US20070271484A1 - Method, system and network entity for detecting a connection fault - Google Patents

Method, system and network entity for detecting a connection fault Download PDF

Info

Publication number
US20070271484A1
US20070271484A1 US11/834,731 US83473107A US2007271484A1 US 20070271484 A1 US20070271484 A1 US 20070271484A1 US 83473107 A US83473107 A US 83473107A US 2007271484 A1 US2007271484 A1 US 2007271484A1
Authority
US
United States
Prior art keywords
data communication
switch
over
interval
connectivity verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/834,731
Inventor
Sixten Johansson
Antti Kankkunen
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Infinera Oy
Original Assignee
Tellabs Oy
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tellabs Oy filed Critical Tellabs Oy
Priority to US11/834,731 priority Critical patent/US20070271484A1/en
Assigned to TELLABS OY reassignment TELLABS OY ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: KANKKUNEN, ANTTI, JOHANSSON, SIXTEN
Publication of US20070271484A1 publication Critical patent/US20070271484A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/28Routing or path finding of packets in data switching networks using route fault recovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0805Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
    • H04L43/0811Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking connectivity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/22Alternate routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/50Routing or path finding of packets in data switching networks using label swapping, e.g. multi-protocol label switch [MPLS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems 
    • H04L12/56Packet switching systems
    • H04L12/5601Transfer mode dependent, e.g. ATM
    • H04L2012/5638Services, e.g. multimedia, GOS, QOS
    • H04L2012/5665Interaction of ATM with other protocols
    • H04L2012/5669Multiprotocol over ATM [MPOA]

Definitions

  • the present invention relates generally to communicating data over a communication link.
  • the MPLS carries the heritage of delay tolerant based data communication such as the ATM, despite offering a fast way to transfer data. Consequently, there are still some remains of the ATM in the MPLS.
  • One example is the principal design for applications substantially based on non real time or alternatively expressed as delay tolerance.
  • Existing MPLS Path failure-detecting mechanism can inform both ends of the backbone about failures using the backward and forward detect indicators (BDI and FDI), although typically Label Switched Path (LSP) has a one-way character.
  • the Connectivity Verification (CV) packets check the network for Path-specific errors like mis-merging or swapped Paths.
  • a Path failure has occurred when defects on three consecutive CV packets have been detected. This means that it takes three seconds before a failure alert for a Path error can be detected and sent further.
  • a disadvantage of the above-identified standards is that the solutions according to the above-identified standards are not adequate for any communication or connections requiring real time functionality. Moreover, the switch-over time is not fast enough with substantially real-time based connections, where a switch-over is typically required in less than 50 ms.
  • a method for detecting a connection fault and accordingly performing a switch-over in data communication in accordance with a set of rules based on Operation and Maintenance data communication principles wherein an interval for sending connectivity verification data information in the data communication is such that a real time based data communication is achievable.
  • a network entity for detecting a connection fault and accordingly performing a switch-over in data communication in accordance with a set of rules based on Operation and Maintenance data communication principles, the network entity comprises means for sending connectivity verification data information with a frequency in the data communication such that a real time based data communication is achievable.
  • a network entity for detecting a connection fault and accordingly performing a switch-over in data communication in accordance with a set of rules based on Operation and Maintenance data communication principles, the network entity comprises means for receiving connectivity verification data information with a frequency in the data communication such that a real time based data communication is achievable.
  • method, system and network entity enable a detection of a connection fault and perform the switch-over in less than 50 ms.
  • the solution differs from the standard at least in such a way that connectivity verification data information such as CV packets are being sent, for example, 1/10 ms (1 per 10 ms) or 1/15 ms (1 per 15 ms), which ever interval that makes the switch-over time for a protected substantially real-time based connection achievable, that makes the fault detection from the fault event to occur in less than 50 ms, and triggers the switch-over to occur also in less than 50 ms from the occurrence of the fault event.
  • a benefit of the embodied invention provides a solution to achieve same (or even better) switch-over time in, for example, MPLS networks as which have been achieved in Time Division Multiplexing (TDM) networks.
  • TDM Time Division Multiplexing
  • FIG. 1 depicts an example of an OAM function type codepoints
  • FIG. 2 depicts an example of a payload structure of the CV packet
  • FIG. 3 depicts an example of 1 + 1 protection switching architecture
  • FIG. 4 depicts in a form of a flow chart a method for detecting a connection fault and accordingly performing a switch-over in accordance with an embodiment of the invention
  • FIGS. 5 and 6 depict examples of the packet layer structure in data communication in accordance with the embodied invention
  • FIG. 7 depicts an embodiment of a network system in which the principles of the invention are applied.
  • the preferred embodiments of the invention provide a method, a system, and a network entity to enable a detection of a connection fault and perform the switch-over in less than 50 ms.
  • the solution differs from the standard at least in such a way that connectivity verification data information such as CV packets are being sent, for example, 1/10 ms (1 CV packet per 10 ms) or 1/15 ms (1 CV packet per 15 ms).
  • the interval of the CV packets, consequently the frequency for sending the CV packet can be any interval that makes the switch-over time for a protected substantially real-time based connection achievable.
  • the interval should be such that the interval makes the fault detection from the fault event to occur in less than 50 ms and triggers the switch-over to occur also in less than 50 ms from the occurrence of the fault event.
  • the appliance of the embodied invention for real time data communication provides also an advantage over the current Voice over IP (VoIP) solutions as the monitoring of the network traffic, which is based on the label(s) as defined in the MPLS and Ethernet based solution, is considerably faster than the current solution of the VoIP.
  • VoIP Voice over IP
  • OAM Operation and Maintenance
  • Some embodiments of the invention apply connectivity verification data information.
  • the connectivity verification data information By the connectivity verification data information, it is verified that the connection exists and that the connection is appropriate between the network nodes.
  • the Connectivity Verification (CV) packets can be applied as the connectivity verification data information.
  • the CV flow is generated at the Label Switched Path's (LSP's) source Label Switched Router (LSR) with a nominal frequency of, for example, 1/10 ms (1 CV packet per 10 ms) or 1/15 ms (1 CV packet per 15 ms).
  • the interval for the CV flow generation nominal frequency can be which ever interval that makes the switch-over time for a protected real-time based connection achievable, and which interval makes the fault detection from the fault event to occur in less than 50 ms and, consequently, triggers the switch-over to occur also in less than 50 ms from the occurrence of the fault event.
  • the CV flow is terminated at the LSP's sink LSR.
  • the CV packet contains a network-unique identifier such as TTSI (Trail Termination Source Identifier) so that all types of defects can be detected.
  • connectivity verification data information can be referred by a different name, however, by the connectivity verification data information, it is verified that the connection exists and that the connection is appropriate between the network nodes.
  • the connection comprises a functional connection between a Source and the Sink in a system of interconnected computing devices in accordance with the protection switching data communication principles.
  • the connection comprises fast IP based connection for various appliances such as web application, e-mail, file transfer, host sessions, newsgroups, directory services, network management, and file services.
  • the examples are described in the OSI reference model.
  • the Source and the Sink are coupled via the optical fiber.
  • a cable coupling such as a copper cable coupling or a radio link coupling can be applied as well.
  • the switch-over takes place for the previous connection (typically working connection), which suffers from the faulty connection or alternatively referred to as a connection error or a failure during the data communication.
  • the faulty connection can be a physical or functional between the Source and the Sink and can be caused by termination of the capability of an entity to transfer user or OAM (Operation and Maintenance) information.
  • OAM Operaation and Maintenance
  • the CV is an important operational part of the OAM, by which data communication and functional connection(s) between two network nodes can be monitored relatively reliably.
  • the OAM defect detection function is based on the periodic transmission of CV packets from ingress to egress of an LSP.
  • the CV packet generation rate is, for example, 1/10 ms or 1/15 ms.
  • the interval for the CV flow generation nominal frequency can be which ever interval that makes the switch-over time for a protected real-time based connection achievable, and which makes the fault detection from the fault event to occur in less than 50 ms. As a consequence of the appropriate interval, the switch-over is triggered to occur in less than 50 ms from the occurrence of the fault event.
  • Each CV packet carries a unique TTSI (Trail Termination Source Identifier), which is composed of the source LSR identifier, and the LSP identifier.
  • TTSI Trail Termination Source Identifier
  • An LSP enters a defect state when one of the defects noted in section 3 of the daft Y.1711 occurs.
  • All OAM packets are identified in terms of a function type by the first octet of the OAM packet payload as depicted in the example of FIG. 1 . Thus, OAM function type codepoints ( 100 ) are depicted.
  • the Connectivity Verification function is used to detect/diagnose all types of LSP connectivity defects (sourced either from below or within the MPLS layer networks).
  • An example of a payload structure of the CV ( 200 ) is depicted in the FIG. 2 .
  • CV source generation and CV sink processing should be considered as independent functions. This functional decoupling allows operators the flexibility to use different degrees of LSP monitoring on a per LSP basis, for example, between those LSPs deemed as ‘important’ and those LSPs deemed ‘less-important’.
  • CV generation can be considered as a relatively trivial function, for example since it never varies, and is much simpler than CV sink processing. Hence, CV generation could be enabled on all (or most) of the LSPs, but the sink processing could be decomposed into several ‘degree classes’ per LSP such as:
  • Protection switching is a fully allocated protection mechanism that can be used on any topology. It is fully allocated in the sense that the route and bandwidth of the protection entity is reserved for a selected working entity. To be effective under all possible failures of the working entity however, the protection entity must be known to have complete physical diversity over all common-failure modes. This may not always be possible.
  • the MPLS PS architecture can be a 1+1 type, a 1:1 type, or 1:N type, and all can be applied in the embodied invention.
  • a protection entity is dedicated to each working entity with the working entity bridged onto the protection entity at the source of the protected domain.
  • the traffic on working and protection entities is transmitted simultaneously to the sink of the protected domain, where a selection between the working and protection entity is made based on some predetermined criteria, such as defect indication.
  • An example of the 1+1 architecture ( 300 ) is depicted in the FIG. 3 .
  • a protection entity is dedicated to each working entity.
  • the working traffic is transmitted either by working or protection entity.
  • the method for a selection between the working and protection entities depends on the mechanism.
  • the protection entity can be used to carry (so-called) “extra traffic” when it is not used to transmit the working traffic.
  • the real time can be considered as a level of computer responsiveness that a user senses as sufficiently immediate or that enables the computer to keep up with some external process (for example, to present visualizations of the weather as it constantly changes).
  • the real-time is an adjective pertaining to computers or processes that operate in real time.
  • the real time describes a human rather than a machine sense of time.
  • the real time based data communication or connections are highly relevant in telecommunication, especially when the IP appliance is used.
  • MPLS Multiprotocol Label Switching
  • IP Internet Protocol
  • ATM Asynchronous Transport Mode
  • frame relay network protocols IP
  • IP Internet Protocol
  • MPLS allows most packets to be forwarded at the layer 2 (switching) level rather than at the layer 3 (routing) level.
  • QoS quality of service
  • the invention can be applied in many kinds of networks (not just the MPLS) where the OAM (Operation and Maintenance) kind of mechanism is used for monitoring of connection existence.
  • the appliance in Ethernet based communication providing very fast data transfer.
  • Fast Ethernet provides transmission speeds up to 100 megabits per second and is typically used for LAN, WAN, and MAN backbone systems, supporting workstations with cards.
  • Gigabit Ethernet provides an even higher level of backbone support at 1000 megabits per second (1 gigabit or 1 billion bits per second).
  • 10-Gigabit Ethernet provides up to 10 billion bits per second.
  • Fast Ethernet is a local area network (LAN) transmission standard that provides a data rate of 100 megabits per second. Alternatively, it can be applied in wide area networks (WANs) and metropolitan area networks (MANs). Workstations with existing 10 megabit per second Ethernet card can be connected to a Fast Ethernet network. (The 100 megabits per second is a shared data rate; input to each workstation is constrained by the 10 Mbps card.)
  • LAN local area network
  • WANs wide area networks
  • MANs metropolitan area networks
  • Gigabit Ethernet a transmission technology based on the Ethernet frame format and protocol used in local area networks (LANs), provides a data rate of 1 billion bits per second (one gigabit). Alternatively, it can be applied in wide area networks (WANs) and metropolitan area networks (MANs).
  • Gigabit Ethernet is defined in the IEEE 802.3 standard and is currently being used as the backbone in many enterprise networks. Gigabit Ethernet is carried primarily on optical fiber (with very short distances possible on copper media). Existing Ethernet LANs with 10 and 100 Mbps cards can feed into a Gigabit Ethernet backbone.
  • An alternative technology that competes with Gigabit Ethernet is ATM.
  • 10-Gigabit Ethernet A newer standard, 10-Gigabit Ethernet, is also becoming common. 10-Gigabit Ethernet, being standardized in IEEE 802.3ae, is a developing telecommunication technology that offers data speeds up to 10 billion bits per second. Built on the Ethernet technology used in most of today's local area networks (LANs), 10-Gigabit Ethernet is described as a “disruptive” technology that offers a more efficient and less expensive approach to moving data on backbone connections between networks while also providing a consistent technology end-to-end. Using optical fiber, 10-Gigabit Ethernet can replace existing networks that use ATM switches and SONET multiplexers on an OC-48 SONET ring with a simpler network of 10-Gigabit Ethernet switches and at the same time improve the data rate from 2.5 Gbps to 10 Gbps.
  • LANs local area networks
  • 10-Gigabit Ethernet is used to interconnect local area networks (LANs), wide area networks (WANs), and metropolitan area networks (MANs).
  • 10-Gigabit Ethernet uses the familiar IEEE 802.3 Ethernet media access control (MAC) protocol and its frame format and size. Like Fast Ethernet and Gigabit Ethernet, 10-Gigabit Ethernet uses full-duplex transmission, which makes possible a considerable distance range. On multimode fiber, 10-Gigabit Ethernet will support distances up to 300 meters; on single mode fiber, it will support distances up to 40 kilometers. Smaller Gigabit Ethernet networks can feed into a 10-Gigabit Ethernet network.
  • FIG. 4 has been described in the foregoing. In the following, corresponding reference signs have been applied to corresponding parts.
  • FIG. 4 depicts in a form of a flow chart a method for detecting a connection fault and accordingly performing a switch-over in accordance with an embodiment of the invention.
  • step 400 there is established the LSP(s) between the Source and the Sink nodes.
  • the drafted standardization specifications Y.1710, Y.1711, and Y.1720 provided details on the establishment step and on some part of the process.
  • the CVs are sent with a nominal frequency. The CVs are sent from the Source to the Sink.
  • the CV flow is generated at the Label Switched Path's (LSP's) source Label Switched Router (LSR) with a nominal frequency of, for example, 1/10 ms (1 CV packet per 10 ms) or 1/15 ms (1 CV packet per 15 ms).
  • LSP's Label Switched Path's
  • LSR source Label Switched Router
  • the interval for the CV flow nominal frequency can be which ever interval that makes the switch-over time for a possibly protected real-time connection achievable.
  • the interval for sending the CV packet (consequently the sending frequency) is such that it makes the fault detection from the fault event to occur in less than 50 ms.
  • the interval triggers the switch-over to occur also in less than 50 ms from the occurrence of the fault event.
  • the CV flow is terminated at the LSP's sink LSR.
  • step 404 the packets for the data communication between the Source and the Sink are received at the Sink.
  • step 406 the CV packets are detected among the received packets at the Sink. Steps 404 and 406 can be quite instant or even combined.
  • step 408 there is being monitored whether any CV packet(s) is missing or wrong. Every CV packet missing or wrong in the flow is registered.
  • step 410 a threshold for missing/wrong CV packets is met or exceeded.
  • the threshold is three consecutive missing or wrong CV packets. However, other threshold can be applied as well. If the threshold of the step 410 is met, a connection fault is detected at the Sink in step 412 . Consequently, the connection fault notification can be sent in the network (step 414 ).
  • the process returns to the step 404 .
  • the step 404 can be considered as a readiness state for detecting any possible missing or wrong CV packet.
  • the detection can take place at network Routers such as LSR Sink, which does not necessary act as the final receiving end for the flow but can convey the flow forward.
  • the FDI is applied in this case to transfer the failure detect indication forward.
  • FIGS. 5 and 6 depict examples of the packet layer structure in data communication in accordance with the embodied invention.
  • the packets indexed with identifier 20 depicts an identifier for a segment of the LSP.
  • the packets indexed with identifier 50 depict the identifier for LSP traffic stream for which the OAM is applied to, and the index 14 represents OAM information packets.
  • An example of the packet layer structure of the data communication in accordance with the embodied invention is depicted in FIG. 6 .
  • the lower layers of OSI reference model (L 2 ,L 3 ) are applied.
  • FIG. 7 depicts an embodiment of a network system in which the principles of the invention are applied.
  • the example of FIG. 7 applies the protected connection, and is based on the 1+1 protection switching architecture.
  • a functional working connection (W) and a functional protecting connection (P) couples a node 1 with node 2 preferably via fast data transfer means.
  • W optical working connection
  • P functional protecting connection
  • W optical fiber based data transfer lines
  • the cable coupling such as the copper cable coupling or the radio link coupling can be applied as well.
  • the data transfer means establish a backbone of IP based network connection.
  • the system of FIG. 7 can operate as the large backbone network using IP for telecommunication services, and the MPLS can be applied as the bearer for such a network.
  • the node 1 and 2 can be a data computing device operating in a data networks such as a computer server.
  • the coupling of the node 1 and the node 2 is via routers 1 , 2 and 3 , 4 , which may also cross.
  • the LSP is established between the nodes via the routers.
  • Data connection packets depicted in the FIG. 7 depicts the segment id ( 20 , 30 , 40 ) for different segment of the Path, the id ( 50 ), and OAM packets ( 14 ).
  • the CV packets constitute a part of the OAM packet types (the CV type OAM packet).
  • the sending of the CV packets is described above referring to the example of FIG. 4 step 402 .
  • the CV flow is generated in the Node 1 .
  • the node 1 is acting as a Source LSR for the LSP.
  • the flow and the LSP is eventually directed to the node 2 .
  • the node 2 is acting as eventual Sink LSR for the LSP.
  • the termination of the CV flow is operating at the Sink.
  • the monitoring can take place at network Routers such as LSR Sink, which does not necessary act as the final receiving end for the flow but can convey the flow forward.
  • the FDI is applied in this case to transfer the failure detect indication forward.
  • the system, the network entity, and the computer program product can apply the procedures of the method described in the example of FIG. 4 . Consequently, the method can operate in the example of FIG. 7 .

Abstract

A method, a system, and a network entity enable a detection of a connection fault and perform the switch-over in less than 50 ms. CV packets are being sent, for example, 1/10 ms (1 CV packet per 10 ms) or 1/15 ms (1 CV packet per 15 ms). The interval of the CV packets, consequently the frequency for sending CV packet, can be any interval that makes the switch-over time for a protected substantially real-time connection achievable. Moreover, the interval (the frequency) should be such that the interval makes the fault detection from the fault event to occur in less than 50 ms and triggers the switch-over to occur also in less than 50 ms from the occurrence of the fault event.

Description

    TECHNICAL FIELD OF THE INVENTION
  • The present invention relates generally to communicating data over a communication link.
  • BACKGROUND OF THE INVENTION
  • Ever since the formation of the global network of interconnected computing devices such as the Internet, there is being a huge emerging of various communication formats enabling these computing devices to communicate among themselves. This has created various services for users in business and non-business areas. In later half of 1990's we saw the boom of the Internet. A whole set of new services and content became available to the consumers during a short, revolutionary and hype intense period. That period introduced e-commerce, Internet Service Providers (ISPs), Portals, eyeballs game, dotcom companies and even the new economy.
  • However, many of the communication formats were originally designed for traditional packet based transmission, where association to real time event typically lacked. An example of such a communication is the web pages and web surfing. Also many trusted application such as banking could be taken care with possible delays. Even the fastest data communication ways such as Asynchronous Transfer Mode (ATM) were designed, despite of the ultimate data transfer speed, to quite delay tolerant environments. Lately the telecommunication industry has been highly focused on their leap towards using IP for telecommunication services. As one alternative, Multiprotocol Label Switching (MPLS) can be chosen as the bearer of IP, especially in large backbone networks.
  • However, the MPLS carries the heritage of delay tolerant based data communication such as the ATM, despite offering a fast way to transfer data. Consequently, there are still some remains of the ATM in the MPLS. One example is the principal design for applications substantially based on non real time or alternatively expressed as delay tolerance.
  • Examples of such approaches have been presented according to standardization specification drafts of the ITU-T: Y.1710 “Requirements for OAM functionality in MPLS networks” COM 13-14-E July 2002, Y.1711 “OAM mechanism for MPLS networks” COM 13-15-E July 2002, and Y.1720 “Protection Switching for MPLS networks” COM 13-R 14-E June 2001, all three incorporated herein as a reference, where Connectivity Verification (CV) packets are sent 1/s (1 per second). This standard solution provides a fault detection time of three seconds from the fault event.
  • Existing MPLS Path failure-detecting mechanism can inform both ends of the backbone about failures using the backward and forward detect indicators (BDI and FDI), although typically Label Switched Path (LSP) has a one-way character. The Connectivity Verification (CV) packets check the network for Path-specific errors like mis-merging or swapped Paths. A Path failure has occurred when defects on three consecutive CV packets have been detected. This means that it takes three seconds before a failure alert for a Path error can be detected and sent further.
  • A disadvantage of the above-identified standards is that the solutions according to the above-identified standards are not adequate for any communication or connections requiring real time functionality. Moreover, the switch-over time is not fast enough with substantially real-time based connections, where a switch-over is typically required in less than 50 ms.
  • In view of various inherent limitations of communication and systems between computing devices, it would be desirable to avoid or mitigate these and other problems associated with prior art. Thus, there is a need to have a fault detection and switch-over functionality for real time application.
  • SUMMARY OF THE INVENTION
  • Now a method, a system and a network entity have been invented for detecting a fault and performing a switch-over functionality for real time application.
  • In accordance with a first aspect of the invention there is provided a method for detecting a connection fault and accordingly performing a switch-over in data communication in accordance with a set of rules based on Operation and Maintenance data communication principles, wherein an interval for sending connectivity verification data information in the data communication is such that a real time based data communication is achievable.
  • In accordance with a second aspect of the invention there is provided a system for detecting a connection fault and accordingly performing a switch-over in data communication between a source computing device and a sink computing device in accordance with a set of rules based on Operation and Maintenance data communication principles, wherein an interval for sending connectivity verification data information in the data communication is such that a real time based data communication is achievable.
  • In accordance with a third aspect of the invention, there is provided a network entity for detecting a connection fault and accordingly performing a switch-over in data communication in accordance with a set of rules based on Operation and Maintenance data communication principles, the network entity comprises means for sending connectivity verification data information with a frequency in the data communication such that a real time based data communication is achievable.
  • In accordance with the fourth aspect of the invention, there is provided a network entity for detecting a connection fault and accordingly performing a switch-over in data communication in accordance with a set of rules based on Operation and Maintenance data communication principles, the network entity comprises means for receiving connectivity verification data information with a frequency in the data communication such that a real time based data communication is achievable.
  • In preferred arrangement, method, system and network entity enable a detection of a connection fault and perform the switch-over in less than 50 ms. The solution differs from the standard at least in such a way that connectivity verification data information such as CV packets are being sent, for example, 1/10 ms (1 per 10 ms) or 1/15 ms (1 per 15 ms), which ever interval that makes the switch-over time for a protected substantially real-time based connection achievable, that makes the fault detection from the fault event to occur in less than 50 ms, and triggers the switch-over to occur also in less than 50 ms from the occurrence of the fault event.
  • A benefit of the embodied invention provides a solution to achieve same (or even better) switch-over time in, for example, MPLS networks as which have been achieved in Time Division Multiplexing (TDM) networks.
  • For better understanding of the present invention reference is made to the following description, taken in conjunction with the accompanying drawings, and its scope will be pointed out in the appending claims.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The invention will now be described, by way of example only, with reference to the accompanying drawings, in which:
  • FIG. 1 depicts an example of an OAM function type codepoints,
  • FIG. 2 depicts an example of a payload structure of the CV packet,
  • FIG. 3 depicts an example of 1+1 protection switching architecture,
  • FIG. 4 depicts in a form of a flow chart a method for detecting a connection fault and accordingly performing a switch-over in accordance with an embodiment of the invention,
  • FIGS. 5 and 6 depict examples of the packet layer structure in data communication in accordance with the embodied invention,
  • FIG. 7 depicts an embodiment of a network system in which the principles of the invention are applied.
  • DETAILED DESCRIPTION OF THE EMBODIMENTS
  • The preferred embodiments of the invention provide a method, a system, and a network entity to enable a detection of a connection fault and perform the switch-over in less than 50 ms. The solution differs from the standard at least in such a way that connectivity verification data information such as CV packets are being sent, for example, 1/10 ms (1 CV packet per 10 ms) or 1/15 ms (1 CV packet per 15 ms). The interval of the CV packets, consequently the frequency for sending the CV packet, can be any interval that makes the switch-over time for a protected substantially real-time based connection achievable. Moreover, the interval (the frequency) should be such that the interval makes the fault detection from the fault event to occur in less than 50 ms and triggers the switch-over to occur also in less than 50 ms from the occurrence of the fault event.
  • The appliance of the embodied invention for real time data communication provides also an advantage over the current Voice over IP (VoIP) solutions as the monitoring of the network traffic, which is based on the label(s) as defined in the MPLS and Ethernet based solution, is considerably faster than the current solution of the VoIP.
  • Some embodiments of the invention apply Operation and Maintenance (OAM) data communication principles. The OAM is a technology that covers how one gets an overview of the network performance and its traffic behavior, the networks detection of errors and how they are handled, and the discovery of inconvenient configurations. Some more technical details on the OAM can be found from the standardization specifications drafts of the ITU-T: Y.1710, Y.1711, and Y.1720, all three incorporated herein as a reference.
  • Some embodiments of the invention apply connectivity verification data information. By the connectivity verification data information, it is verified that the connection exists and that the connection is appropriate between the network nodes. The Connectivity Verification (CV) packets can be applied as the connectivity verification data information. The CV flow is generated at the Label Switched Path's (LSP's) source Label Switched Router (LSR) with a nominal frequency of, for example, 1/10 ms (1 CV packet per 10 ms) or 1/15 ms (1 CV packet per 15 ms). The interval for the CV flow generation nominal frequency can be which ever interval that makes the switch-over time for a protected real-time based connection achievable, and which interval makes the fault detection from the fault event to occur in less than 50 ms and, consequently, triggers the switch-over to occur also in less than 50 ms from the occurrence of the fault event. The CV flow is terminated at the LSP's sink LSR. The CV packet contains a network-unique identifier such as TTSI (Trail Termination Source Identifier) so that all types of defects can be detected. Alternatively, in Ethernet based solution connectivity verification data information can be referred by a different name, however, by the connectivity verification data information, it is verified that the connection exists and that the connection is appropriate between the network nodes.
  • The connection comprises a functional connection between a Source and the Sink in a system of interconnected computing devices in accordance with the protection switching data communication principles. Preferably, the connection comprises fast IP based connection for various appliances such as web application, e-mail, file transfer, host sessions, newsgroups, directory services, network management, and file services. The examples are described in the OSI reference model. Preferably, the Source and the Sink are coupled via the optical fiber. Alternatively, a cable coupling such as a copper cable coupling or a radio link coupling can be applied as well. The switch-over takes place for the previous connection (typically working connection), which suffers from the faulty connection or alternatively referred to as a connection error or a failure during the data communication. The faulty connection can be a physical or functional between the Source and the Sink and can be caused by termination of the capability of an entity to transfer user or OAM (Operation and Maintenance) information.
  • In the following, technical details about the OAM's & the CV's functionality are provided for some embodiments of the invention.
  • The CV is an important operational part of the OAM, by which data communication and functional connection(s) between two network nodes can be monitored relatively reliably. The OAM defect detection function is based on the periodic transmission of CV packets from ingress to egress of an LSP. The CV packet generation rate is, for example, 1/10 ms or 1/15 ms. The interval for the CV flow generation nominal frequency can be which ever interval that makes the switch-over time for a protected real-time based connection achievable, and which makes the fault detection from the fault event to occur in less than 50 ms. As a consequence of the appropriate interval, the switch-over is triggered to occur in less than 50 ms from the occurrence of the fault event. Each CV packet carries a unique TTSI (Trail Termination Source Identifier), which is composed of the source LSR identifier, and the LSP identifier. An LSP enters a defect state when one of the defects noted in section 3 of the daft Y.1711 occurs. All OAM packets are identified in terms of a function type by the first octet of the OAM packet payload as depicted in the example of FIG. 1. Thus, OAM function type codepoints (100) are depicted.
  • Still referring to the CV. The Connectivity Verification function is used to detect/diagnose all types of LSP connectivity defects (sourced either from below or within the MPLS layer networks). An example of a payload structure of the CV (200) is depicted in the FIG. 2.
  • In the following, technical details about CV Source and Sink Processing are provided for some embodiments of the invention.
  • CV source generation and CV sink processing should be considered as independent functions. This functional decoupling allows operators the flexibility to use different degrees of LSP monitoring on a per LSP basis, for example, between those LSPs deemed as ‘important’ and those LSPs deemed ‘less-important’.
  • CV generation can be considered as a relatively trivial function, for example since it never varies, and is much simpler than CV sink processing. Hence, CV generation could be enabled on all (or most) of the LSPs, but the sink processing could be decomposed into several ‘degree classes’ per LSP such as:
    • 1. No CV processing. Hence, no defect processing, no availability measurements and no network performance measurements.
    • 2. A simple check of CV arrivals without examining the TTSI (though it is assumed the TTSI is still generated). This cannot provide totally reliable connectivity verification since it cannot detect certain defects, for example d-Mismerge/d-Mismatch.
    • 3. Only a very simple check for arrival of CV packets with an unexpected TTSI. This could be used on less important LSPs as a simple method for detecting leakage of important LSP traffic (into the less important LSP). However, there might be no other defect processing done (for example dLOCV) and no availability measurements.
    • 4. Full defect processing but no availability measurements. Note that if availability measurements are not being done, network performance measurements are also strictly not possible (since these should only relate to when the LSP is in the available state).
    • 5. Full defect processing and availability measurements. This alternative also allows the option of network performance measurements too.
  • In the following technical details on principles on protection switching is provided for some embodiments of the invention.
  • Protection switching is a fully allocated protection mechanism that can be used on any topology. It is fully allocated in the sense that the route and bandwidth of the protection entity is reserved for a selected working entity. To be effective under all possible failures of the working entity however, the protection entity must be known to have complete physical diversity over all common-failure modes. This may not always be possible.
  • The MPLS PS architecture can be a 1+1 type, a 1:1 type, or 1:N type, and all can be applied in the embodied invention.
  • In the 1+1 architecture type, a protection entity is dedicated to each working entity with the working entity bridged onto the protection entity at the source of the protected domain. The traffic on working and protection entities is transmitted simultaneously to the sink of the protected domain, where a selection between the working and protection entity is made based on some predetermined criteria, such as defect indication. An example of the 1+1 architecture (300) is depicted in the FIG. 3.
  • In the 1:1 architecture type, a protection entity is dedicated to each working entity. The working traffic is transmitted either by working or protection entity. The method for a selection between the working and protection entities depends on the mechanism. The protection entity can be used to carry (so-called) “extra traffic” when it is not used to transmit the working traffic.
  • Some more technical details on the protection switching can be found from the drafted standardization specification Y.1720.
  • Some embodiments of the invention apply real time communication. The real time can be considered as a level of computer responsiveness that a user senses as sufficiently immediate or that enables the computer to keep up with some external process (for example, to present visualizations of the weather as it constantly changes). The real-time is an adjective pertaining to computers or processes that operate in real time. The real time describes a human rather than a machine sense of time. The real time based data communication or connections are highly relevant in telecommunication, especially when the IP appliance is used.
  • Some embodiments of the invention apply Multiprotocol Label Switching (MPLS). The MPLS is a standards-approved technology for speeding up network traffic flow and making it easier to manage. MPLS involves setting up a specific path for a given sequence of packets, identified by a label put in each packet, thus saving the time needed for a router to look up the address to the next node to forward the packet to. MPLS is called multiprotocol because it works with the Internet Protocol (IP), Asynchronous Transport Mode (ATM), and frame relay network protocols. With reference to the standard model for a network (the Open Systems Interconnection, or OSI model), MPLS allows most packets to be forwarded at the layer 2 (switching) level rather than at the layer 3 (routing) level. In addition to moving traffic faster overall, MPLS makes it easy to manage a network for quality of service (QoS). For these reasons, the technique is expected to be readily adopted as networks begin to carry more and different mixtures of traffic.
  • The invention can be applied in many kinds of networks (not just the MPLS) where the OAM (Operation and Maintenance) kind of mechanism is used for monitoring of connection existence. As an example, the appliance in Ethernet based communication providing very fast data transfer. Fast Ethernet provides transmission speeds up to 100 megabits per second and is typically used for LAN, WAN, and MAN backbone systems, supporting workstations with cards. Gigabit Ethernet provides an even higher level of backbone support at 1000 megabits per second (1 gigabit or 1 billion bits per second). 10-Gigabit Ethernet provides up to 10 billion bits per second.
  • Fast Ethernet is a local area network (LAN) transmission standard that provides a data rate of 100 megabits per second. Alternatively, it can be applied in wide area networks (WANs) and metropolitan area networks (MANs). Workstations with existing 10 megabit per second Ethernet card can be connected to a Fast Ethernet network. (The 100 megabits per second is a shared data rate; input to each workstation is constrained by the 10 Mbps card.)
  • Gigabit Ethernet, a transmission technology based on the Ethernet frame format and protocol used in local area networks (LANs), provides a data rate of 1 billion bits per second (one gigabit). Alternatively, it can be applied in wide area networks (WANs) and metropolitan area networks (MANs). Gigabit Ethernet is defined in the IEEE 802.3 standard and is currently being used as the backbone in many enterprise networks. Gigabit Ethernet is carried primarily on optical fiber (with very short distances possible on copper media). Existing Ethernet LANs with 10 and 100 Mbps cards can feed into a Gigabit Ethernet backbone. An alternative technology that competes with Gigabit Ethernet is ATM.
  • A newer standard, 10-Gigabit Ethernet, is also becoming common. 10-Gigabit Ethernet, being standardized in IEEE 802.3ae, is a developing telecommunication technology that offers data speeds up to 10 billion bits per second. Built on the Ethernet technology used in most of today's local area networks (LANs), 10-Gigabit Ethernet is described as a “disruptive” technology that offers a more efficient and less expensive approach to moving data on backbone connections between networks while also providing a consistent technology end-to-end. Using optical fiber, 10-Gigabit Ethernet can replace existing networks that use ATM switches and SONET multiplexers on an OC-48 SONET ring with a simpler network of 10-Gigabit Ethernet switches and at the same time improve the data rate from 2.5 Gbps to 10 Gbps. 10-Gigabit Ethernet is used to interconnect local area networks (LANs), wide area networks (WANs), and metropolitan area networks (MANs). 10-Gigabit Ethernet uses the familiar IEEE 802.3 Ethernet media access control (MAC) protocol and its frame format and size. Like Fast Ethernet and Gigabit Ethernet, 10-Gigabit Ethernet uses full-duplex transmission, which makes possible a considerable distance range. On multimode fiber, 10-Gigabit Ethernet will support distances up to 300 meters; on single mode fiber, it will support distances up to 40 kilometers. Smaller Gigabit Ethernet networks can feed into a 10-Gigabit Ethernet network.
  • FIG. 4 has been described in the foregoing. In the following, corresponding reference signs have been applied to corresponding parts. FIG. 4 depicts in a form of a flow chart a method for detecting a connection fault and accordingly performing a switch-over in accordance with an embodiment of the invention. In step 400 there is established the LSP(s) between the Source and the Sink nodes. The drafted standardization specifications Y.1710, Y.1711, and Y.1720 provided details on the establishment step and on some part of the process. In step 402 the CVs are sent with a nominal frequency. The CVs are sent from the Source to the Sink. The CV flow is generated at the Label Switched Path's (LSP's) source Label Switched Router (LSR) with a nominal frequency of, for example, 1/10 ms (1 CV packet per 10 ms) or 1/15 ms (1 CV packet per 15 ms). The interval for the CV flow nominal frequency can be which ever interval that makes the switch-over time for a possibly protected real-time connection achievable. The interval for sending the CV packet (consequently the sending frequency) is such that it makes the fault detection from the fault event to occur in less than 50 ms. The interval triggers the switch-over to occur also in less than 50 ms from the occurrence of the fault event. The CV flow is terminated at the LSP's sink LSR. Thus, in step 404 the packets for the data communication between the Source and the Sink are received at the Sink. In step 406 the CV packets are detected among the received packets at the Sink. Steps 404 and 406 can be quite instant or even combined. In step 408 there is being monitored whether any CV packet(s) is missing or wrong. Every CV packet missing or wrong in the flow is registered. In step 410 a threshold for missing/wrong CV packets is met or exceeded. Preferably, the threshold is three consecutive missing or wrong CV packets. However, other threshold can be applied as well. If the threshold of the step 410 is met, a connection fault is detected at the Sink in step 412. Consequently, the connection fault notification can be sent in the network (step 414). In the steps 408 and 410 if there are no missing or wrong CV packet(s) or the threshold for the missing or wrong CV packets is not exceeded, for example, there are only few missing or wrong CV packets, the process returns to the step 404. The step 404 can be considered as a readiness state for detecting any possible missing or wrong CV packet.
  • Still referring to the example of FIG. 4, alternatively the detection can take place at network Routers such as LSR Sink, which does not necessary act as the final receiving end for the flow but can convey the flow forward. For example, the FDI is applied in this case to transfer the failure detect indication forward.
  • FIGS. 5 and 6 have been described in the foregoing. FIGS. 5 and 6 depict examples of the packet layer structure in data communication in accordance with the embodied invention. In FIG. 5 the packets indexed with identifier 20 depicts an identifier for a segment of the LSP. The packets indexed with identifier 50 depict the identifier for LSP traffic stream for which the OAM is applied to, and the index 14 represents OAM information packets. An example of the packet layer structure of the data communication in accordance with the embodied invention is depicted in FIG. 6. The lower layers of OSI reference model (L2,L3) are applied.
  • FIG. 7 depicts an embodiment of a network system in which the principles of the invention are applied. The example of FIG. 7 applies the protected connection, and is based on the 1+1 protection switching architecture. A functional working connection (W) and a functional protecting connection (P) couples a node 1 with node 2 preferably via fast data transfer means. Preferably, optical fiber based data transfer lines are applied. Alternatively, the cable coupling such as the copper cable coupling or the radio link coupling can be applied as well. Typically, the data transfer means establish a backbone of IP based network connection. The system of FIG. 7 can operate as the large backbone network using IP for telecommunication services, and the MPLS can be applied as the bearer for such a network. The node 1 and 2 can be a data computing device operating in a data networks such as a computer server. The coupling of the node 1 and the node 2 is via routers 1, 2 and 3, 4, which may also cross. The LSP is established between the nodes via the routers. Data connection packets depicted in the FIG. 7 depicts the segment id (20,30,40) for different segment of the Path, the id (50), and OAM packets (14). The CV packets constitute a part of the OAM packet types (the CV type OAM packet). The sending of the CV packets is described above referring to the example of FIG. 4 step 402. The CV flow is generated in the Node 1. Thus, the node 1 is acting as a Source LSR for the LSP. The flow and the LSP is eventually directed to the node 2. Thus, the node 2 is acting as eventual Sink LSR for the LSP. The termination of the CV flow is operating at the Sink. Additionally the monitoring can take place at network Routers such as LSR Sink, which does not necessary act as the final receiving end for the flow but can convey the flow forward. For example, the FDI is applied in this case to transfer the failure detect indication forward.
  • The system, the network entity, and the computer program product can apply the procedures of the method described in the example of FIG. 4. Consequently, the method can operate in the example of FIG. 7.
  • Particular implementations and embodiments of the invention have been described. It is clear to a person skilled in the art that the invention is not restricted to details of the embodiments presented above, but that it can be implemented in other embodiments using equivalent means without deviating from the characteristics of the invention. The scope of the invention is only restricted by the attached patent claims. Consequently, the options of implementing the invention as determined by the claims, including the equivalents, also belong to the scope of the present invention.

Claims (15)

1. A method for detecting a connection fault and accordingly performing a switch-over in data communication in accordance with a set of rules based on Operation and Maintenance data communication principles, wherein,
an interval for sending connectivity verification data information in the data communication is such that a real time based data communication is achievable,
the interval makes a fault detection from the connection fault in the data communication to occur in less than 200 milliseconds.
2. A method for detecting a connection fault and accordingly performing a switch-over in data communication in accordance with a set of rules based on Operation and Maintenance data communication principles, characterized in that an interval for sending connectivity verification data information in the data communication is such that a real time based data communication is achievable, wherein the interval comprises approximately one connectivity verification packet per 10 milliseconds.
3. A method for detecting a connection fault and accordingly performing a switch-over in data communication in accordance with a set of rules based on Operation and Maintenance data communication principles, characterized in that
an interval for sending connectivity verification data information in the data communication is such that a real time based data communication is achievable,
wherein the interval comprises approximately one connectivity verification packet per 15 milliseconds.
4. A method according to claim 1, wherein the interval further triggers the switch-over to occur in less than 50 milliseconds from an occurrence of the connection fault.
5. A method according to claim 1, wherein the real time based data communication presumes the switch-over to take place in less than 50 milliseconds from an occurrence of the connection fault.
6. A method according to claim 1, wherein the connection fault comprises a predetermined amount of consecutively missing or wrong connectivity verification packets in the data communication.
7. A method according to claim 1, wherein the data communication comprises at least one of Internet Protocol, Ethernet, and MPLS for real time telecommunication services.
8. A method according to claim 1, wherein the data communication comprises LSP based connection.
9. A method according to claim 1, wherein the data communication is based on a protection switching data communication principles.
10. A method according to claim 1, wherein Multiprotocol Label Switching is contained as a bearer for the data communication.
11. A method according to claim 10, wherein Multiprotocol Label Switching operates as a backbone for IP based data communication.
12. A method according to claim 1, wherein the data communication takes place between a source computing entity and a sink computing entity.
13. A method according to claim 1, wherein the connectivity verification data information comprises CV packets.
14. A method for detecting a connection fault and performing a switch-over in data communication in accordance with a set of rules based on Operation and Maintenance data communication principles, comprising:
detecting a connection fault by sending connectivity verification data information, in accordance with a set of rules based on Operation and Maintenance data communication principles, in the data communication within 200 ms after the connection fault occurring to trigger the switch-over in the data communication in real time, with the connectivity verification data information being in the form of connectivity verification packets; and
performing the switch-over in data communication based on the detected connection fault.
15. A method for detecting a connection fault for performing a switch-over in data communication in accordance with a set of rules based on Operation and Maintenance data communication principles, comprising:
sending connectivity verification data information in accordance with the set of rules based on Operation and Maintenance data communication principles,
the connectivity verification data information being sent in an interval making a fault detection from the connection fault in the data communication in real time base data communication to occur in less than 200 milliseconds.
US11/834,731 2002-10-24 2007-08-07 Method, system and network entity for detecting a connection fault Abandoned US20070271484A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/834,731 US20070271484A1 (en) 2002-10-24 2007-08-07 Method, system and network entity for detecting a connection fault

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
FI20021895 2002-10-24
FI20021895A FI122373B (en) 2002-10-24 2002-10-24 Procedure, arrangement and network elements detect a connection error
US10/692,276 US7296177B2 (en) 2002-10-24 2003-10-22 Method, system, and network entity for detecting a connection fault
US11/834,731 US20070271484A1 (en) 2002-10-24 2007-08-07 Method, system and network entity for detecting a connection fault

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US10/692,276 Continuation US7296177B2 (en) 2002-10-24 2003-10-22 Method, system, and network entity for detecting a connection fault

Publications (1)

Publication Number Publication Date
US20070271484A1 true US20070271484A1 (en) 2007-11-22

Family

ID=8564810

Family Applications (2)

Application Number Title Priority Date Filing Date
US10/692,276 Expired - Fee Related US7296177B2 (en) 2002-10-24 2003-10-22 Method, system, and network entity for detecting a connection fault
US11/834,731 Abandoned US20070271484A1 (en) 2002-10-24 2007-08-07 Method, system and network entity for detecting a connection fault

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US10/692,276 Expired - Fee Related US7296177B2 (en) 2002-10-24 2003-10-22 Method, system, and network entity for detecting a connection fault

Country Status (4)

Country Link
US (2) US7296177B2 (en)
EP (1) EP1422870B1 (en)
CN (1) CN1514585A (en)
FI (1) FI122373B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080316920A1 (en) * 2005-12-09 2008-12-25 Electronic & Telecommunications Research Institute Apparatus and Method for Multi-Protocol Label Switching Label-Switched Path Protection Switching
US20100290345A1 (en) * 2007-08-01 2010-11-18 Geroe Balazs Peter Gmpls based oam provisioning

Families Citing this family (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FI122292B (en) * 2002-10-24 2011-11-15 Tellabs Oy Method, apparatus and network elements for performing transmission
US7561527B1 (en) * 2003-05-02 2009-07-14 David Katz Bidirectional forwarding detection
US7924725B2 (en) * 2003-11-10 2011-04-12 Nortel Networks Limited Ethernet OAM performance management
US8045475B2 (en) 2003-11-10 2011-10-25 Nortel Networks Limited Method and apparatus for providing availability metrics for measurement and management of ethernet services
US20050099951A1 (en) * 2003-11-10 2005-05-12 Nortel Networks Limited Ethernet OAM fault detection and verification
CN100359860C (en) * 2004-09-27 2008-01-02 华为技术有限公司 Multiprotocol label switching network protection switching method
CN1756187A (en) 2004-09-30 2006-04-05 华为技术有限公司 Method for processing fault between Egress LSR and its conjoint data devices
JP2006166244A (en) * 2004-12-09 2006-06-22 Toshiba Corp Network telephone system, and main device of the network telephone system
CN1327673C (en) * 2005-01-29 2007-07-18 华为技术有限公司 Data transmitting method and system for multi-protocol label exchange network
CN100389571C (en) * 2005-03-25 2008-05-21 华为技术有限公司 Method for detecting chain circuit fault between end-to-end notes in mixed network
CN100459516C (en) * 2005-04-12 2009-02-04 华为技术有限公司 Automatic identifying method for near-end CV mode of multi-protocol tag exchange
CN100502303C (en) * 2005-04-15 2009-06-17 华为技术有限公司 Method for managing fault of Ethernet and multi-protocol tag exchange network interconnection
US7843845B2 (en) * 2005-11-28 2010-11-30 Alcatel Lucent Diagnostic tool and method for troubleshooting multicast connectivity flow problem(s) in a layer 2 aggregation network
CN100403704C (en) * 2006-03-24 2008-07-16 华为技术有限公司 Method for detecting fault by near-end node
CN1852183A (en) * 2006-04-18 2006-10-25 华为技术有限公司 Method and apparatus for detecting counter defect indication-path condition
US7730029B2 (en) * 2006-09-15 2010-06-01 Alcatel Lucent System and method of fault tolerant reconciliation for control card redundancy
US8169917B2 (en) * 2006-12-01 2012-05-01 Electronics And Telecommunications Research Institute Tandem connection monitoring method in MPLS network
CN101425971B (en) * 2008-12-02 2011-03-16 中兴通讯股份有限公司 T-MPLS path layer tunnel switching method
CN101826989B (en) * 2009-03-02 2013-11-06 华为技术有限公司 Method and device for treating fault
JP5477047B2 (en) * 2010-02-25 2014-04-23 富士通株式会社 Information processing apparatus, virtual machine connection method, program, and recording medium
CN103457792B (en) * 2013-08-19 2017-02-08 大唐移动通信设备有限公司 Fault detection method and fault detection device
CN106411556A (en) * 2015-08-03 2017-02-15 深圳市中兴微电子技术有限公司 OAM message detection defect oscillation processing method, apparatus and system thereof

Citations (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4771425A (en) * 1984-10-29 1988-09-13 Stratacom, Inc. Synchoronous packet voice/data communication system
US5428790A (en) * 1989-06-30 1995-06-27 Fujitsu Personal Systems, Inc. Computer power management system
US5784547A (en) * 1995-03-16 1998-07-21 Abb Patent Gmbh Method for fault-tolerant communication under strictly real-time conditions
US5940396A (en) * 1996-08-21 1999-08-17 3Com Ltd. Method of routing in an asynchronous transfer mode network
US5983294A (en) * 1996-12-12 1999-11-09 Electronics And Telecommunications Research Institute Synchronous cross-connect system with the function of ring network interworking using backplane interconnection
US6011780A (en) * 1997-05-23 2000-01-04 Stevens Institute Of Technology Transparant non-disruptable ATM network
US6141329A (en) * 1997-12-03 2000-10-31 Natural Microsystems, Corporation Dual-channel real-time communication
US6173411B1 (en) * 1997-10-21 2001-01-09 The Foxboro Company Method and system for fault-tolerant network connection switchover
US6222820B1 (en) * 1998-05-28 2001-04-24 3Com Corporation Method of VCC/VPC redundancy for asynchronous transfer mode networks
US20020138645A1 (en) * 2001-03-21 2002-09-26 Norihiko Shinomiya Protecting route design method in a communication network
US20020196735A1 (en) * 2001-06-26 2002-12-26 Tim Hayes Virtual local area network protection switching
US20030043736A1 (en) * 2001-09-04 2003-03-06 Gonda Rumi Sheryar Method for supporting SDH/SONET APS on ethernet
US20030061319A1 (en) * 2001-09-27 2003-03-27 Manzardo Marcel B. Method and apparatus for providing back-up capability in a communication system
US20030112748A1 (en) * 2001-12-17 2003-06-19 Puppa Gary J. System and method for detecting failures and re-routing connections in a communication network
US6771645B1 (en) * 1999-05-28 2004-08-03 Fujitsu Limited Packet relaying apparatus
US20040186701A1 (en) * 2003-01-27 2004-09-23 Raymond Aubin Methods for co-modelling and analyzing packet networks operating over optical networks
US6894970B1 (en) * 2000-10-31 2005-05-17 Chiaro Networks, Ltd. Router switch fabric protection using forward error correction
US7036051B1 (en) * 2002-12-18 2006-04-25 Juniper Networks, Inc. Responsive virtual routing system
US20060090094A1 (en) * 2002-08-02 2006-04-27 Mcdonnell Niall S Real-time fail-over recovery for a media area network
US7039007B1 (en) * 2000-07-31 2006-05-02 Cicso Technology, Inc. System and method for improving reliability of a packet network
US7093027B1 (en) * 2002-07-23 2006-08-15 Atrica Israel Ltd. Fast connection protection in a virtual local area network based stack environment
US7092361B2 (en) * 2001-12-17 2006-08-15 Alcatel Canada Inc. System and method for transmission of operations, administration and maintenance packets between ATM and switching networks upon failures

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH06120985A (en) 1992-10-06 1994-04-28 Oki Electric Ind Co Ltd Packet line backup system
JPH08149131A (en) 1994-11-17 1996-06-07 Hitachi Ltd Fault notice method and node equipment in multi-point atm network
KR100241355B1 (en) 1997-12-03 2000-02-01 정선종 Real time oam processor
JP2001186581A (en) 1999-12-27 2001-07-06 Matsushita Electric Ind Co Ltd Fault detector and fault detection method
US7426179B1 (en) * 2000-03-17 2008-09-16 Lucent Technologies Inc. Method and apparatus for signaling path restoration information in a mesh network
CN1138358C (en) 2000-07-12 2004-02-11 信息产业部武汉邮电科学研究院 Optical cable real time monitoring system

Patent Citations (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4771425A (en) * 1984-10-29 1988-09-13 Stratacom, Inc. Synchoronous packet voice/data communication system
US5428790A (en) * 1989-06-30 1995-06-27 Fujitsu Personal Systems, Inc. Computer power management system
US5784547A (en) * 1995-03-16 1998-07-21 Abb Patent Gmbh Method for fault-tolerant communication under strictly real-time conditions
US5940396A (en) * 1996-08-21 1999-08-17 3Com Ltd. Method of routing in an asynchronous transfer mode network
US5983294A (en) * 1996-12-12 1999-11-09 Electronics And Telecommunications Research Institute Synchronous cross-connect system with the function of ring network interworking using backplane interconnection
US6011780A (en) * 1997-05-23 2000-01-04 Stevens Institute Of Technology Transparant non-disruptable ATM network
US6173411B1 (en) * 1997-10-21 2001-01-09 The Foxboro Company Method and system for fault-tolerant network connection switchover
US6141329A (en) * 1997-12-03 2000-10-31 Natural Microsystems, Corporation Dual-channel real-time communication
US6222820B1 (en) * 1998-05-28 2001-04-24 3Com Corporation Method of VCC/VPC redundancy for asynchronous transfer mode networks
US6771645B1 (en) * 1999-05-28 2004-08-03 Fujitsu Limited Packet relaying apparatus
US7039007B1 (en) * 2000-07-31 2006-05-02 Cicso Technology, Inc. System and method for improving reliability of a packet network
US6894970B1 (en) * 2000-10-31 2005-05-17 Chiaro Networks, Ltd. Router switch fabric protection using forward error correction
US20020138645A1 (en) * 2001-03-21 2002-09-26 Norihiko Shinomiya Protecting route design method in a communication network
US20020196735A1 (en) * 2001-06-26 2002-12-26 Tim Hayes Virtual local area network protection switching
US20030043736A1 (en) * 2001-09-04 2003-03-06 Gonda Rumi Sheryar Method for supporting SDH/SONET APS on ethernet
US20030061319A1 (en) * 2001-09-27 2003-03-27 Manzardo Marcel B. Method and apparatus for providing back-up capability in a communication system
US20030112748A1 (en) * 2001-12-17 2003-06-19 Puppa Gary J. System and method for detecting failures and re-routing connections in a communication network
US7092361B2 (en) * 2001-12-17 2006-08-15 Alcatel Canada Inc. System and method for transmission of operations, administration and maintenance packets between ATM and switching networks upon failures
US7093027B1 (en) * 2002-07-23 2006-08-15 Atrica Israel Ltd. Fast connection protection in a virtual local area network based stack environment
US20060090094A1 (en) * 2002-08-02 2006-04-27 Mcdonnell Niall S Real-time fail-over recovery for a media area network
US7036051B1 (en) * 2002-12-18 2006-04-25 Juniper Networks, Inc. Responsive virtual routing system
US20040186701A1 (en) * 2003-01-27 2004-09-23 Raymond Aubin Methods for co-modelling and analyzing packet networks operating over optical networks

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Armitage, Grenville, "MPLS: The Magic Behind the Myths", 2000 IEEE. *
Harrison et al., "OAM Functionality for MPLS Networks", February 2001, IETF. *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080316920A1 (en) * 2005-12-09 2008-12-25 Electronic & Telecommunications Research Institute Apparatus and Method for Multi-Protocol Label Switching Label-Switched Path Protection Switching
US7872967B2 (en) * 2005-12-09 2011-01-18 Electronics And Telecommunications Research Institute Apparatus and method for multi-protocol label switching label-switched path protection switching
US20100290345A1 (en) * 2007-08-01 2010-11-18 Geroe Balazs Peter Gmpls based oam provisioning
US8102774B2 (en) * 2007-08-01 2012-01-24 Telefonaktiebolaget Lm Ericsson (Publ) GMPLS based OAM provisioning

Also Published As

Publication number Publication date
FI122373B (en) 2011-12-30
CN1514585A (en) 2004-07-21
EP1422870A1 (en) 2004-05-26
EP1422870B1 (en) 2011-06-15
FI20021895A0 (en) 2002-10-24
FI20021895A (en) 2004-04-25
US20040133368A1 (en) 2004-07-08
US7296177B2 (en) 2007-11-13

Similar Documents

Publication Publication Date Title
US20070271484A1 (en) Method, system and network entity for detecting a connection fault
US8971189B2 (en) Label switched path OAM wrapper
US7778163B2 (en) System and method for detecting failures and re-routing connections in a communication network
US7075932B2 (en) Communication device for selecting route of packet
US7167443B1 (en) System and method for packet level restoration of IP traffic using overhead signaling in a fiber optic ring network
EP1777897B1 (en) A method for implementing management and protection by dividing domain in the label switching network
US6925054B1 (en) Network path protection
EP1320219B1 (en) System and method for transmission of operations, administration and maintenance packets between ATM and switching networks upon failures
US6532088B1 (en) System and method for packet level distributed routing in fiber optic rings
US7693078B2 (en) Method for supporting SDH/SONET OAMP on Ethernet
US6891793B1 (en) Network system
JP2003229888A (en) Label switching network and label switching path setting method to be used for the network
EP3734915B1 (en) Faster fault-detection mechanism using bidirectional forwarding detection (bfd), on network nodes and/or hosts multihomed using a link aggregation group (lag)
Metz IP protection and restoration
US8125893B2 (en) Method, system, and network entity for performing a switch-over
US20080212610A1 (en) Communication techniques and generic layer 3 automatic switching protection
Cavendish et al. Operation, administration, and maintenance in MPLS networks
EP1798912B1 (en) A method for transmitting control message in mpls ring network
Cisco Glossary
JP2003338831A (en) Switching method for mpls network
WO2005050933A1 (en) Point-to-point route monitoring in a packet-based core network
Das et al. A method of designing a path restoration scheme for MPLS based network
Tanaka et al. A development of circuit emulation system on TDM over Ethernet comprising OAM and protection function
TELECOMMUNITY Packet Transport Networks: Overview and Future Direction
Katsavos Multi Protocol Label Switching Transport Profile (MPLS-TP) in OpMiGua hybrid network

Legal Events

Date Code Title Description
AS Assignment

Owner name: TELLABS OY, FINLAND

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:JOHANSSON, SIXTEN;KANKKUNEN, ANTTI;REEL/FRAME:019655/0718;SIGNING DATES FROM 20040121 TO 20040126

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION