METHOD AND SYSTEM FOR RING TOPOLOGY DISCOVERY AND FORWARDING DATABASE FLUSH NULLIFICATION
A method and system for rerouting data in a communication network ring. The ring includes a plurality of nodes and a plurality of links. Each node includes a first port and a second port. Each first port is connected to a neighboring second port through a link of the plurality of links. The topology of the communication network ring is discovered and a forwarding database table is populated with static entries according to the discovered topology. Upon receiving notice of a failed link, which includes a source address of a node adjacent to the failed link, the topology and the source address of the node adjacent to the failed link is used to reconfigure the forwarding database table. Data is forwarded using the reconfigured forwarding database table without flooding the ring.
Latest NORTEL NETWORKS LIMITED Patents:
This application is a Continuation of U.S. patent application Ser. No. 12/347,362 entitled “Ring Topology Discovery Mechanism” filed Dec. 31, 2008, the entirety of which is incorporated herein by reference.
STATEMENT REGARDING FEDERALLY SPONSORED RESEARCH OR DEVELOPMENTn/a
FIELD OF THE INVENTIONThe present invention relates generally to communication networks, and more specifically to a method and system for ring topology discovery in a communication network.
BACKGROUND OF THE INVENTIONEthernet Ring Protection (“ERP”), as standardized according to International Telecommunication Union (“ITU”) specification ITU-T G.8032, defines an effort to provide sub-50 ms protection for Ethernet traffic in a ring topology while simultaneously ensuring that no loops are formed at the Ethernet layer. Using the ERP standard, there is a central node called the Ring Protection Link (“RPL”) owner node which blocks one of the ports, known as the RPL port, to ensure that no loop forms for the Ethernet traffic. Ring Automated Protection Switching (“R-APS”) messages are used to coordinate the activities of switching the RPL link on or off. Ethernet Shared Protection Ring (“E-SPRing”) is one instantiation, i.e. one embodiment, of the ERP standard.
Any failure along the ring triggers an R-APS Signal Fail message, also known as a Failure Indication Message (“FIM”), along both directions from the nodes adjacent to the failed link after these nodes have blocked the port facing the failed link. On obtaining this message, the RPL owner node unblocks the RPL port. Because at least one link has failed somewhere in the ring, that there can be no loop formation in the ring. During the recovery phase, when the failed link gets restored, the nodes adjacent to the restored link send RAPS No Request messages, also known as a Recovery Indication Messages (“RIM”). Upon obtaining a RIM message, the RPL owner blocks the RPL port and sends an R-APS OK message, which causes all other nodes, other than the RPL owner node in the ring to unblock all blocked ports.
The E-SPRing protocol is robust enough to work for unidirectional failure and in case of multiple failures in the ring. However, there is currently no mechanism provided by the E-SPRing protocol, i.e., ITU-T G.8032, to determine the actual Ring Topology, i.e., the nodes and links that form the ring.
Ring topology is required to perform ring topology validation. In other words, when a service provider provisions and/or configures a ring, a tool is needed to validate that the actual configuration is what was expected. In addition, if/when a ring failure occurs, the service provider or repair technician has no convenient means to determine exactly where the fault occurs.
Additionally, when a fault or topology change occurs, each node temporarily clears or “flushes” its current Forwarding Database (“FDB”), a table which contains the routing configuration from the point of view of the current node. If data arrives at a node for forwarding during the time interval between the FDB flushing and establishing a new FDB, the node does not know exactly how to forward the data. In this case, the node simply “floods” the ring by forwarding the data through each port resulting in poorer ring bandwidth utilization during a ring protection and recovery event.
Therefore, what is needed is a method and system for discovering the topology composition of Ethernet rings and to update data forwarding tables upon Protection and Recover switching without flooding the network.
SUMMARY OF THE INVENTIONThe present invention advantageously provides a method, apparatus and system for automatically rerouting data in a communication network ring when a link in the ring fails. Additionally, an automatic topology mechanism may be used to reconfigure the forward database tables upon notification of a failed or recovered link without flooding the communication network ring.
In accordance with one aspect of the present invention, a method is provided for rerouting data in a communication network ring. The ring includes a plurality of nodes and a plurality of links. Each node includes a first port and a second port. Each first port is connected to a neighboring second port through a link of the plurality of links. The topology of the communication network ring is discovered and a forwarding database table is populated with static entries according to the discovered topology. Upon receiving notice of a failed link, which includes a source address of a node adjacent to the failed link, the topology and the source address of the node adjacent to the failed link is used to reconfigure the forwarding database table. Data is forwarded using the reconfigured forwarding database table.
In accordance with another aspect of the present invention, a node of a communication network ring includes a first port, a second port and a processor. The ring includes a plurality of nodes. Each first port is connected to a neighboring second port through a link. Each of the first port and the second port are operable to receive and transmit data. The processor is electrically connected to each port. The processor operates to determine the topology of the ring and to populate a forwarding database table with static entries according to the topology. Responsive to receiving notice of a failed link, which includes a source address of a node adjacent to the failed link, the processor further operates to use the topology and the source address of the node adjacent to the failed link to reconfigure the forwarding database table. Data is forwarded using the reconfigured forwarding database table.
In accordance with yet another aspect of the present invention, a system for rerouting data a communication network ring includes a plurality of nodes interconnected in a ring configuration. Each node includes a first port, a second port and a processor. Each port is operable to receive and transmit data. The processor is electrically connected to each port. The processor operates to determine the topology of the ring and populate a forwarding database table with static entries according to the topology. Responsive to receiving notice of a failed link, which includes a source address of a node adjacent to the failed link, the processor further operates to use the topology and the source address of the node adjacent to the failed link to reconfigure the forwarding database table, refrain from flooding the ring and forward data using the reconfigured forwarding database table.
A more complete understanding of the present invention, and the attendant advantages and features thereof, will be more readily understood by reference to the following detailed description when considered in conjunction with the accompanying drawings wherein:
Before describing in detail exemplary embodiments that are in accordance with the present invention, it is noted that the embodiments reside primarily in combinations of apparatus components and processing steps related to implementing a system and method for automatically discovering ring topology in an Ethernet-Shared Protection Ring and using the topology to prevent forward database flushing. Accordingly, the system and method components have been represented where appropriate by conventional symbols in the drawings, showing only those specific details that are pertinent to understanding the embodiments of the present invention so as not to obscure the disclosure with details that will be readily apparent to those of ordinary skill in the art having the benefit of the description herein.
As used herein, relational terms, such as “first” and “second,” “top” and “bottom,” and the like, may be used solely to distinguish one entity or element from another entity or element without necessarily requiring or implying any physical or logical relationship or order between such entities or elements.
Embodiments of the present invention provide different mechanisms that may be used in coordination with the Ethernet Ring Protection (“ERP”) protocol defined by ITU-T G.8032 to determine the ring topology. Ring topology is used for general operations, administration and maintenance (“OAM”) functions such as, but not limited to ring topology confirmation and ring topology fault discovery.
One embodiment of the present invention extends ITU-T G.8032 Ethernet Ring Automated Protection Switching (“R-APS”) messages over the ring to optionally piggyback topology information. This mechanism specifies how each ring node embeds unique ring node signature information in various R-APS messages. The R-APS messages provide a cumulative view of ring node signatures, allowing each ring node to determine the overall ring topology.
Another embodiment of the present invention utilizes per hop IEEE 802.1ag or ITU-T Y.1731 continuity check protocol messages over the ring. This mechanism introduces a G.8032 R-APS message, which is a type of continuity check message (“CCM”) that circulates the ring. At each hop, a ring node inserts a ring node signature in the R-APS CCM being circulated around the ring.
Yet another embodiment of the present invention utilizes the IEEE 802.1ag or ITU Y.1731 Linktrace protocol over the ring. This mechanism extends and leverages the 802.1ag/Y.1731 LinkTrace protocol by using the time-to-live parameters returned in Link Trace Reply (“LTR”) messages to determine the relative position of each node in the ring, i.e., number of hops away from a requesting node.
Using the ring topology discovery mechanisms, an embodiment of the present invention prevents the need to flush the ring node Forwarding Databases (“FDBs”) during a protection and recovery switch. When the ring is supported over an encapsulated network, as defined by IEEE specification 802.1ah, also known as “MAC in MAC,” ring nodal extensions may be applied such that no flushing of the FDB is required, thereby significantly improving the overall bandwidth utilization of the ring.
Referring now to the drawing figures in which like reference designators refer to like elements, there is shown in
The nodes 12 may include wireless access points, routers, switches, gateways or any other device commonly known to support bridging functions in a communication network. Each node 12 may also be connected to one or more client devices (not shown) and routes data packets between client devices along the ring using commonly used communication protocols such as Transmission Control Protocol/Internet Protocol (“TCP/IP”), Ethernet, etc. Of note, although several of the figures show four, five or six nodes 12, it is understood that the amount of nodes 12 shown are solely to aid explanation. A network 10, constructed in accordance with the principles of the present invention, may have any number of nodes 12, as long as the nodes are interconnected in a ring configuration.
In
Referring now to
The non-volatile memory 26 includes a data memory 28 and a program memory 30. Examples of non-volatile memory include, but are not limited to, a hard drive, a memory stick, an Electrically Erasable Programmable Read-Only Memory (“EEPROM”), a flash memory, etc. Additionally, instead of or in addition to non-volatile memory, the data memory 28 may be included as some form of volatile memory, e.g., RAM. The program memory 30 contains a route director 32 which determines the routing topology of the E-SPRing ring 10 and maintains two state topology tables: an active state topology table 34 and a normal state topology table 36. The operation of the route director 32 is discussed in more detail below. The data memory 28 stores data files such as the active state topology table 34, the normal state topology table 36, forwarding database (“FDB”) tables 37 and various other user data files (not shown).
The normal state topology table 36 contains the topology of the E-SPRing ring 10 when there are no faults on the ring 10. This table 36 coincides with the “Normal State” specified in ITU-T G.8032. The normal state topology table 36 is only updated when an “OK” message is received on both ports, p1 14 and p2 16. Otherwise, the values in the table 36 are persistent.
The active state topology table 34 contains the topology change in the E-SPRing ring 10 when at least one or more faults have occurred or are in recovery. These conditions coincide with the “Protect State” and “Pending State” specified in ITU-T G.8032. The purpose of the active state topology table 34 is to facilitate advanced topology reporting, and to reduce potential processing in maintaining topology information. In the absence of faults, the active state topology table 34 is ignored.
The FDB tables 37 instruct each node 12 as to which port 14, 16 to use to forward data to other nodes in the ring 10. The FDB tables 37 are not to be confused with the topology tables 34, 36.
Referring now to
An exemplary Ethernet Ring Topology Discovery TLV 38, constructed in accordance with the principles of the present invention, is provided in
Returning to
The exemplary operational flowchart of
The methodology described above in relation to an E-SPRing NORMAL state may be similarly applied to detect a fault in the ring. Referring now to
Beginning at step S124, the route director 32 of each node adjacent to a failed link initiates an R-APS “FIM” message, such as one specified in ITU-T G.8032. In the control flow diagram of
“FIM” message (step S132) and the communication interface 22 forwards the “FIM” message out the port opposite the fault, e.g., failed link 52, such as one specified by ITU-T G.8032 (step S134).
Turning now to
When the failed link 52 has been reestablished, the procedures of
Although described above in relation to the E-SPRing protocol, application of this mechanism and the R-APS message extensions may be applied to any Ring based protocol.
Referring now to
This embodiment advantageously uses the Time-to-Live (“TTL”) field 66 of the LTM 58 to determine the relative distance of each node 12 in the Ethernet Ring 10 from an originating node. An initiating node, e.g., node F 12f in
An originating node creates an LTM 58 and transmits the LTM 58 out both ports 14, 16. When the neighboring nodes receive the LTM 58, each node decrements the TTL value, creates a LTR 70 having the same TTL value as the current LTM 58, transmits the LTR 70 through the same port that received the LTM 58, and forwards the LTM 58 on to the next neighboring node in the ring 10. When a non-originating node receives an LTR 70 from a neighboring node, it decrements the TTL value and forwards the LTR 70 through the opposite (mate) port, back toward the originating node.
Referring now to
H=(TTLLTM−TTLLTR)/2. (1)
When all of the nodes in the ring have responded (step S158), the initiating node determines the overall ring topology using the hop count, the MAC address of the source device and the port through which the LTR was received (step S160).
As an example, referring back to
When node E 12e receives the LTM 58, it replies in the same fashion as node A 12a, but also forwards the LTM 58 on to neighboring node D 12d. As above, node F 12f now knows that node E 12e is 1 hop away through port p2. When node D 12d receives the LTM 58, it decrements the TTL value again (TTL=253), returns a LTR 70 to node E 12e having a TTL value that is equal to the current TTL value, i.e., 253, and forwards the LTM 58 to node C 12c. When node E 12e receives the LTR 70 from node D 12d, it decrements the TTL value (TTL=252) and forwards the LTR 70 on to node F 12f. Again, node F 12f decrements the TTL value (TTL=251) and calculates the hop count (H=(255−251)/2=2). This process continues until node F 12f has discovered every node in the ring and determined the position of each node.
Referring now to
A RingTrace TLV within the AD_CCM contains the listing of nodes discovered on the ring. An exemplary RingTrace TLV 74 is shown in
Referring now to
Referring to
Turning now to the auto-discovery routine shown in
Referring now to
If there are more nodes remaining in the TLV (step S202), i.e., 2 or more nodes reported in the TLV, and if the current node being processed is in the second half of the reported nodes (step S204), then the current node is added to the topology database as existing out the port from which the message was transmitted (step S206), i.e., Address=AD_CCM source address, VID=AD_CCM VID, and Port=AD_CCM Tx port. The index value is incremented to go to the next reported node in the TLV (step S208). If there are more nodes in the TLV (step S202), continue (“NO” branch), otherwise stop and report the discovered topology (“YES” branch“). Returning to decision block S204, if the current node being processed is in the first half of the reported nodes, the node is added to the topology database as existing out the port from which the message was received (step S210), i.e., Address=AD_CCM source address, VID=AD_CCM VID, and Port=AD_CCM Rx port. As before, the index value is incremented to go to the next reported node in the TLV (step S208), and if there are more nodes in the TLV (step S202), continue (“NO” branch), otherwise stop and report the discovered topology (“YES” branch”).
The embodiments described above may be used in combination with a method of Protection and Recovery switching that prevents flooding of the ring without flushing the forwarding tables 37.
When the forwarding tables 37 have been reconstructed to account for the break 84, as shown in
Referring now to
When a failure occurs, as shown in
The present invention can be realized in hardware, software, or a combination of hardware and software. Any kind of computing system, or other apparatus adapted for carrying out the methods described herein, is suited to perform the functions described herein.
A typical combination of hardware and software could be a specialized or general purpose computer system having one or more processing elements and a computer program stored on a storage medium that, when loaded and executed, controls the computer system such that it carries out the methods described herein. The present invention can also be embedded in a computer program product, which comprises all the features enabling the implementation of the methods described herein, and which, when loaded in a computing system is able to carry out these methods. Storage medium refers to any volatile or non-volatile storage device.
Computer program or application in the present context means any expression, in any language, code or notation, of a set of instructions intended to cause a system having an information processing capability to perform a particular function either directly or after either or both of the following a) conversion to another language, code or notation; b) reproduction in a different material form.
In addition, unless mention was made above to the contrary, it should be noted that all of the accompanying drawings are not to scale. Significantly, this invention can be embodied in other specific forms without departing from the spirit or essential attributes thereof, and accordingly, reference should be had to the following claims, rather than to the foregoing specification, as indicating the scope of the invention.
Claims
1. A method for rerouting data in a communication network ring, the ring including a plurality of nodes, each node including a first port and a second port, each first port connected to a second port of a neighboring node through a link of the plurality of links, the method comprising:
- discovering a topology of the communication network ring;
- populating static entries in a forwarding database table according to the discovered topology;
- receiving notice of a failed link, the notice including a source address of a node adjacent to the failed link;
- using the topology and the source address of the node adjacent to the failed link to reconfigure the forwarding database table; and
- forwarding data using the reconfigured forwarding database table.
2. The method of claim 1, wherein discovering the topology of the communication network ring comprises:
- receiving at least one of a ring topology request and a response to the ring topology request from at least one node on the ring, the at least one of the ring topology request and the response to the ring topology request including an identification of the at least one node and a hop count needed to reach the at least one node;
- forwarding the at least one of the ring topology request and the response to the ring topology request to at least one neighboring node on the ring through the first port; and
- determining the topology based on the identification of the at least one node, the hop count, and an identification of the first port.
3. The method of claim 2, wherein the ring topology request is a Ring Automated Protection Switching message, the Ring Automated Protection Switching message including a type-length-value element, the method further comprising:
- receiving a ring topology request at the first port and the second port;
- modifying each ring topology request by adding an identification of a receiving node to the type-length-value element and incrementing the node count; and
- forwarding each modified ring topology request to the neighboring node through the other of the first port and the second port than the port on which the ring topology request was received.
4. The method of claim 2, wherein the at least one ring topology request is a Ring Automated Protection Switching message, the method further comprises:
- creating the at least one ring topology request by adding a type-length-value element to the Ring Automated Protection Switching message, the type-length-value element including a node signature for an originating node and the hop count; and
- initializing the hop count.
5. The method of claim 4, wherein the ring topology request is forwarded through the first port and the second port, and further wherein receiving at least one response to the ring topology request comprises:
- receiving a response at first port and the second port, each response having been forwarded through the ring from the other of the first port and the second port from which the response was received, each response including a total node count of all the nodes in the ring and an identification of each node in the ring arranged in an order of processing.
6. The method of claim 2, further comprising creating the ring topology request in response to detecting a failure of a link connected to the other of the first port and the second port from which the response was received the transmitting port.
7. The method of claim 2, wherein the ring topology request is a LinkTrace message, the LinkTrace message including a time-to-live value, the method further comprising:
- inserting a ring identifier into the LinkTrace message, the ring identifier being a group address used to keep the ring topology request local to the ring;
- receiving a plurality of LinkTrace responses, each LinkTrace response originated by one of the nodes of the plurality of nodes of the ring, each LinkTrace response including an identification of the originating node; and
- wherein the indication of a node count needed for the ring topology request to reach the at least one responding node is a time-to-live value.
8. The method of claim 7, wherein the node count needed for the ring topology request to reach the at least one responding node is equal to one half of a difference between the time-to-live value of the LinkTrace message and the time-to-live value of the LinkTrace response.
9. The method of claim 2, wherein the ring topology request is a continuity check message, the continuity check message including a listing of identifications of nodes having previously received continuity check message, the method further comprising:
- receiving the ring topology request at one of the first port and the second port;
- modifying the ring topology request by appending an identification of a receiving node to listing of identifications of nodes having previously received continuity check message and incrementing the node count; and
- forwarding the modified ring topology request to the neighboring node through the other of the first port and the second port on which the ring topology request was received.
10. The method of claim 2, wherein the ring topology request is a continuity check message, the method further comprising:
- receiving a modified ring topology request through the other of the first port and the second port on which the ring topology request was transmitted, the modified ring topology request including a listing of identifications of nodes having previously received continuity check message in an order of processing and a total node count of all nodes on the ring.
11. A node of a communication network ring, the ring including a plurality of nodes, the node comprising:
- a first port and a second port, each first port connected to a second port of a neighboring node through a link, each port operable to receive and transmit data; and
- a processor electrically connected to each port, the processor operates to:
- determine a topology of the ring;
- populate static entries in a forwarding database table according to the topology; and
- responsive to receiving notice of a failed link, the notice including a source address of a node adjacent to the failed link, the processor further operates to:
- use the topology and the source address of the node adjacent to the failed link to reconfigure the forwarding database table; and
- forward data using the reconfigured forwarding database table.
12. The node of claim 11, wherein at least one of the first port and the second port receives at least one of a ring topology request and a response to the ring topology request from at least one other node on the ring, the at least one of the ring topology request and the response to the ring topology request including an identification of the at least one other node and a hop count needed to reach the at least one other node, the other of the first port and the second port than the port on which the at least one of a ring topology request and a response to the ring topology request was received is operable to forward the at least one of a ring topology request and a response to the ring topology request to at least one neighboring node on the ring.
13. The node of claim 12, wherein the processor determines the topology based on the identification of the at least one node, the hop count, and an identification of the forwarding port.
14. The node of claim 12, wherein the ring topology request is a Ring Automated Protection Switching message, the Ring Automated Protection Switching message including a type-length-value element,
- each port further receives a ring topology request; and
- the processor further: modifies each ring topology request by adding an identification of a receiving node to the type-length-value element and incrementing the node count; and forwards the modified ring topology request to the neighboring node through the other of the first port and the second port than the port on which the ring topology request was received.
15. The node of claim 12, wherein the at least one ring topology request is a Ring Automated Protection Switching message, the processor further creates the at least one ring topology request by:
- adding a type-length-value element to the Ring Automated Protection Switching message, the type-length-value element including a node signature for the node and the hop count; and
- initializing the hop count.
16. The node of claim 15, wherein the ring topology request is forwarded through both ports, receiving at least one response to the ring topology request comprises:
- receiving a response at each of the first port and the second port, each response having been forwarded through the ring from the opposite port, each response including a total node count of all the nodes in the ring and an identification of each node in the ring arranged in an order of processing.
17. The node of claim 12, wherein the ring topology request is a LinkTrace message, the LinkTrace message including a time-to-live value, the processor further inserts a ring identifier into the LinkTrace message, the ring identifier being a group address insuring that the ring topology request remains local to the ring; and
- at least one of the first port and the second port further receives a plurality of LinkTrace responses, each LinkTrace response originated by one of the nodes of the plurality of nodes of the ring, each LinkTrace response including an identification of the originating node; and
- wherein the indication of a hop count needed for the ring topology request to reach the at least one responding node is a time-to-live value.
18. The node of claim 17, wherein the hop count needed for the ring topology request to reach the at least one responding node is equal to one half of a difference between the time-to-live value of the LinkTrace message and the time-to-live value of the LinkTrace response.
19. The node of claim 12, wherein the ring topology request is a continuity check message, at least one port further receives a modified ring topology request through the other of the first port and the second port on which the ring topology request was transmitted, the modified ring topology request including a listing of identifications of nodes having previously received continuity check message in an order of processing and a total node count of all the nodes on the ring.
20. A system for rerouting data in a communication network ring, the system comprising:
- a plurality of nodes interconnected in a ring configuration, each node including: a first port and a second port, each port operable to receive and transmit data; and a processor electrically connected to each port, the processor operating to: determine a topology of the ring; populate static entries in a forwarding database table according to the topology; and responsive to receiving notice of a failed link, the notice including a source address of a node adjacent to the failed link, the processor further operating to: use the topology and the source address of the node adjacent to the failed link to reconfigure the forwarding database table; and forward data using the reconfigured forwarding database table.
Type: Application
Filed: Oct 20, 2009
Publication Date: Jul 1, 2010
Applicant: NORTEL NETWORKS LIMITED (Saint-Laurent)
Inventors: Marc HOLNESS (Nepean), Bashar ABDULLAH (Ottawa), Marc Andre ROCHON (Gatineau)
Application Number: 12/581,944
International Classification: G06F 11/00 (20060101);