WO2003062842A1 - Gestion d'architectures de reseaux virtuels - Google Patents
Gestion d'architectures de reseaux virtuels Download PDFInfo
- Publication number
- WO2003062842A1 WO2003062842A1 PCT/US2003/002087 US0302087W WO03062842A1 WO 2003062842 A1 WO2003062842 A1 WO 2003062842A1 US 0302087 W US0302087 W US 0302087W WO 03062842 A1 WO03062842 A1 WO 03062842A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- ring
- channel
- node
- signal
- sonet
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/14—Relay systems
- H04B7/15—Active relay systems
- H04B7/185—Space-based or airborne stations; Stations for satellite systems
- H04B7/18528—Satellite systems for providing two-way communications service to a network of fixed stations, i.e. fixed satellite service or very small aperture terminal [VSAT] system
Definitions
- This invention relates to managing virtual network architectures.
- a consideration in building telecommunications networks is providing connectivity between multiple customer locations across a metro and/or long haul telecommunications infrastructure.
- two types of mechanisms have traditionally been used - private lines and Frame Relay/ATM services.
- Point-to-point private lines have been deployed to provide connectivity between multiple locations.
- Providing any-to-any connectivity between multiple customer locations requires private lines between all locations.
- N*(N-l)/2 For a customer with "N" nodes, the number of private lines required is N*(N-l)/2.
- Frame Relay networks have emerged as a method of connecting multiple sites together.
- Frame Relay technology allows multiple sites to be connected over a backbone Frame Relay and/or ATM switching network, which eliminates dedicated private lines between locations.
- a disadvantage of the conventional approach is the cost of maintaining both the Frame Relay/ ATM backbone infrastructure and the transport infrastructure.
- a virtual ring network and a method for providing services over the virtual ring network are identified.
- a virtual network ring is established and a transparent local area network service (TLS) is established based on the virtual network ring.
- TLS transparent local area network service
- Ethernet can be extended over a wide area, with little or no changes to the metro or core infrastructure.
- a private local area network can be mimicked across a wide geographic area.
- Figure 2 illustrates a four node virtual ring.
- Figure 3 illustrates a single STS-1 virtual ring.
- Figure 4 illustrates multiple virtual rings.
- Figure 5 illustrates a virtual ring failover.
- Figure 6 illustrates counter-rotating rings.
- Figure 7 illustrates a transparent local area network services implementation.
- Ethernet is used as interface technology between a corporate or local area network (LAN) and a wide area network (WAN). Ethernet allows the carrier to provide tunable bandwidth services, multi-service capabilities, and multi-protocol support over a single interface. Ethernet is a multi-point technology, but mapping Ethernet into private line and/or Frame Relay services does not fully utilize the embedded capabilities of Ethernet.
- a goal is to extend the capabilities of Ethernet across a metro or a wide area network while utilizing an existing SONET/SDH infrastructure.
- Virtual Ethernet Rings technology allows the carriers to extend the benefits of Ethernet over a wide area.
- Virtual Ethernet Rings technology does not require changing the metro or core infrastructure, and may be based on deployment technology described below in a description of deploying multipoint packet services over SONET/SDH.
- Virtual Ethernet Rings provide an architecture that simplifies and lowers the cost to deliver next generation data services. Based on a solution that fully integrates Ethernet with existing SONET/SDH networks in a "Virtual Ethernet Ring", carriers can provide an extensive multipoint Ethernet service, e.g., a service that can span the globe.
- the Virtual Ethernet Rings technology extends the features of a customer's Ethernet LAN — including ease of use, low cost and scalable connectivity — over a reliable SONET/SDH path that is implemented in an extended ring to allow LAN-like, any-to-any connectivity among many customer sites.
- the Virtual Ethernet Rings technology extends plug and play advantages of
- Ethernet - including auto-provisioning, broadcast and discovery - across a distributed wide area network. It provides the advantage of granular, software-provisioned bandwidth to the customer. It also protects SONET/SDH quality resilience in a dedicated path that is secure and bandwidth guaranteed.
- the customer's sites can connect to the Virtual Ethernet Ring through a standard
- Ethernet interface - in any specified amount of bandwidth. Once connected, any user can reach others via standard Ethernet mechanisms.
- the customer effectively has a WAN- extended Ethernet broadcast domain that provides reliable and cost-effective communication among its corporate sites.
- the bandwidth of the ring can also be provisioned in nearly any amount. (For example, a customer might purchase a 5Mbps, 10 Mbps, or 50 Mbps ring connecting L.A., Seattle, Houston, Chicago, New York and Atlanta.) This provisioning flexibility allows customers to pay as they grow. Carriers benefit from the ability to share and derive more revenue from an existing network infrastructure. Accordingly, Virtual Ethernet Rings technology is a significant step beyond early
- Ethernet over SONET/SDH solutions that have been limited to point-to-point Ethernet connections offering coarse quality of service, inadequate security and slow restoration times.
- the carrier value is at least two fold. First, the carrier is able to grow revenue with a competitive service that meets customer need for low cost, diverse connectivity. Second, the carrier is able to integrate this Ethernet service directly into the existing SONET/SDH network. Complex service provisioning mechanisms are eliminated or nearly eliminated. At the same time, the requirement to install, maintain, and expand a separate service overlay is removed or greatly reduced.
- Virtual Ethernet Rings technology is as easy or nearly as easy for a service provider to set up and deploy as Ethernet.
- the customer experiences the same advantage, with a service connection that appears the same or nearly the same as any other Ethernet connection.
- Virtual Ethernet Ring is advantageous relative to the complexity that carriers have faced in deploying other methods of data services.
- Popular data services including Frame Relay and ATM, have traditionally been built as overlays to an existing SONET/SDH network.
- Early generation Transparent LAN services were built as Ethernet over IP over ATM over SONET/SDH networks.
- a conventional configuration that runs Ethernet over another network technology can add unnecessary complexity and overhead, and can insert another layer to be managed in the network.
- Each network layer entails separate equipment, separate operational, and management frameworks, and likely a separate staff.
- Metro Ethernet solutions are limited by the requirement to overlay an existing SONET/SDH network with point-to-point Packet over SONET connections (often not supported), a dedicated wavelength (expensive), or a best-effort IP network to handle long-haul connectivity. Metro Ethernet solutions are also not yet ready as a scalable, resilient, carrier-class service-delivery mechanism.
- each customer is given its own private Ethernet broadcast domain that makes full use of Ethernet's multipoint capabilities.
- Customers are not required to buy an expensive mesh of private-line circuits to link sites. Instead, a customer buys a ring that is actually constructed as a series of shorter SONET/SDH paths that enable full, reliable connectivity across the WAN.
- a Virtual Ethernet Ring extends the advantages of a virtual LAN (VLAN) — including broadcast, discovery, and multipoint capabilities — across a wide area SONET/SDH infrastructure.
- VLAN virtual LAN
- the technologies required include:
- the Virtual Ring itself is provisioned as a series of SONET/SDH paths that interconnect network sites in a logical ring configuration.
- a provisioning tool that can be integrated into a carrier's existing operations support system
- OSS a series of SONET/SDH paths are provisioned to create the logical ring.
- carriers need only define the members of the Virtual Ethernet Ring through a port and service identification process.
- the Virtual Ethernet Ring can be offered at nearly any explicit bandwidth rate, with scale from 1 kbps to 1 Gbps.
- a customer can be given a premium service that is constructed as a physically secure, dedicated virtual tributary/tributary unit (VT/TU) or synchronous transport signal/administrative unit (STS/AU) path through the network, with many of the advantages of a dedicated private line.
- VT/TU virtual tributary/tributary unit
- STS/AU synchronous transport signal/administrative unit
- Each customer site enters the ring through a standard Ethernet interface.
- Customers may modify or change the use of their own bandwidth, again working with a network management interface.
- Customers are free to make advantageous use of the bandwidth, e.g., by changing time-of-day allocations or burst rates.
- SONET/SDH quality sub-50 msec protection may be provided for some or all of the Virtual Ethernet Ring using resilient packet ring and Optical Data Protection (ODP) technology.
- ODP Optical Data Protection
- SONET/SDH rings and is compatible with existing SONET/SDH protection mechanisms that allow the network to heal from any point or nearly any point.
- This capability helps to reduce the need for expensive overlay networks and helps to eliminate scaling issues by rendering Ethernet a global transport.
- carriers may achieve a single platform to deliver voice or data traffic over private lines, Ethernet, or SONET/SDH.
- a Virtual Ethernet Ring serves as a network architecture and service delivery mechanism.
- the network architecture allows existing services to be deployed over the Virtual Ethernet Ring architecture. Because some services can be deployed over the architecture, the Virtual Ethernet Ring is also a service.
- each element on the ring is both physically and logically connected to another element on the same ring.
- the ring is self contained and no "non-ring" elements exist on the ring.
- network elements on the same ring do not have to be physically connected.
- Nodes in a Virtual Ethernet Ring can be "virtually" connected at the SONET/SDH path layer.
- One or more standard SONET/SDH Network Element can be used to connect the nodes on a Virtual Ethernet Ring (which is able to pass SONET/SDH paths through).
- Figure 1 illustrates a conceptual example of the Virtual Ethernet Ring.
- Six Network Elements 112-117 are connected in a Virtual Ring. Some of the elements are physically connected; others are indirectly connected through a SONET/SDH network.
- the SONET/SDH network can be a metro, long haul, or international network.
- a Virtual Ethernet Ring has virtually no distance or geographic boundaries.
- Node 4 is not directly connected to any other node in the Virtual Ring.
- the nodes are connected at the SONET/SDH path level - the example in Figure 1 shows a STS path (generally a path with both directions of transmission being provided).
- Any standard SONET/SDH network carries the SONET/SDH path containing data traffic between nodes of an Optical Services Activation PlatformTM (OSAPTM).
- the SONET/SDH "cloud” includes almost any type and mixture of SONET/SDH equipment, e.g., ADMs, DCSs.
- the OSAPs/NEs use Appian's Optical Data Protection (ODP) technology to provide protection for the Virtual Ethernet Ring.
- ODP techniques and principles are described in International Publication Number WO 01/78276 Al (entitled DATA PROTECTION IN A RING NETWORK).
- An advantage of this approach is that the intermediate SONET/SDH cloud is not required to provide any protection (unless the carrier desires additional layers of protection).
- ODP the same physical paths are provisioned through the SONET/SDH network between OSAPs and the OSAP performs ODP based on failures throughout the network (based on SONET/SDH path level indicators).
- the Virtual Ethernet Ring 1. Provides the ability to share a SONET/SDH path across multiple OSAPs potentially located on different rings and/or diverse geographic locations; 2. Provides multipoint and point-to-point services over a metro or wide area network; 3. Enables both dedicated Ethernet and shared Ethernet services; 4. Uses the existing SONET/SDH infrastructure;
- Each Virtual Ring can connect to different locations;
- Figure 2 helps to illustrate how a Virtual Ethernet Ring works and the benefits that are provided.
- Figure 2 shows a simple example 210 of a four node Virtual Ethernet Ring.
- four standalone OSAPs are located at geographically diverse locations in the network.
- OSAP#l is an OC-3 element
- OSAP#2 and OSAP#3 are OC-48 elements
- OSAP#4 is an OC-12 element.
- each OSAP is connected to the SONET/SDH cloud over two pairs of fibers.
- Each fiber is connected unprotected, i.e., Linear APS is not required to another SONET/SDH element.
- FIG. 3 illustrates the creation of an STS-1 Virtual Ethernet Ring between OSAPs #1, #2, and #3. Multiple Virtual Ethernet Rings can be created in a network and from each node.
- OSAP #1 is connected to OSAP #2 using an STS-1 through the SONET/SDH network
- OSAP #2 is connected to OSAP #3 using another STS-1 through the SONET/SDH network
- OSAP #3 is connected to OSAP #1 using a third STS-1 through the SONET/SDH network.
- the network appears as three OSAPs connected together in a ring. The difference is that the three nodes are not directly connected and can, in fact, be located many miles from each other.
- each OSAP a single STS-1 timeslot is used. Different timeslots can be used in different OSAPs, e.g., timeslot #1 in OSAP #1 and timeslot #3 in OSAP #2.
- timeslot #1 in OSAP #1 and timeslot #3 in OSAP #2 are used in different OSAPs.
- timeslot #3 in OSAP #2 are used in different OSAPs.
- three STS-1 paths are created.
- N virtual nodes, "N" paths are created within the virtual network.
- the Virtual Ethernet Ring architecture is flexible: multiple Virtual Ethernet Rings can be created within a network and/or node.
- the multiple Virtual Ethernet Rings may share some of the same nodes, may have different nodes, and may be different bandwidths, e.g., STS-3c versus STS-1.
- Figure 4 expands the example of the Virtual Ethernet Ring architecture as a second Virtual Ethernet Ring is created in the network over an STS-3c.
- the second Virtual Ethernet Ring uses two of the same nodes as the first Virtual Ethernet Ring and a node that was not part of the first ring.
- the second virtual STS-3c is carried between OSAPs #2, #3, and #4. In this scenario, the STS-3c does not pass OSAP #1.
- a capability of the OSAP in relation to Virtual Ethernet Rings is the ability to support multi-service capabilities from a single port onto multiple Virtual Rings.
- the Gigabit Ethernet (GE) port can direct traffic to either of the Virtual Rings in the figure.
- GE Gigabit Ethernet
- the services can be separated using either VLAN tags or destination MAC addresses.
- a failover example described below helps to illustrate how protection switching works in a Virtual Ethernet Ring.
- a Virtual Ethernet Ring uses Appian's Optical Data Protection (ODP) for 50 msec restoration.
- ODP Optical Data Protection
- the OSAP is able to provide protection switching based on a failure anywhere within the SONET/SDH network. The failure does not need to be on the physical ring.
- equipment injects standard SONET/SDH path failure indicators, e.g., AIS.
- An OSAP that receives the path failure indicators detects the failure and send failure indicators over bytes in the SONET/SDH path overhead.
- UFI Upstream Failure Indication
- a failure detected on the protection fiber entering the node causes a Downstream Failure Indication (DFI) to be sent on the protection fiber.
- DFI Downstream Failure Indication
- the node that originated the DFI receives a UFI on its working fiber, it bridges the traffic onto the protection fiber.
- the node that originated the UFI receives a DFI on its protection fiber, it performs a ring switch and begins receiving the data on the protection fiber.
- FIG. 5 An example shown in Figure 5 helps to illustrate how the protection mechanism works with a failure in the SONET/SDH network.
- a Loss of Signal (LOS) failure occurs within the SONET/SDH cloud.
- the SONET/SDH injects AIS-P into the paths affected by the failure, h the example, OSAP#2 detects the AIS.
- OSAP#2 detects the failure and sends a UFI upstream to OSAP#3 and a Local Failure Indicator (LFI) downstream to OSAP#l.
- LFI Local Failure Indicator
- OSAPs #3 and #4 and all successive intermediate nodes on the long path, pass-through traffic and ODP overhead.
- OSAP#l upon receipt of the LFI from OSAP#2, transmits a DFI downstream, while OSAP#l, after receiving the UFI from OSAP#2, bridges working traffic to the protection channel. Meanwhile OSAP#2, having received the DFI (originally sent by OSAP#l), switches traffic from the protection channel onto the working channel and the failure is healed.
- the signaling mechanism causes the ring to revert back to its normal state.
- the SONET/SDH cloud has protected SONET/SDH elements.
- the failure may send an AIS to the OSAP ring triggering an ODP switch on the virtual ring.
- the OSAP reverts back. As a result, the OSAP ring took two hits from a failure outside the OSAP ring.
- the OSAP may support a holdoff timer for failures within the SONET/SDH cloud, i.e., failures not directly impacting such as a fiber cut connected to the OSAP.
- the OSAP/NE supports a holdoff timer for Virtual Ethernet Rings. This function helps to keep protection switches from propagating unnecessarily in the network between rings, and is provisionable.
- multipoint packet services may be deployed over SONET/SDH.
- Many enterprises use Ethernet to share data in their LANs. But in at least some cases, when it comes to sharing data among geographically dispersed sites, these same enterprises avoid Ethernet in favor of more expensive and more complex ATM, Frame Relay, and private line solutions.
- Ethernet packets from the enterprise are converted to ATM payloads and are transported over a mesh of ATM PVCs through the SONET/SDH infrastructure.
- This architecture requires service providers to deploy expensive ATM access devices.
- Recent advances in Ethernet technology and its transport over SONET/SDH have expanded Ethernet beyond its traditional role in the LAN. Ethernet is emerging as a compelling alternative to ATM, frame relay, and leased line services in the Metropolitan Area Network (MAN).
- QoS Quality of Service
- Ethernet's multi-access capability service providers can use a single Ethernet interface to provide software-tunable, Service Level Agreement (SLA)-managed access to multiple network customers.
- SLA Service Level Agreement
- TLS Transparent LAN services
- service providers typically define a broadcast domain across their network and restrict access to that domain to approved users-in effect, creating a Virtual Private
- VPN Network
- TLS First-generation TLS mapped LAN traffic onto dedicated point-to-point SONET/SDH paths. Although this solution provides ample security for customer traffic, it is insufficiently flexible. Because in essence the TLS is simply mapped onto the existing SONET/SDH infrastructure, service providers cannot scale bandwidth to meet customer needs, support multipoint-to-multipoint connections, or take advantage of the cost-efficiencies of packet switching for their data traffic.
- Service providers can take advantage of a TLS architecture that optimizes the existing SONET/SDH network for data and provides SONET/SDH ring protection for shared payload packet services.
- Service providers can use Virtual Ethernet Rings to build next generation TLS infrastructure, while leveraging SONET/SDH.
- Virtual Ethernet Rings overcome the point-to-point functionality of early generation TLS offerings to provide multi-service, multipoint-to- multipoint network services.
- SONET/SDH rings may remain the dominant topology within the MAN for three primary reasons: 1. Implementing rings in three to ten node MANs simplifies fiber deployment, protection, and bandwidth switching
- Rings improve POP scalability, especially when compared to topologies that must terminate multiple point-to-point circuits 3. Rings lend themselves more easily to supporting multipoint-to-multipoint services
- service providers typically provision data services by dedicating a timeslot and specific amount of bandwidth across the SONET/SDH network. If a customer purchases a DSl service, that customer receives 1.5 Mbps of dedicated bandwidth across the service provider network. The timeslot and bandwidth are reserved for the sole use of that one customer and are not available for use by anyone else even if that link is idle.
- TDM Time Division Multiplex
- customers who use a DSl (1.5 Mbps) for their data services are more likely to increase their bandwidth requirements to 3, 6, or 10 Mbps than to leap directly to a DS3 (45 Mbps).
- carriers must reserve a full 45 Mbps circuit end-to-end through their SONET/SDH network for every customer that requires more than 1.5 Mbps of service. If the customer only pays for 10 Mbps of service, the service provider must absorb the costs of the 35 Mbps of that circuit that remain unused and unavailable for other customers.
- SONET/SDH With respect to protecting shared payload packet services, service providers have widely deployed SONET/SDH in the MAN to take advantage of SONET/SDH's less than 50 msec self-healing resiliency and survivability features.
- SONET/SDH employs several protection schemes including Unidirectional Path Switched Ring (UPSR), Bidirectional Line Switched Ring (BLSR), and linear Automatic Protection Switching (APS) to achieve the reliability, low latency, and jitter guarantees service providers require.
- UPSR Unidirectional Path Switched Ring
- BLSR Bidirectional Line Switched Ring
- APS linear Automatic Protection Switching
- FIG. 6 illustrates the path sharing technology used by the OSAP.
- two counter-rotating physical rings connect four OSAPs. One of these counter-rotating rings is used for working traffic, while the other provides protection.
- Each OC-3 ring consists of three STS-ls. One of these STS-ls is configured to carry data traffic, while the others can be used for TDM applications.
- Optical Data Protection (ODP) technology developed by Appian is a protection mechanism that allows the sharing of SONET/SDH paths among multiple nodes and across multiple rings. ODP delivers the benefits of traditional SONET/SDH protection mechanisms like UPSR and BLSR, while providing ring protection at the optical layer for shared payload packet services.
- each OSAP delivers Ethernet-based services to several customers. All customers on the ring share the bandwidth on the single STS-1 that has been configured to carry data.
- Each OSAP can either: 1. Add new data to the ring,
- OSAP B may receive traffic from the customers connected to it and from OSAP A through the SONET/SDH ring. If OSAP B receives traffic from customers that is destined for OSAPs A, C, or D, it will add this traffic to the ring and send it in the direction of OSAP C. OSAP B then extracts from the SONET/SDH ring any traffic destined for its customers. If OSAP B receives traffic from OSAP A that is destined for the other linked OSAPs, it will simply pass this traffic through the ring to OSAP C.
- OSAP C allows traffic destined for OSAPs D and A to pass through, but extracts any data destined for its customers. Meanwhile, OSAP C adds any new traffic destined for OSAP A, B, or D to the SONET/SDH ring and sends it in the direction of OSAP D.
- Service providers can use the OSAP's QoS switching architecture to provide bandwidth guarantees for data and voice traffic traveling in the ring.
- service providers can use unique tags to separate traffic from different customers based on its service and priority.
- figure 7 depicts a typical TLS implementation.
- Customer A has 3 locations (represented by Al- A3)
- Customer B has 3 locations (represented by B1-B3)
- Customer C has 3 locations (represented by C1-C3) connected to the service provider's network.
- the Ethernet access ports can be located on the same OSAP, on different OSAPs on the same ring, or on different OSAPs that reside on different rings.
- service providers configure TLS trunks-shared SONET/SDH paths that are dropped at the customer sites and protected by ODP.
- TLS trunks can be provisioned as a path on either a single OSAP ring or as a virtual ring path (A virtual ring path is a SONET/SDH path, such as an STS-1, that is provisioned on Add-Drop Multiplexers (ADMs) and cross connects to pass through multiple rings in the SONET/SDH infrastructure) that travels through multiple OSAP rings.
- a virtual ring path is a SONET/SDH path, such as an STS-1, that is provisioned on Add-Drop Multiplexers (ADMs) and cross connects to pass through multiple rings in the SONET/SDH infrastructure) that travels through multiple OSAP rings.
- ADMs Add-Drop Multiplexers
- Solid line 710 in Figure 7 denotes a TLS trunk that circles only one OSAP ring. Customer A uses this ring to exchange information among its locations. For example, location Al can use the trunk to send unicast traffic to A2 or A3, or to send multicast traffic to both A2 and A3.
- the TLS trunk simulates a Layer 2 Ethernet switch to allow all access ports to share available bandwidth and communicate with each other.
- Dashed line 712 in Figure 7 depicts a virtual ring path that passes through two standard Appian rings and a third ring that is part of the SONET/SDH network.
- the OSAP's explicit-rate QoS mechanisms which include Guaranteed Bit Rate (GBR) and Maximum Burst Rate (MBR) parameters, enforce the bandwidth allocation to the customer.
- GRR Guaranteed Bit Rate
- MRR Maximum Burst Rate
- the OSAP uses Transparent LAN (TLAN) headers to separate traffic from Customer B from that of Customer C on this shared path. Customer data entering the OSAP is explicitly tagged with a unique identifier before it leaves the OSAP.
- TLAN header identifies the TLS through which the packet is traveling, and contains parameters required for packet handling, including the packet's source port, priority, and Time To Live (TTL).
- the OSAP limits packet switching to ports that belong to the end user's TLS, much as Virtual LANs (VLANs) in a LAN switching network limit the movement of all packets, even broadcast packets, to the access ports within a particular VLAN.
- VLANs Virtual LANs
- unicast, broadcast, and multicast forwarding used in the Appian TLS implementation behave much as techniques used in an Ethernet switch.
- the Appian OSAP uses unicast forwarding to deliver packets with known Destination Addresses (DAs) to individual stations in the TLS, and broadcast and multicast forwarding to deliver packets to all locations on a particular TLS. If a packet has an unknown DA, the OSAP uses address learning to determine and retain it.
- DAs Destination Addresses
- the OSAP performs an address lookup operation to determine where and how to forward that packet.
- Each OSAP along the packet's route uses the known DA to route the packet through the network until the packet reaches the OSAP to which its destination is connected.
- an Ethernet port may receive a packet from Bl that is destined for B3.
- the port identifies the packet's TLS, assigns a QoS classification to the packet, and queues the packet for delivery to the OSAP switch processor.
- the switch processor looks up the packet's TLAN header and DA on its Ethernet service table. When it finds the TLAN/DA pair, the switch processor sends the packet downstream through the TLS toward its final destination.
- Each downstream OSAP performs similar address lookups and continues forwarding the packet through the ring.
- the packet finally reaches the OSAP to which B3 is connected, that OSAP will strip the packet from the TLS trunk and send it to its local destination.
- Broadcast and multicast forwarding are similar features in that both types of packets are sent to all ports on a particular TLS.
- An Ethernet port, Bl may receive a multicast packet that is destined for B2 and B3. The port forwards the packet to all the local and remote ports that belong to the TLS B. There the packet is forwarded to B2 and B3. After reaching B2 and B3, the packet returns to Bl, where it is stripped and removed from the trunk.
- the OSAP used the known DA to deliver the packet in a TLS.
- the OSAP uses address learning to find and retain that DA.
- Address learning on the OSAP operates much as address learning in an Ethernet switch.
- the OSAP broadcasts that packet over only those tunnels that have TLS members on the other end. All access nodes that receive the packet learn its Source Address (SA) on the TLS and the TLS to which the packet belongs.
- SA Source Address
- the OSAP stores this information in its Media Access Control (MAC) forwarding tables for future use.
- MAC Media Access Control
- the OSAP's shared SONET/SDH path technology enables carriers to optimize bandwidth for multipoint-to-multipoint services.
- Service providers can take full advantage of statistical multiplexing for data services-enabling them to fully utilize previously stranded SONET/SDH bandwidth without sacrificing SONET/SDH protection on the shared data paths.
- TLS data-only LAN-to-LAN technology.
- service providers can use TLS to deliver data, voice, and video services.
- carriers can offer their customers LAN-like access, while reducing their own IT costs.
- the technique may be implemented in hardware or software, or a combination of both.
- the technique is implemented in computer programs executing on one or more programmable computers, such as a general purpose computer, or a computer running or able to run Microsoft Windows 95, 98, 2000, Millennium Edition, NT, XP; Unix; Linux; or MacOS; that each include a processor such as an Intel Pentium 4, a storage medium readable by the processor (including volatile and non-volatile memory and/or storage elements), at least one input device such as a keyboard, and at least one output device.
- Program code is applied to data entered using the input device or received from another source to perform the method described above and to generate output information.
- the output information is applied to one or more output devices such as a display screen of the computer, or to another application or computer.
- each program is implemented in a high level procedural or object-oriented programming language such as C, C++, Java, or Perl to communicate with a computer system.
- the programs can be implemented in assembly or machine language, if desired. In any case, the language may be a compiled or interpreted language.
- each such computer program is stored on a storage medium or device, such as ROM or magnetic diskette, that is readable by a general or special purpose programmable computer for configuring and operating the computer when the storage medium or device is read by the computer to perform the procedures described in this document.
- the system may also be considered to be implemented as a computer-readable storage medium, configured with a computer program, where the storage medium so configured causes a computer to operate in a specific and predefined manner.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Astronomy & Astrophysics (AREA)
- Aviation & Aerospace Engineering (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Small-Scale Networks (AREA)
Abstract
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US35088602P | 2002-01-23 | 2002-01-23 | |
US60/350,886 | 2002-01-23 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2003062842A1 true WO2003062842A1 (fr) | 2003-07-31 |
Family
ID=27613437
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2003/002087 WO2003062842A1 (fr) | 2002-01-23 | 2003-01-23 | Gestion d'architectures de reseaux virtuels |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2003062842A1 (fr) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007125111A1 (fr) * | 2006-04-28 | 2007-11-08 | Nokia Siemens Networks Gmbh & Co. Kg | type de procédé et système pour la protection d'anneaux Ethernet |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5754528A (en) * | 1994-03-18 | 1998-05-19 | Fujitsu Limited | Virtual ring configuration method and virtual ring system |
US20020001308A1 (en) * | 2000-05-26 | 2002-01-03 | Alcatel | Method of transmitting synchronous transport modules via a synchronous transport network |
US20020032872A1 (en) * | 2000-06-06 | 2002-03-14 | Isabelle Jussy | System and method for controlling network elements using softkeys |
US20020167899A1 (en) * | 2001-05-11 | 2002-11-14 | Thompson Richard A. | System and method for the configuration, repair and protection of virtual ring networks |
US6487177B1 (en) * | 1998-06-12 | 2002-11-26 | Nortel Networks Limited | Method and system for enhancing communications efficiency in data communications networks |
US20030058790A1 (en) * | 2001-09-21 | 2003-03-27 | Kazuaki Nagamine | Ring switching method and node apparatus using the same |
-
2003
- 2003-01-23 WO PCT/US2003/002087 patent/WO2003062842A1/fr not_active Application Discontinuation
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5754528A (en) * | 1994-03-18 | 1998-05-19 | Fujitsu Limited | Virtual ring configuration method and virtual ring system |
US6487177B1 (en) * | 1998-06-12 | 2002-11-26 | Nortel Networks Limited | Method and system for enhancing communications efficiency in data communications networks |
US20020001308A1 (en) * | 2000-05-26 | 2002-01-03 | Alcatel | Method of transmitting synchronous transport modules via a synchronous transport network |
US20020032872A1 (en) * | 2000-06-06 | 2002-03-14 | Isabelle Jussy | System and method for controlling network elements using softkeys |
US20020167899A1 (en) * | 2001-05-11 | 2002-11-14 | Thompson Richard A. | System and method for the configuration, repair and protection of virtual ring networks |
US20030058790A1 (en) * | 2001-09-21 | 2003-03-27 | Kazuaki Nagamine | Ring switching method and node apparatus using the same |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007125111A1 (fr) * | 2006-04-28 | 2007-11-08 | Nokia Siemens Networks Gmbh & Co. Kg | type de procédé et système pour la protection d'anneaux Ethernet |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6952395B1 (en) | Optical network restoration | |
Anderson et al. | Protocols and architectures for IP optical networking | |
EP1513296B1 (fr) | Réseau privé virtuel avec interface ethernet canalisé sur Sonet, routeur de bordure et méthode | |
EP1414265B1 (fr) | Plateforme silicium pour services multiples Ethernet sur SONET | |
US6385204B1 (en) | Network architecture and call processing system | |
US6975589B2 (en) | Method and apparatus for a hybrid variable rate pipe | |
US7733900B2 (en) | Multi-service ethernet-over-sonet silicon platform | |
EP1748599A1 (fr) | Reseau porteur d'anneaux et procede de mise en oeuvre de porteur de services | |
US7016300B2 (en) | Protection mechanism for an optical ring | |
US20030026250A1 (en) | Method and device for synchronous cell transfer and circuit-packet duality switching | |
US6683849B1 (en) | Optical communications network | |
Afferton et al. | Packet-aware transport for metro networks | |
AU2578099A (en) | Virtual star network | |
Cisco | Glossary | |
US8532137B1 (en) | Network architecture for a packet aware transport network | |
WO2003062842A1 (fr) | Gestion d'architectures de reseaux virtuels | |
Cisco | Cisco ONS 15454 SDH Product Overview, Release 3.3 | |
Hernandez-Valencia et al. | The building blocks of a data-aware transport network: deploying viable Ethernet and virtual wire services via multiservice ADMs | |
Wang | Optical Ethernet: Making Ethernet carrier class for professional services | |
Wei et al. | Convergence through packet-aware transport | |
Ayandeh | Convergence of protection and restoration in telecommunication networks | |
He et al. | Transporting metro ethernet services over metropolitan area networks | |
KR100560427B1 (ko) | 가상사설망을 지원하는 패킷-시간분할다중화 통합 시스템및 그 방법 | |
Gringeri et al. | Packet and TDM transport integration: how, when and why? | |
Parikh | Alternative metro architectures for delivering next-generation data services |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SC SD SE SG SK SL TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
122 | Ep: pct application non-entry in european phase | ||
NENP | Non-entry into the national phase |
Ref country code: JP |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: JP |