摘要:
Ethernet OAM connectivity check may be used to detect connectivity failures across a given pair of network elements on an Ethernet network. Connectivity check frames are generated and sent to a specific unicast DA or to a multicast DA. Once a network element begins to receive connectivity check frames, it expects to continue to receive further periodic connectivity check frames from that network element. If the network element stops receiving periodic connectivity check frames, it detects that connectivity to the sending network element is broken. Once a fault is identified, the fault may be verified using a loopback function, which causes a network element receiving an Ethernet frame to transmit a corresponding frame back to the original network element. Loopback may be intrusive such that all received frames are looped back except OAM frames, or non-intrusive where only OAM frames are looped back.
摘要:
Described are a system and method for identifying private resources associated with a communications network. A structured address format is defined having a plurality of character positions. Each character position is associated generally with a property of a managed resource in the communications network. A structured private address, constructed according to the structured address format, is assigned to the managed resource. Each character position of the assigned structured address has a value that identifies a specific instance of the property of the managed resource associated with that character position. Operations Systems Support (OSS) gives a common name to the managed resource and maintains an association between the common name and the structured address. The structured address format can follow a four-byte dotted decimal notation similar to IPv4 addresses. For addresses following this format, the OSS can use standard domain name system services to translate between common names and structured addresses.
摘要:
A packet network linear protection method, a network, and a node in a dual or multi-home configuration include designating each of a plurality of home nodes in the dual or multi-home configuration as a working home or a protect home; designating each link between each of the plurality of home nodes and an end node in the dual or multi-home configuration as active or standby; operating a protection switch state machine based on an associated linear protection protocol at each of the plurality of home nodes and the end node; communicating protection messages to each of the plurality of home nodes from the end node; and communicating protection states in an associated protection switch state machine by each of the plurality of home nodes to other home nodes and to the end node.
摘要:
A node includes a first port configured to be selectively blocked and unblocked; a second port configured to be selectively blocked and unblocked; a forwarder between the first port and the second port; a management channel between the first port and the second port, wherein the selective blocking and unblocking of the first port and the second port is based on the management channel; and a data channel between the first port and the second port, wherein the data channel utilizes an arbitrary service identifier. A method can include operating a ring with Ring Protection Switching comprising a forwarding mechanism and a blocking mechanism that are independent and decoupled entities therebetween, wherein the ring includes a management channel and a data channel that each utilize an arbitrary service identifier.
摘要:
A Carrier Ethernet method includes receiving a request to initiate an Ethernet Operations, Administration, and Maintenance (OAM) session at a local device, setting up the OAM session at the local device responsive to the request, transmitting a Protocol Data Unit (PDU) from the local device to a remote device with information related to the OAM session and the request contained therein, and receiving the PDU at the remote device and setting up the OAM session at the remote device based on the information in the PDU. The OAM session can include Ethernet Frame Loss Measurement and can be initiated only at the local device without requiring operator involvement at the remote device.
摘要:
The present disclosure provides protection systems and methods that provide a mechanism to identify/determine when an interconnection node has been isolated (i.e. when there is no connectivity between a pair of interconnection nodes), from a data path perspective. If/when this condition exists, actions are triggered on the subtending sub-ring that essentially perform a protection switch (which causes the subtending sub-ring nodes to cleanse their forwarding tables), and, more importantly, that remove any channel blocks on the subtending sub-ring. Extensions to the ITU-T G.8032 state machine are also provided that include support for operator command interactions (e.g. DNR, force switch, manual switch, etc.). The protection systems and methods of the present disclosure enable the reliable application of ITU-T G.8032 and the like to more complex (i.e. meshed) deployment environments, among other significant advantages.
摘要:
An edge device is used to support a backbone provider bridging network to facilitate interconnection of a plurality of networks. The edge device is coupled between the backbone and a first one of the networks, and is operable to encapsulate data units received from the first network with a header, and to forward the encapsulated data unit to the backbone. The header is indicative of a tunnel that is used to support traffic from the first network to a second network over the backbone. The edge device also de-encapsulates data units received from the backbone that are destined for the first network.
摘要:
Described are a system and method for managing a service transported over a transport network between first and second service termination points. Packet traffic associated with the service is received at a service termination point connected to the transport network. Performance of the packet traffic is measured at the service termination point. The measured performance of the packet traffic and the service are correlated to produce a performance of service (PoS) service metric. Based on the PoS service metric, other service metrics associated with the service are correlated, including a rate of service (RoS) service metric and availability of service (AoS) service metric. These service metrics can be used to develop service level agreement (SLA) and service level metrics that define the operation of the service and operation of the network supporting those services.
摘要:
The present disclosure provides systems and methods for scaling performance of Ethernet Ring Protection Protocol. Specifically, the systems and methods may apply to G.8032 and may provide protection switching control plane performance scaling benefits. In an exemplary embodiment, the present invention summarizes the per “virtual” ring control plane protocol into a single logical ring control plane protocol. Advantageously, the present invention transforms the G.8032 protocol from a per-virtual ring protocol to a per-logical ring control protocol. The mechanism/methodology that is used is to include minimal per-virtual ring instance information in to the Ring Automated Protection Switching (R-APS) (control) frames. Additionally, the present invention cleanly decouples the placement of the R-APS (control) channel block location on the ring from that of the virtual channel data blocks. Current G.8032 specifications tightly couple the location of each R-APS (control) channel block and the virtual channel block that it is managing.
摘要:
A method of routing traffic through a packet network having a mesh physical topography. At least two types of network primitive are defined, each type of network primitive providing a respective model of traffic forwarding through at least two neighbour nodes of the network. A network model encompassing at least a portion of the network is constructed using a set of two or more interconnected network primitives. The network model has nodes and links corresponding to respective nodes and lines of the network. Respective forwarding information is computed for each node of the network model. For each node of the network model, the respective computed forwarding information is installed in a forwarding database of the corresponding node of the network, such that traffic is forwarded by each node of the network in accordance with the respective computed forwarding information.