in with a failure developed in a network node
  • FIG. 4 is a diagram illustrating a ringed communications network with dual homing protection recovered from the failure
  • FIG. 5 is a flowchart illustrating a method of recovering from a failure in a ringed communications network with dual homing protection in one embodiment of the present invention.
  • the present invention is discussed herein below in the context of a Multi-Protocol Label Switching provider network.
  • MPLS Transport MPLS
  • Provider Bridge Q-in-Q
  • PBB Provider Backbone Bridges
  • PBB-TE Provider Backbone Bridges - Traffic Engineering
  • Ethernet SDH and other.
  • a method of recovering from a failure in a ringed network using dual homing protection towards the clients is presented.
  • the ring topology has been chosen for its simplicity of description.
  • one of the links towards the client for example, a first link 102 connecting the client 106 with a first node 108 has the related port on node 108 in forwarding (i.e. active) state.
  • the second link 104 connecting the client 106 with a second node 110 has the related port on node 110 in blocking state (i.e. stand-by, which term also covers a fail status).
  • the communications network 100 is a transport network made available by a provider and also known as a Provider Network.
  • the failure can be detected based on logic criteria or based on physical criteria.
  • the physical criteria refer to detection of lack of connection on a physical layer (i.e. the link is down).
  • Operation, Administration and Maintenance (OAM) messages or RSTP Bridge Protocol Data Unit that can be (in case of OAM) or are periodically sent between connected ports can be used to detect the failure. If such message is not received on a particular port of the client or the network node for n (typically three) consecutive times it indicates a failure on either the link connected to these ports or a device connected to said link. This is an example of detection of a failure based on logical criteria.
  • the failure 202 that this invention is designed to cope with can develop in the link 102 connecting the client 106 to the node (this includes a fibre cut, a client port or card failure or a port or card failure on the Provider Network node), as illustrated in FIG. 2 or the failure may develop, 302, in the network node 108, as illustrated in FIG. 3.
  • the RSTP instances change 504 the status of the port related to the first link 102 from forwarding to discarding and the status of the port related to the second link 104 from discarding to forwarding.
  • the node connected to the port related to link in forwarding state i.e. the second node 110 connected to the second link 104 sends 506 to the node 112 connected to another network 114 a request to purge MAC address table of said node 112 connected to another network 114.
  • the node 112 is connected to another part of the same client network rather than to another network 114.
  • the node 112 connected to another network 114 is called a head-end node and this is the node that connects the provider network to IP network (e.g. the Internet) and it is the head-end node 112 that is requested to purge its MAC address table.
  • IP network e.g. the Internet
  • the request to purge MAC address table is sent 506 to all network nodes operating in said Virtual Private Network (VPN).
  • VPN Virtual Private Network
  • the MAC address table of the head-end node 112 is purged 508 in response to said request (residential application) and in the embodiment with the VPN application the MAC address tables of all network nodes operating in said VPN are purged.
  • the step of purging 508 the MAC address table in the head-end node 112 only the entries related to the client 106 affected by the failure are deleted.
  • the head-end node 112 Because after deletion of the entries of the MAC address table, which are related to the client node 106, the head-end node will not know where to send the traffic coming from the other network 114 and whose destination is the client node 106 the head-end node 112 starts a learning phase by performing flooding 510. In the operation of flooding 510 the head-end node 112 multicasts the traffic for which it does not know what output port to use to reach its destination towards the nodes of the network involved in the same services, so that once it gets the related upstream traffic from one of its ports, the relevant entries can be inserted in the MAC address table. Same is applicable to all metro nodes 108, 110, 112 that have their MAC address tables purged in the case of Virtual Private Network.
  • the flooding 510 is performed by the head-end node or the nodes operating in Virtual Private Network only when there is traffic to be sent to MAC addresses which are not in the MAC address table (included all those relevant to client 106).
  • the head-end node 112 in the case of residential application
  • the metro nodes 110 - 112 in the case of VPN application
  • the traffic 120, 122 to and from the client is directed 512 via the link having the related port in forwarding status, which is the situation illustrated in FIG. 4.
  • a Rapid Spanning Tree Protocol was used as an example. It is, however, equally possible to use other mechanisms like Spanning Tree Protocol (STP) or, even proprietary protocols, for the control of the dual homing protection scheme.
  • STP Spanning Tree Protocol
  • the terminology used in Spanning Tree Protocol is slightly different and the active state of a port is known as “forwarding state” and the stand-by state of a port is known as “blocking state”.
  • the application of STP instead of RSTP should be clear for a person skilled in the art based on the description of embodiments given above.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Environmental & Geological Engineering (AREA)
  • Small-Scale Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

A method of recovering from a failure of a link connecting a client to a node or of a node in a communications network using a dual homing protection and comprising a plurality of nodes. One of said nodes is connected to another network. A first node and a second node are connected to the client, and one of the ports related to the links connecting the client with the nodes is in an active state and the other is in a stand-by state. The method comprises detecting the failure (502), changing (504) both ports status. In response to the status change, sending, (506) to the node connected to the other network, a request to purge its MAC address table, purging (508) the MAC address table and flooding (510) nodes of the communications network in order to fill in the purged MAC address table with updated information, directing (512) traffic to and from the client via the link having the related port in the active state.

Description

RECOVERING FROM A FAILURE IN A COMMUNICATIONS NETWORK
Field of the Invention
The present invention relates to telecommunications networks, in general, and in particular to recovering from a failure in a communications network using dual homing protection for connection of a client to the network.
Background of the Invention
Dual homing protection for the client equipment in a communications network is a scenario that is gaining high interest for its characteristics of reliability and resilience. It is more complicated than a single homing protection since it involves two different nodes in the communications network and no standard Link Aggregation can be used. A Metro Multi-Protocol Label Switching (MPLS) network is an example only, but the problem described below exists irrespective of the actual technology used in the Metro transport network: MPLS, Provider Bridge, Q-in-Q, PBB (Provider Backbone Bridges), PBB-TE (Provider Backbone Bridges - Traffic Engineering), Ethernet, Synchronous Digital Hierarchy (SDH) or other.
The use of an instance of a Spanning Tree Protocol (STP) or a Rapid Spanning Tree Protocol (RSTP) only for dual homing protection purposes involves some potential issues, which have to do with the overall network efficiency, and the way the underlying Layer 2 service is provided. The same issues may apply to alternative protocols which share with STP and RSTP the same functional behaviour (they may be proprietary solutions using the same basic concepts).
In FIG. 1 an example of normal operation conditions is illustrated. Taking into account the two links in dual homing (i.e. 102 and 104), assuming that STP is implemented, the port on node 110 related to link 104 is in Blocking State and the port on node 108 related to link 102 is in Forwarding State. In an MPLS Provider Network 100, this means, for example, that the two Label Switched Paths (LSPs) 116, 118 on the left side of the network, in this case a Metro ring for the sake of simplicity, are used to carry the traffic related to the protected client 106 in both directions. This is the normal state.
If a failure 202 condition occurs to the customer link 102 related to port in Forwarding State on node 108 (it can be a fibre cut, a client port or card failure or a port or card failure on the Metro node) the STP or the RSTP detects the problem and acts consequently. In the case of RSTP the reaction time is very short, while it is longer in case of a plain STP. The situation is shown in FIG. 2, where the transition phase is illustrated. By transition phase it is meant the situation where the STP or RSTP puts in Forwarding State the port that was in Blocking State, and therefore the upstream traffic is carried by an LSP 122 on the right side of the Metro ring. In this example of hubbed traffic patterns, which is typical of residential applications, the head-end node 112 has no other way to realise that something happened except when it starts receiving traffic sent by the client 106 from another line card. Once traffic is received from the client, the Media Access Control address (MAC address) learning mechanism is such that the head-end node 112 starts sending traffic downstream accordingly.
The mechanism described is potentially subject to problems, which are dependent upon the nature of the traffic, and whose duration is quite unpredictable. In fact, when the traffic pattern is strongly mono-directional (from the head-end node to the client), the head-end node has no way to realise that something has changed in the network if it does not receive any packets in the upstream direction (which are going to feed the MAC learning mechanism). This may lead to a significant traffic failure on the network, since the traffic that is sent downstream in FIG. 2 will simply be lost (because sent out from the wrong port by the head-end node 112).
The other way in which the head-end node 112 can react to the change is when the ageing mechanism deletes its MAC address entries related to the specific client, and therefore a new MAC learning phase is started by means of flooding. The problem with this solution is that a typical ageing time for MAC address entries is 300 s (i.e. 5 minutes!). Possible remedies to this issue include participation of the head-end node in the STP or RSTP mechanism. However, the head-end node running and participating in the STP or RSTP is heavy and unpractical, for a series of reasons, such as the necessity to potentially run many instances of STP or RSTP in the head-end node (which is a big problem in case of many clients protected in dual homing) and the fact that the STP or RSTP would have to provide a control plane functionality for the MPLS network (or, in general, for the Provider Network, whatever technology is adopted). In fact, in this way STP or RSTP would be run inside the Provider Network determining which ports need to be used in the trunk part of the network, thus actually improperly acting like a part of the Provider's control plane.
Another method known in the art is notifying the topology change to the head-end node and requiring purging the MAC address entries related to the specific physical ports involved in the change driven by STP or RSTP. This is done using standard methods, like those made available by Label Distribution Protocol (LDP). The disadvantage of this solution is that it requires use of a complete protocol, which may not be needed for other purposes, and it can cope only with client link failures.
Hence, an improved method of recovering from a failure in a communications network using dual homing protection would be advantageous and in particular one that is simple and can equally manage recovering from client link or port failure and from network node failure.
Summary of the Invention Accordingly, the invention seeks to preferably mitigate, alleviate or eliminate one or more of the disadvantages mentioned above singly or in any combination.
According to the first aspect of the present invention a method of recovering from a failure of a link connecting a client to a node or from a failure of a node in a communications network using dual homing protection is disclosed. Said communications network comprises a plurality of nodes and at least one of said nodes is connected to another network, a first node, of said plurality of nodes, is connected to the client and a second node, of said plurality of nodes, is also connected to the client. One of the ports related to the links connecting the client with the nodes is in an active state and the other port is in a stand-by state. The method comprises the following steps: detecting the failure, changing the port status from active to stand-by and the other port from stand-by to active. In response to the change of the status, from stand-by to active, the node in the active state sends to the node connected to the another network a request to purge its MAC address table. In the next step, in response to said request, the node connected to the another network purges its MAC address table and then performs flooding in order to fill in the purged MAC address table with updated information. Once the MAC address table is updated traffic to and from the client is directed via the link having the related port in the active state.
Further features of the present invention are as claimed in the dependent claims.
The present invention beneficially allows for a very fast, reliable and predictable recovery time for the Layer 2 traffic being exchanged by clients or client networks, which are connected in dual homing to a transport network made available by a provider (Provider Network), in the event of a failure to the client traffic. In fact, the present invention can be beneficially effective in case of both link failure towards the client (or port or card failure in the client equipment) and failure of one of the provider network nodes involved in the dual homing protection. The present invention is beneficially independent of any traffic patterns or characteristics, and therefore the time it takes to be effective is predictable. The present invention is also applicable to various technologies in which the Provider Network can be implemented, since it only requires very simple and minimal information to be sent to the node or the nodes which need to purge their MAC address tables related to the client that has experienced the failure. The present invention also applies to cases where the dual homing protection is realised with protocols or methods other than STP and RSTP, whose basic mechanism relies on putting ports of the client equipment and/or of the network node in an active state or in a stand-by state. Brief description of the drawings
The present invention will be understood and appreciated more fully from the following detailed description taken in conjunction with the drawings in which:
FIG. 1 is a diagram illustrating a ringed communications network with dual homing protection in normal operation;
FIG. 2 is a diagram illustrating a ringed communications network with dual homing protection in with a failure developed in a client link;
FIG. 3 is a diagram illustrating a ringed communications network with dual homing protection in with a failure developed in a network node;
FIG. 4 is a diagram illustrating a ringed communications network with dual homing protection recovered from the failure;
FIG. 5 is a flowchart illustrating a method of recovering from a failure in a ringed communications network with dual homing protection in one embodiment of the present invention.
Description of embodiments of the invention
The present invention is discussed herein below in the context of a Multi-Protocol Label Switching provider network. However, it should be understood that it is not limited to MPLS networks, but also applies to other transport network technologies, e.g. T-MPLS (Transport MPLS), Provider Bridge, Q-in-Q, PBB (Provider Backbone Bridges), PBB-TE (Provider Backbone Bridges - Traffic Engineering), Ethernet, SDH and other.
With reference to FIG. 1 and FIG. 5 a method of recovering from a failure in a ringed network using dual homing protection towards the clients is presented. The ring topology has been chosen for its simplicity of description. In normal operating conditions one of the links towards the client, for example, a first link 102 connecting the client 106 with a first node 108 has the related port on node 108 in forwarding (i.e. active) state. The second link 104 connecting the client 106 with a second node 110 has the related port on node 110 in blocking state (i.e. stand-by, which term also covers a fail status). This means that all the traffic between the client and the network passes through the link whose ports are active, which is the first link 102, and the first node 108 connected to this link. If a fault develops in the first link 102 or in the first node 108 the fault is detected, in a preferred embodiment, by a Rapid Spanning Tree Protocol run by the client 106 and at least one of the nodes 108, 110. It must be noted that in the case of a link failure both nodes 108 and 110 can participate together with the client 106 in the RSTP procedure. If, however, it is the first network node 108 that failed, the RSTP procedure is carried out by the client 106 and the second network node 110.
In one embodiment the communications network 100 is a transport network made available by a provider and also known as a Provider Network.
The failure can be detected based on logic criteria or based on physical criteria. The physical criteria refer to detection of lack of connection on a physical layer (i.e. the link is down). Operation, Administration and Maintenance (OAM) messages or RSTP Bridge Protocol Data Unit that can be (in case of OAM) or are periodically sent between connected ports can be used to detect the failure. If such message is not received on a particular port of the client or the network node for n (typically three) consecutive times it indicates a failure on either the link connected to these ports or a device connected to said link. This is an example of detection of a failure based on logical criteria. The failure 202 that this invention is designed to cope with can develop in the link 102 connecting the client 106 to the node (this includes a fibre cut, a client port or card failure or a port or card failure on the Provider Network node), as illustrated in FIG. 2 or the failure may develop, 302, in the network node 108, as illustrated in FIG. 3.
Once the failure is detected the RSTP instances change 504 the status of the port related to the first link 102 from forwarding to discarding and the status of the port related to the second link 104 from discarding to forwarding. In response to the change of the status ot the ports related to links the node connected to the port related to link in forwarding state (i.e. the second node 110 connected to the second link 104) sends 506 to the node 112 connected to another network 114 a request to purge MAC address table of said node 112 connected to another network 114. In one embodiment the node 112 is connected to another part of the same client network rather than to another network 114. In yet another embodiment there may be more than one node connected to another network in the Provider Network 100.
In an embodiment of residential application the node 112 connected to another network 114 is called a head-end node and this is the node that connects the provider network to IP network (e.g. the Internet) and it is the head-end node 112 that is requested to purge its MAC address table. Please note that more complex network scenarios can actually apply where there are two head-end nodes. In this case both head-end nodes need to be required to purge their MAC address tables. In an alternative embodiment of a commercial application (e.g. corporate network based on Layer 2 Virtual Private Network) the request to purge MAC address table is sent 506 to all network nodes operating in said Virtual Private Network (VPN).
In the next step the MAC address table of the head-end node 112 is purged 508 in response to said request (residential application) and in the embodiment with the VPN application the MAC address tables of all network nodes operating in said VPN are purged.
In a preferred embodiment, in the step of purging 508 the MAC address table in the head-end node 112, only the entries related to the client 106 affected by the failure are deleted.
Because after deletion of the entries of the MAC address table, which are related to the client node 106, the head-end node will not know where to send the traffic coming from the other network 114 and whose destination is the client node 106 the head-end node 112 starts a learning phase by performing flooding 510. In the operation of flooding 510 the head-end node 112 multicasts the traffic for which it does not know what output port to use to reach its destination towards the nodes of the network involved in the same services, so that once it gets the related upstream traffic from one of its ports, the relevant entries can be inserted in the MAC address table. Same is applicable to all metro nodes 108, 110, 112 that have their MAC address tables purged in the case of Virtual Private Network.
In a preferred embodiment the flooding 510 is performed by the head-end node or the nodes operating in Virtual Private Network only when there is traffic to be sent to MAC addresses which are not in the MAC address table (included all those relevant to client 106).
Once the learning phase has been completed and the head-end node 112 (in the case of residential application) or the metro nodes 110 - 112 (in the case of VPN application) have their MAC address tables filled in with updated information the traffic 120, 122 to and from the client is directed 512 via the link having the related port in forwarding status, which is the situation illustrated in FIG. 4.
In the presented embodiment a Rapid Spanning Tree Protocol was used as an example. It is, however, equally possible to use other mechanisms like Spanning Tree Protocol (STP) or, even proprietary protocols, for the control of the dual homing protection scheme. The terminology used in Spanning Tree Protocol is slightly different and the active state of a port is known as "forwarding state" and the stand-by state of a port is known as "blocking state". The application of STP instead of RSTP should be clear for a person skilled in the art based on the description of embodiments given above.

Claims

1. A method of recovering from a failure of a link (102, 104) connecting a client (106) to a node (108, 110) or from a failure of a node (108, 110) in a communications network (100) using dual homing protection, said network (100) comprising a plurality of nodes (108 - 112) and at least one of said nodes (112) is connected to another network (114), a first node (108), of said plurality of nodes, is connected to the client (106) and a second node (110), of said plurality of nodes, is connected to the client (106), wherein one of the ports related to the links (102, 104) connecting the client (106) with the nodes (108, 110) is in an active state and the other port is in a stand-by state, the method comprises: a) detecting the failure (502); b) changing (504) the port status from active to stand-by and the other port from stand-by to active; c) in response to the change of the status from stand-by to active, sending (506) to the node connected to the another network (114), by the node whose port is in the active state, a request to purge its MAC address table; d) purging (508) the MAC address table of the node connected to the another network (114) in response to said request and performing flooding (510) in order to fill in the purged MAC address table with updated information; e) directing (512) traffic to and from the client (106) via the link having the related port in the active state.
2. The method according to claim 1, wherein in the step of purging (508) the MAC address table in the node connected to the another network (114) the entries related to the client (106) affected by the failure are deleted.
3. The method according to any one of preceding claims, wherein for the nodes operating in a Virtual Private Network the request to purge a MAC address table is sent (506) to every node operating in said Virtual Private Network.
4. The method according to any one of preceding claims, wherein the steps of detection (502) of the failure and changing the port status is carried out according to a Spanning Tree Protocol or a Rapid Spanning Tree Protocol.
5. The method according to claim 4, wherein the procedure according to Spanning Tree Protocol or a Rapid Spanning Tree Protocol is performed by the client (106) and at least one of the nodes (108, 110) connected to the client (106).
6. The method according to any one of preceding claims, wherein the flooding (510) is performed by the node connected to the another network (114) when there is traffic to be sent to the client.
7. The method according to claim 3, wherein the flooding (510) is performed by all the nodes operating in the Virtual Private Network.
8. The method according to claim 1, where the communications network (100) can be implemented in MPLS, T-MPLS, Provider Bridge, PBB, PBB-TE, Ethernet, SDH or other technology.
9. A communications network (100) using dual homing protection adapted to carry out recovery from a failure of a link (102, 104) connecting a client (106) to a node (108, 110) or from a failure of a node (108, 110), wherein the recovery is carried out according to the method of any one of claims 1 - 8.
PCT/EP2008/055180 2007-04-25 2008-04-28 Recovering from a failure in a communications network WO2008132203A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB0707915.5 2007-04-25
GB0707915A GB2448711A (en) 2007-04-25 2007-04-25 Recovering from a failure in a communications network

Publications (3)

Publication Number Publication Date
WO2008132203A2 true WO2008132203A2 (en) 2008-11-06
WO2008132203A3 WO2008132203A3 (en) 2009-01-15
WO2008132203A8 WO2008132203A8 (en) 2009-07-23

Family

ID=38135356

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2008/055180 WO2008132203A2 (en) 2007-04-25 2008-04-28 Recovering from a failure in a communications network

Country Status (2)

Country Link
GB (1) GB2448711A (en)
WO (1) WO2008132203A2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101930900B1 (en) * 2016-12-19 2018-12-20 주식회사 케이티 Apparatus and method for constructing connection information of optical network equipment

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101902382B (en) * 2009-06-01 2015-01-28 中兴通讯股份有限公司 Ethernet single ring network address refreshing method and system
US8102760B2 (en) * 2009-06-30 2012-01-24 Alcatel Lucent Method for reconvergence after failure in a dual-homing network environment
CN101964718B (en) * 2009-07-23 2015-09-16 中兴通讯股份有限公司 Ethernet dual homed link protection changing method and system
CN101989944B (en) 2009-07-31 2014-11-05 中兴通讯股份有限公司 Method for local protection of Ethernet tunnel and shared node of protection domain working segment
CN102006222B (en) * 2010-11-16 2015-06-24 中兴通讯股份有限公司 Service link switching method and service link switching device
CN102209037B (en) 2011-06-15 2014-03-26 华为技术有限公司 Media access control address switching method, network equipment and user equipment
CN107995111B (en) * 2016-10-26 2021-08-06 中兴通讯股份有限公司 Service forwarding method, link change notification method, convergence device and access device

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6202114B1 (en) * 1997-12-31 2001-03-13 Cisco Technology, Inc. Spanning tree with fast link-failure convergence
JP4021841B2 (en) * 2003-10-29 2007-12-12 富士通株式会社 Control packet processing apparatus and method in spanning tree protocol
JP4020753B2 (en) * 2002-10-25 2007-12-12 富士通株式会社 Ring switching method
WO2006065795A2 (en) * 2004-12-14 2006-06-22 Alcatel Lucent Ring rapid spanning tree protocol

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
ALI M ET AL: "Issues and approaches on extending ethernet beyond LANs" IEEE COMMUNICATIONS MAGAZINE, IEEE SERVICE CENTER, PISCATAWAY, US, vol. 42, no. 3, 1 March 2004 (2004-03-01), pages 80-86, XP011108916 ISSN: 0163-6804 *
CHIRUVOLU, F.; CARTIER, J.F.;: "Selective Customer TCN Snooping accross a Provider Domain"[Online] March 2003 (2003-03), pages 1-8, XP002499278 Retrieved from the Internet: URL:http://www.ieee802.org/1/files/public/docs2003/IEEE_BPDU_handling_v5.pdf> [retrieved on 2008-10-10] *
MARC LASSERRE VACH KOMPELLA (EDITORS): "Virtual Private LAN Services over MPLS; draft-ietf-l2vpn-vpls-ldp-07.txt" IETF STANDARD-WORKING-DRAFT, INTERNET ENGINEERING TASK FORCE, IETF, CH, vol. l2vpn, no. 7, 1 July 2005 (2005-07-01), XP015041095 ISSN: 0000-0004 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101930900B1 (en) * 2016-12-19 2018-12-20 주식회사 케이티 Apparatus and method for constructing connection information of optical network equipment

Also Published As

Publication number Publication date
WO2008132203A8 (en) 2009-07-23
GB2448711A (en) 2008-10-29
GB0707915D0 (en) 2007-05-30
WO2008132203A3 (en) 2009-01-15

Similar Documents

Publication Publication Date Title
US9100269B2 (en) Provisioned provider link state bridging (PLSB) with routed back-up
US10623307B2 (en) Method and system for asymmetric redundancy mechanisms in multi-homed network access topologies
US9172630B2 (en) Method for client data transmission through a packet switched provider network
JP5548673B2 (en) Redundant Ethernet automatic protection switching access to virtual private LAN services
US8488444B2 (en) Fast remote failure notification
US7610360B1 (en) Transient tolerant verification of communications paths between devices
EP2498454A1 (en) Method, device and system for processing service traffic based on pseudo wires
US8724452B2 (en) Technique for protecting communication traffic in a connection having redundancy
US20150334006A1 (en) Method to do fast traffic switchover based on server layer status
US20080031129A1 (en) Smart Ethernet edge networking system
US20130272114A1 (en) Pseudo wire switching method and device
WO2008132203A2 (en) Recovering from a failure in a communications network
US8787398B2 (en) Linear route protection
WO2007144870A1 (en) Technique for providing interconnection between communication networks
Hariyawan Comparison analysis of recovery mechanism at MPLS network
EP2129042A1 (en) A multicast network system, node and a method for detecting a fault of a multicast network link
US7680923B1 (en) Connectivity assessment for label distribution protocol (LDP) networks
US11121964B2 (en) Data path retention during control plane failures in a multiprotocol label switching network
Cavendish et al. Operation, administration, and maintenance in MPLS networks
Santos et al. Improving carrier ethernet recovery time using a fast reroute mechanism
James Applying ADM and OpenFlow to Build High Availability Networks
Tomar et al. MPLS-A Fail Safe Approach to Congestion Control
Northcote The Bi-Mesh Survivable Network–Fast Recovery from Node Failure in MPLS enabled Networks
Hussain et al. Network Resilience in Multiprotocol Label Switching
Sprecher et al. MPLS-TP Ring Protection draft-weingarten-mpls-tp-ring-protection-03. txt

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08749802

Country of ref document: EP

Kind code of ref document: A2

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 08749802

Country of ref document: EP

Kind code of ref document: A2