US20020023170A1 - Use of active topology protocols, including the spanning tree, for resilient redundant connection of an edge device - Google Patents
Use of active topology protocols, including the spanning tree, for resilient redundant connection of an edge device Download PDFInfo
- Publication number
- US20020023170A1 US20020023170A1 US09/796,842 US79684201A US2002023170A1 US 20020023170 A1 US20020023170 A1 US 20020023170A1 US 79684201 A US79684201 A US 79684201A US 2002023170 A1 US2002023170 A1 US 2002023170A1
- Authority
- US
- United States
- Prior art keywords
- network
- spanning tree
- port
- protocol
- switches
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 claims abstract description 22
- 230000004044 response Effects 0.000 claims abstract description 8
- 238000004891 communication Methods 0.000 claims description 26
- 238000012544 monitoring process Methods 0.000 claims description 3
- 239000000835 fiber Substances 0.000 description 32
- 238000005516 engineering process Methods 0.000 description 10
- 230000005540 biological transmission Effects 0.000 description 6
- 230000008901 benefit Effects 0.000 description 4
- 230000000903 blocking effect Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 238000007726 management method Methods 0.000 description 4
- 230000008859 change Effects 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 238000011144 upstream manufacturing Methods 0.000 description 3
- 230000009977 dual effect Effects 0.000 description 2
- 238000001914 filtration Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000036541 health Effects 0.000 description 2
- 238000012946 outsourcing Methods 0.000 description 2
- 238000005192 partition Methods 0.000 description 2
- 230000000644 propagated effect Effects 0.000 description 2
- 238000012360 testing method Methods 0.000 description 2
- RYGMFSIKBFXOCR-UHFFFAOYSA-N Copper Chemical compound [Cu] RYGMFSIKBFXOCR-UHFFFAOYSA-N 0.000 description 1
- 230000002776 aggregation Effects 0.000 description 1
- 238000004220 aggregation Methods 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 239000003795 chemical substances by application Substances 0.000 description 1
- 239000003086 colorant Substances 0.000 description 1
- 230000000295 complement effect Effects 0.000 description 1
- 239000010949 copper Substances 0.000 description 1
- 229910052802 copper Inorganic materials 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 239000000047 product Substances 0.000 description 1
- 230000008707 rearrangement Effects 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
- 230000009897 systematic effect Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
Definitions
- the present invention relates to configuration of edge devices for networks, including broadband communication networks, and more particularly to configuration of networks managed according to an active topology protocol, including the spanning tree protocol.
- an active topology protocol such as the Spanning Tree Protocol IEEE802.1D.
- connections between packet switches are sometimes made by point to point links, using for example fiber optic cable, in a ‘redundant, dual-homed, tree like’ topology to facilitate rapid reconfiguration with the minimum loss of service.
- the revised spanning tree protocol under standardization in IEEE 802.1w is a suitable protocol for establishing the failover rules in the network.
- the recently completed link aggregation standard, IEEE Std. 802.3ad is another—providing for resiliency of parallel links.
- the IEEE 802.1 spanning tree provides for redundant connections within a network, where data transmitted from one attachment to the network to another is constrained to follow a loop free path. It reduces the physical topology of the network to an active topology that is both loop free (‘tree’) and fully connected (‘spanning’).
- Redundant connection of the edge devices to the active topology network creates a possibility of a loop forming through the edge device to maintain the spanning tree.
- edge devices coupled to the spanning tree network have not participated in the tree, so that they do not become transit nodes for traffic of the network.
- the selection of one link or another for connection to the interior of a network has been performed by a simple physical layer redundancy scheme that interrogates the health of the links from an edge switch to the network.
- One link is configured as a primary, or active, link and the secondary link is activated only if the primary fails a simple connectivity test to the remainder of the network, e.g. loss of the transmitted light signal.
- This invention comprises a method for configuring a network, and a network configured according to such method, providing resilient, redundant connection to an edge device.
- the system improves on the prior art arrangements, while not allowing the edge device to participate in the active topology of the network managed for example according to a spanning tree protocol, by choosing the active link from the edge device to the network on the basis of the active topology information received by the device, but not allowing it to forward or generate active topology information.
- This arrangement protects against a failure in the network that causes the switch connected to by the edge device to be separated from the main body of the network, by allowing the edge device to use the active topology information propagated in the network to select a link to the network based upon changes that occur remote from the switch to which it has immediate connection.
- the method manages the redundant connections of an edge device between a first network and a second network, where the second network is managed according to a spanning tree protocol in which spanning tree configuration messages propagate among switches in the second network.
- the redundant connections are made via a plurality of ports on the edge device coupled to the second network.
- monitoring spanning tree configuration messages at least one port of the plurality of ports on the edge device coupled to the second network
- the active port is selected in a preferred embodiment by selecting a port having a least cost path to a root of the second network according to the spanning tree protocol.
- the edge device does not propagate, nor generate spanning tree configuration messages.
- a communication system is provided using technology that has been developed within the communications, enterprise data networking, electronic commerce, and carrier service provider industries.
- the system is configured to provide service in new ways, supporting secure point-to-multipoint channels, and other connectivity options in a manner particularly complementary to a provisioning process and system described in the above referenced application entitled E-COMMERCE SYSTEM FACILITATING SERVICE NETWORKS INCLUDING BROADBAND COMMUNICATION SERVICE NETWORKS.
- the network architecture in a preferred embodiment organizes switches into demarcation devices, access switches and interior switches.
- Demarcation devices also referred to herein as service interface units
- Each demarcation device supports one or more of service interfaces, identifiable by unique addresses such as Ethernet MAC addresses, by which a customer network is connected to the active topology network, and one or more ‘drops’ that connect to access ports on access switches.
- Access switches are located on premises physically secured, linked by a communication media of choice, including for example fiber optic cable, to a collocation site in the metropolitan area network.
- the access switches In addition to access ports coupled to the demarcation devices, the access switches have interior network ports that connect to interior switches at the collocation sites within the network.
- Interior switches form the heart of the network, typically in collocation sites of the metropolitan area network, having ports coupled to the interior ports of the access switches.
- the identity of the connected device on a service interface is ascertained by observing packets transmitted by the device at the service interface of the demarcation device.
- Each packet contains a source address, such as a source MAC address.
- the MAC address is captured by the service interface and a notification sent to the system managing the network using normal network management protocols.
- the management system assures itself that the MAC address is unique. Filters are configured on access ports of the access switches to ensure that only packets with source addresses checked in this way are accepted from the attached demarcation device. Similarly only packets from source addresses that are permitted to transmit to the demarcation device are allowed to egress from the access port to the demarcation device.
- Interior switches do not filter or otherwise constrain connections on the basis of the identities of devices attached to either the transmitting or receiving service interfaces. This allows the active topology maintained by interior switches to scale independently of the number of active connections through the network, and to reconfigure rapidly since information concerning individual connections does not have to be communicated or changed during reconfiguration.
- demarcation devices can provide for redundant connections to the rest of the network. Selection of one link in preference to another can be achieved by use of the spanning tree or another active topology protocol. However, only traffic that is transmitted by or destined for a given customer is allowed to reach that customer's demarcation device. It is not desirable that a demarcation device act as a transit link in the network, that would be used to ensure full connectivity from one part of the network to another, either during a reconfiguration of the network or while the active topology is stable. Rather the network should partition if there is no connectivity other than through a demarcation devices between the two halves.
- a range of options is offered to customers to control changes to the source MAC address used on the service interfaces of demarcation devices including automatic configuration, latching of a learnt address, explicit manual configuration, and identification of attempts at intrusion into the network.
- the system is capable of extension to allow additional security protocols to establish the identity of the connecting system. Once that identity has been established, the MAC address of the transmitting system is used, as described above, to secure connections.
- Disconnection and reconnection of the device can be detected, even if the same MAC address is used throughout. This protects against attempts to masquerade once a device identity has been established.
- a foundation of industry standard products and practices in the following areas is used to construct the novel networks, including for one example:
- Gigabit (or higher) Ethernet packet switching technology to accept and deliver IP data from and to customers, providing a highly reliable service.
- a set of rules and heuristics is provided for the use and configuration of fiber optic transmission facilities, purchased or leased in ring configurations, as a set of links comprising selected concatenated segments from a set of rings.
- the resulting configurations have benefits in networks including:
- a link can comprise logical segments, each consisting for example of a wavelength of light transmitted and received by WDM (wavelength division multiplexing) equipment attached to the physical fiber segment running between two locations on a ring.
- WDM wavelength division multiplexing
- Security arrangements for a packet switched data transmission network using LAN switches are provided.
- the network makes use of packet data switching equipment that is typically used in private data networks. While such equipment has facilities that can be used to construct ad-hoc security arrangements, a systematic approach to security is provided by the present invention.
- the network ensures that no data is ever delivered to a service interface other than the service interface(s) explicitly authorized by the customer whose network attached equipment transmits the data, and that no data is received on a service interface other than data from the service interface(s) explicitly authorized by the customer whose network attached equipment is receiving the data.
- the mechanisms that the system uses to ensure such secure delivery include:
- FIG. 1 is a diagram of a commercial communication service with an Internet based provisioning server according to the present invention.
- FIG. 2 is a block diagram of a network managed according to an active topology protocol, and including edge devices with resilient, redundant connections to the network, according to the present invention.
- FIG. 3 is a diagram illustrating an edge device architecture according to the present invention.
- FIG. 4 shows a network configured according to a spanning tree protocol, with edge devices according to the present invention.
- FIG. 5 illustrates a redundant switch access service with parallel drops.
- FIG. 6 illustrates a parallel single tenant access service with two drops coupled to a single access switch.
- FIG. 7 illustrates a fully redundant single tenant access service according to one aspect of the invention.
- FIG. 8 illustrates a collocation facility access arrangement for connection to the secure MAN of the present mention.
- FIG. 9 illustrates another example collocation facility access arrangement.
- FIG. 10 illustrates a fiber MAN network physically laid out as a ring, and partitioned as segments of the secure MAN of the present invention.
- FIG. 1 illustrates a communications service example, based on provisioning links among a variety of customers within a secure metropolitan area network MAN.
- a secure MAN based upon a layer two packet switched protocol, preferably Ethernet, and in which the switches are managed by an active topology protocol such as the spanning tree protocol, is represented by cloud 60 .
- a number of customers including Internet service provider 61 , outsourcing vendor 62 , “enterprise 1” with a North campus 63 , a West campus 24 , and a South campus 25 , and “enterprise” 2 66 and enterprise 3 67 , are coupled to the secure MAN 60 by appropriate physical and logical interfaces.
- a provisioning server 71 is coupled to the secure MAN 60 , either using the secure MAN medium or by other communication channels to the switches and other resources in the secure MAN, and facilitates transactions among the customers of the secure MAN 60 for establishing communication channels, such as the virtual connections discussed above, and provisioning of services agreed to by the customers with the resources of the secure MAN 60 .
- configuring and allocating of services within the secure MAN 60 to support the links among the customers is managed by the provisioning server using a management protocol such as Telnet or SNMP, under which filters and other control data structures in the switches are configured.
- the provisioning server is available via the Internet to customers and potential customers of the secure MAN 60 , using standard technology.
- Virtual connection services allow rich connectivity among all customer locations on the secure MAN network. Examples include:
- a point-to-multipoint virtual connection service 76 connecting an Internet Service Provider to customers.
- a single customer can have simultaneous intra-enterprise and extra-enterprise communications using the secure MAN, provisioned according to the present invention.
- Edge devices (not shown) between the customer networks or devices, and the secure MAN support security processes for the MAN, and include redundant connections to switches in the network in a preferred configuration for improved reliability and efficiency.
- FIG. 2 is a block diagram of a network configured according to the present invention to support point-to-multipoint virtual connections, among a plurality of customers of a public metropolitan area network.
- the customers have local networks 100 , 101 , 102 , and 103 .
- Each of the customers includes customer equipment, such as a router (not shown), having unique MAC addresses, connected by a link to a port on a service interface unit.
- the customer 100 is connected by links 100 - 1 and 100 - 2 to the service interface unit 105 .
- the customer 100 connected by links 100 - 3 and 100 - 4 to the service interface unit 106 .
- the customer 101 is connected by link 101 - 1 to the service interface unit 107 .
- the customer 102 connected by the links 102 - 1 and 102 - 2 to service interface unit 108 .
- Customer 103 is connected by link 103 - 1 to service interface unit 109 .
- the service interface units comprise switches at customer premises in which demarcation points for access to the metropolitan area network are established.
- Each of the links 100 - 1 through 100 - 4 , 101 - 1 , 102 - 1 , 102 - 2 , and 103 - 1 are connected at the customer side to ports on customer devices having unique MAC addresses.
- the demarcation points for the network can be considered ports on the service interface unit characterized by the unique MAC addresses of the attached customer equipment.
- the service interface units 105 - 109 are connected by point-to-point links to access switches 110 , 111 , 112 in the network.
- service interface unit 105 is coupled by links 105 - 1 and 105 - 2 to the access switch 110 .
- Service interface unit 105 is coupled by the link 105 - 3 to the access switch 111 .
- Service interface unit 106 is coupled by the link 106 - 1 to the access switch 110 , and by link 106 - 2 to the access switch 111 .
- Service interface unit 107 is coupled by the link 107 - 1 to the access switch 111 , and by the link 107 - 2 to the access switch 112 .
- Service interface unit 108 is coupled by the link 108 - 1 to the access switch 111 , and by the link 108 - 2 to the access switch 112 .
- Service interface unit 109 is coupled by the link 109 - 1 and by the link 109 - 2 to the access switch 112 .
- the service interface units 105 - 109 are managed so that only one of the links between the service interface units and an access switch in the network is active at anytime.
- a modified spanning tree protocol is utilized to select the active link as described below.
- the access switches 110 - 112 are coupled to interior switches of the metropolitan area network 115 .
- the security arrangements for the virtual channels are deployed in the access switches 110 - 112 via source address filtering based upon the unique MAC addresses of the demarcation points at service interface units in the network.
- the Rapid Spanning Tree Algorithm assigns one of the following Port Roles to each Bridge Port: Root Port, Designated Port, Alternate Port, or Backup Port.
- a fifth role, Disabled Port identifies a Port as having no role within the operation of Spanning Tree.
- Port Role assignments for ports throughout the Bridged Local Area Network are determined by: a) A unique Bridge Identifier associated with each Bridge, b) A Path Cost associated with each Bridge Port, c) A Port Identifier associated with each Bridge Port, as follows.
- the Bridge with the best Bridge Identifier is selected as the Root Bridge.
- the unique Bridge Identifier for each Bridge is derived, in part, from the Bridge Address (7.12.5) and, in part, from a manageable priority component (9.2.5).
- the relative priority of Bridges is determined by the numerical comparison of the unique identifiers, with the lower numerical value indicating the better identifier.
- Every Bridge has a Root Path Cost associated with it. For the Root Bridge this is zero. For all other Bridges it is the sum of the Path Costs for each Bridge Port receiving frames on the least cost path from the Root Bridge to that Bridge.
- the Path Cost associated with each Port may be manageable. Additionally, 17.28.2 recommends default values for the Path Costs associated with Ports attached to LANs of specific MAC types and speeds.
- the Bridge Port on each Bridge receiving the frames on the least cost path from the Root Bridge is assigned the role of Root Port for that Bridge (the Root Bridge does not have a Root Port). If a Bridge has two or more ports with the same least Path Cost sum from the Root, then the port with the best Port Identifier is selected as the Root Port. Part of the Port Identifier is fixed and is different for each Port on a Bridge, and part is a manageable priority component (9.2.7). The relative priority of Ports is determined by the numerical comparison of the unique identifiers, with the lower numerical value indicating the better identifier.
- Each LAN in the Bridged Local Area Network also has an associated Root Path Cost. This is the Root Path Cost of the lowest cost Bridge with a Bridge Port connected to that LAN. This Bridge is selected as the Designated Bridge for that LAN. If there are two or more Bridges with the same Root Path Cost, then the Bridge with the best priority (least numerical value) is selected as the Designated Bridge. The Bridge Port on the Designated Bridge that is connected to the LAN is assigned the role of Designated Port for that LAN. If the Designated Bridge has two or more ports connected to the LAN, then the Bridge Port with the best priority Port Identifier (least numerical value) is selected as the Designated Port. In a Bridged Local Area Network whose physical topology is stable, i.e. the Rapid Spanning Tree Algorithm has communicated consistent information throughout the network, every LAN has one and only one assigned Designated Port, and every Bridge with the exception of the Root Bridge has a Root Port connected to a LAN.
- Any operational Bridge Port that is not assigned a Port Role of Root Port or Designated Port is a Backup Port if that Bridge is the Designated Bridge for the attached LAN, and an Alternate Port otherwise.
- An Alternate Port offers an alternate path in the direction of the Root Bridge to that provided by the Bridge's own Root Port, whereas a Backup Port acts as a backup for the path provided by a Designated Port in the direction of the leaves of the Spanning Tree.
- Backup Ports exist only where there are two or more connections from a given Bridge to a given LAN; hence, they (and the Designated Ports that they back up) can only exist where two ports are connected together in loopback by a point to point link, or where the Bridge has two or more connections to a shared media LAN segment.
- IEEE Draft P802.1w/D9 and IEEE Std 802.1D are incorporated by reference as if fully set forth herein, providing examples of spanning tree protocols, and of 802.1 standard spanning tree protocols.
- the spanning tree protocol (or another active topology protocol) is used on edge devices, which act as an interface between customer equipment and a network executing the active topology protocol, to selected an active connection to the network.
- the spanning tree protocol is run to select a Root Port, and to use the selected port as the active connection to the network.
- no packets ingressing at a port coupled to the spanning tree network are allowed to egress at any port coupled to the spanning tree network.
- Ports coupled to the spanning tree network that are not selected as the active port are placed in blocking state, and provide a backup connection to the spanning tree network. No traffic is allowed to traverse the edge device, except that destined to the customer equipment, or originating in the customer equipment.
- the edge device, and the customer equipment are therefore protected from becoming a link between portions of the spanning tree network, while taking advantage of the intelligence of the spanning tree protocol to make efficient choices of active links to the network. If the spanning tree costs of the ports change, then the ports coupled to the spanning tree network in the blocking state may be selected as the active port.
- FIG. 3 illustrates a basic configuration of a network using the modified spanning tree protocol of the present invention.
- a Metropolitan Area Network 120 includes interior switches 121 and 122 , operating a layer two protocol, such as Gigabit Ethernet, with switches configured using the spanning tree protocol.
- Access switches 123 and 124 are coupled to the interior switches 121 and 122 by a redundant, route diverse collection of links 125 , 126 , 127 and 128 .
- the access switches include resources for source address filtering to provide for provisioning of secure communication channels among customers of the network, as described in the above cross-referenced application.
- Service interface unit 129 is coupled to the access switches by links 131 and 132 . Other service interface units may also be coupled to the access switches 123 and 124 .
- the access switches and the interior switches participate in the spanning tree, and propagate spanning tree configuration messages, known as BPDUs, to support the dynamic configuration of the switches in the spanning tree network.
- BPDUs spanning tree configuration messages
- the service interface unit 129 selects an active link based upon the spanning tree information received from the access switches 123 and 124 .
- service interface unit 129 selects either link 131 or link 132 as an active link in response to the spanning tree configuration messages received at one or both of the network interfaces coupled to the links 131 and 132 .
- the service interface unit is configured to prevent any packet ingressing on the links 131 and 132 from egressing on the links 131 and 132 .
- packets ingressing at a port on the edge device are associated with a port number.
- the edge device is configured so that the ingress port number is used as a filter to prevent egress of packets on other ports coupled to the spanning tree network.
- no transit path can be established between the links 131 and 132 . In this manner, traffic from access switch 124 , will not follow the route 136 on link 132 to service interface unit 129 , and on link 131 to access switch 123 in its route to the root of the tree, even if this route 136 would otherwise be the least cost route according to the spanning tree.
- FIG. 4 shows one example network topology with spanning tree configuration information, according to a preferred embodiment in which the interior switches comprise high speed Ethernet switches in collocation sites in a metropolitan area network.
- the network includes a plurality of fiber segment extending between collocation sites.
- the fiber segments are arranged for configuration as a ring, but partitioned and managed according to a spanning tree protocol.
- the switches P 5 and P 6 correspond to the interior switches 121 and 122 of FIG. 3.
- the filled circle, unfilled circle, and parallel line markings correspond to the designated port, root port, and alternate port in the blocking state, respectively, according to the spanning tree protocol.
- the switch P 1 is the root of the tree.
- the switch P 1 has five designated ports. One designated port is coupled to an alternate port on switch P 3 via an internal link. Another designated port on switch P 1 is coupled to a root port on switch P 2 via a link 2 - 1 . Another designated port on switch P 1 is coupled to a root port on switch P 5 via link 5 - 1 . A fourth designated port on switch P 1 is coupled to a root port on switch P 4 via a link 1 - 4 .
- a fifth designated port on switch P 1 is coupled to a root port on P 2 via a link 1 - 2 .
- a designated port on switch P 6 is coupled via a link 6 - 3 to a root port on switch P 3 .
- a designated port on switch P 5 is coupled to an alternate port on switch P 6 via an internal link.
- a designated port on switch P 2 is coupled to a root port on switch P 6 via link 2 - 6 .
- a designated port on switch P 2 is coupled via an internal link to an alternate port on switch P 4 .
- the access switches 123 and 124 , and the service interface unit 129 have the same reference numerals as used in FIG. 3.
- Switch P 5 has designated ports coupled via links 125 and 128 to root ports on access switches 123 and 124 respectively.
- Switch P 6 has designated ports coupled via links 126 and 127 to ports in a blocking state on access switches 123 and 124 , respectively, acting as backup links.
- the spanning tree configuration information is propagated to the service interface unit 129 , which elects the network interface coupled to link 131 as the active link, and the network interface coupled to link 132 as the backup link. This could be changed for example if the link 125 were broken, making the port coupled to link 126 become selected as the root port on switch 123 .
- the best route to the root for the service interface unit 129 would change from link 131 to link 132 , in this case; because the route through access switch 124 , and interior switch P 5 to the root P 1 , is a lower cost path than the route through access switch 123 on link 126 , interior switch P 6 , and interior switch P 2 to the root P 1 .
- FIG. 5 shows configuration of an access service for a spanning tree network according to the present invention, and includes a demarcation device 200 , a secure network switch 201 and customer-owned equipment 202 .
- the demarcation device 200 supports a plurality of service interfaces to customer equipment in this example.
- a demarcation device 200 is typically situated between customer-owned equipment and a secure MAN access switch.
- the demarcation device 200 connects to customer-owned equipment 202 through one or more service interfaces 203 .
- the demarcation device 200 converts between the physical layer of the drop 204 and that of the service interfaces 203 .
- the demarcation device 200 also performs surveillance and maintenance functions.
- the drop 204 will typically use a fiber optic link with at least 1 Gbps bandwidth although other transmission technologies may be used, e.g., high bandwidth wireless transmission.
- the type of transmission used is transparent to the customer.
- the service interface 203 is the point at which customer-owned equipment 202 , typically an internet protocol IP or multiprotocol router, is attached. This interface 203 runs IP over 10/100/1000 Mbps Ethernet for example, using either a copper or fiber physical layer. An auto-sensing 10/100 Ethernet service interface may also be used. Also, other higher speed Ethernet technologies could be used.
- the ‘demarcation devices’ situated on individual customer's premises can provide for redundant connections to the rest of the network. Selection of one link in preference to another can be achieved by use of the spanning tree or a similar protocol. However, only traffic that is transmitted by or destined for a given customer is allowed to reach that customer's demarcation device (a packet switch). It is not desirable that a demarcation device act as a transit link in the network, ensuring full connectivity from one part of the network to another, either during a reconfiguration of the network or while the active topology is stable. Rather the network should partition if there is no other connectivity between the two halves.
- One embodiment of the secure MAN improves on this prior arrangement, while not allowing the demarcation device to participate in the active topology of the network, by choosing the active link from the demarcation device to the network on the basis of the spanning tree information received by the device, but not allowing it to forward or generate spanning tree information.
- This arrangement protects against a failure in the network that causes the switch connected to by the demarcation device to be separated from the main body of the network.
- the access option of FIG. 5 involves use of a redundant switch access service, in which a second drop 210 is connected from the demarcation device 200 to a different secure MAN switch 211 . This is done to maximize diversity. A failure of a drop, the switch, or the switch port will result in data flowing over the drop to be rerouted over the redundant drop in a very short time, e.g., less than 50 ms.
- the drops will typically reside within the same physical path from the customer premises to the first splice point at which point they will follow diverse physical paths.
- Parallel single tenant access service is another alternative, as shown in FIG. 6.
- drops 204 and 212 terminate on the same secure MAN switch 201 .
- the multiple drops 204 , 212 can be used for load sharing in that data can flow over the drops simultaneously.
- data flowing over the drop will be rerouted to the other drop in a very short time, e.g., less than 50 ms.
- the drops will typically reside within the same physical path from the customer premises to the point-of-presence of the first secure MAN switch.
- Another access service option is fully redundant single tenant access service as illustrated in FIG. 7, including redundant demarcation devices 200 , 220 and redundant switches 204 , 221 with redundant drops 204 , 222 , 223 , 224 for each demarcation device-access switch pair.
- Fully redundant single tenant access service protects against the same failures that redundant switch single tenant access service does and in addition protects against failure of a demarcation device and the failure of the customer-owned equipment attached to a service interface.
- Both service interfaces 203 , 225 are activated for customer use but the ability to simultaneously use them will depend on the details of the routing protocol being used by the customer. Similarly the ability of the customer-owned equipment to detect a failure and start using a service interface on the other demarcation device will depend on the details of the routing protocol being used by the customer.
- the drops will typically reside within the same fiber optic cable from the customer premises to the first splice point at which point they will follow diverse physical paths.
- each demarcation device is dedicated to a single customer.
- the secure MAN Services that a customer sees across the service interface is the same no matter which configuration is used.
- collocation facility access is used as shown in FIGS. 8 and 9.
- collocation facility access is like multi-tenant access.
- the secure MAN service provider will have leased space in the facility in which the customer demarcation device is placed.
- the preferred configuration for a collocation facility is shown in FIG. 8.
- the demarcation device 320 is in the customer's rack 321 and dual connected back to different switches 322 , 323 located in a secure MAN rack 324 . These connections are effected by Gigabit Ethernet multi-mode fiber cross-connects.
- the customer-owned equipment connects to the demarcation device with the appropriate Ethernet cable. Additional customers may use the same co-location facility, as shown by demarcation device 324 in rack 325 .
- the customer may not want to accommodate the demarcation device in his or her rack space.
- the configuration is that shown in FIG. 9.
- the demarcation device 330 is in the secure MAN rack and is dual connected to the two switches 331 , 332 in the rack.
- the customer-owned equipment 333 , 334 is connected to the demarcation device 330 via an appropriate Ethernet cross-connect. In large collocation facilities, this cross-connect will typically be multimode fiber.
- a demarcation device 330 can be used for supporting multiple customers.
- Virtual connection service provides the transfer of data between multiple service interfaces.
- Three kinds of virtual connection services in this example include point-to-point, point-to-multipoint, and multipoint-to-multipoint.
- IP packet delivered across a service interface is delivered to exactly one other service interface.
- IP internet protocol
- other higher layer protocols may be utilized for virtual connections of all types. This service is like a physical wire.
- Virtual connections among customers in the preferred embodiment are established by Physical Layer (layer 1 ) and data link layer (layer 2 ) contructs.
- FIG. 10 illustrates a fiber ring network extending around a path of about 20 miles, which is made of bundles of fibers laid in right of ways within a metropolitan area. Segments of the ring are logically partitioned as segments of an ethernet network, configured as a tree, rather than a ring, illustrating a layout according to the present invention other than the cross-connected broken ring. Switches in the tree comprise standard 100 Megabit, Gigabit or higher ethernet switches configured according to the Spanning Tree Protocol, or variations of the Spanning Tree Protocol.
- switch P 1 is a root of the tree, labeled P 1 , 0, P 1 to indicate that the root of the tree is P 1 , the distance to the root is 0, and the upstream (toward the root) switch is P 1 .
- the interconnection of the tree can be understood by the upstream links for the switches. Thus there are no upstream links from switch P 1 .
- Switch P 2 (P 1 ,1,P 1 ) is connected by fibers F 1 and F 2 to switch P 1 .
- Switch P 3 (P 1 ,2,P 2 ) is connected by fiber F 7 to switch P 2 .
- Fibers I 1 and I 2 are configured as backup links to switch P 1 from switch P 3 .
- Switch P 4 is connected by fibers F 3 and F 4 to switch P 1 .
- Fibers I 3 and I 4 are connected as backup links to switch P 2 from switch P 4 .
- Switch P 5 is connected by fibers F 5 and F 6 to switch P 1 .
- Fiber F 8 is connected as a backup link from switch P 5 to switch P 2 .
- Switch P 6 is connected by fibers F 9 and F 10 to switch P 2 .
- Fiber F 12 is a backup link from switch P 6 to switch P 5 .
- Switch P 7 is connected by fiber F 11 to switch P 3 .
- Fibers I 5 and I 6 act as backup links to switch P 5 from switch P 7 .
- Switch P 8 is connected by fiber F 13 to switch P 5 .
- Fibers I 7 and I 8 are connected as backup links from switch P 8 to switch P 6 .
- the fibers F 1 to F 13 and I 1 to I 8 comprise dark fibers in the fiber ring, which have been partitioned as point to point fiber segments in the tree as shown.
- fiber of a single ring can be re-used spatially. That is segments of a single ring can be used independently for point-to-point links in the tree.
- the interior switches are managed according to the spanning tree protocol.
- edge devices such as the demarcation devices described above, execute the modified spanning tree process to select an active link to the network, without the possibility of becoming a transit link for the interior switches.
- the present invention provides a system facilitating high data bandwidth interconnection between private networked locations to those who choose not to operate their own facilities. It provides security, performance reporting, and bandwidth management to all its customers. Furthermore, provisioning of connections in the secure MAN is simplified, automatic, and accomplished with very low transaction costs.
Abstract
Description
- The present application claims the benefit under 35 U.S.C. §111(b) and 35 U.S.C. §119(e) of the provisional application no. 60/186,470, filed Mar. 2, 2000, entitled BROADBAND SERVICE NETWORK AND E-COMMERCE PROVISIONING SYSTEM, naming inventors Michael Seaman, Vipin Jain, Gary Jaszewski, Bob Klessig, Peter Van Peenen, and David Braginsky.
- The present application is a continuation-in-part of co-pending U.S. patent application No. 09/634,566, filed: Aug. 9, 2000, entitled E-COMMERCE SYSTEM FACILITATING SERVICE NETWORKS INCLUDING BROADBAND COMMUNICATION SERVICE NETWORKS, which is incorporated by reference as if fully set forth herein.
- 1. Field of the Invention
- The present invention relates to configuration of edge devices for networks, including broadband communication networks, and more particularly to configuration of networks managed according to an active topology protocol, including the spanning tree protocol.
- 2. Description of Related Art
- In an enterprise data network, devices are often connected into switched networks configured by an active topology protocol, such as the Spanning Tree Protocol IEEE802.1D. In high data rate networks using active topology protocols, connections between packet switches are sometimes made by point to point links, using for example fiber optic cable, in a ‘redundant, dual-homed, tree like’ topology to facilitate rapid reconfiguration with the minimum loss of service. The revised spanning tree protocol under standardization in IEEE 802.1w is a suitable protocol for establishing the failover rules in the network. The recently completed link aggregation standard, IEEE Std. 802.3ad, is another—providing for resiliency of parallel links. These technologies in high bandwidth configurations, are being applied in the metropolitan area network environment as well.
- The IEEE 802.1 spanning tree provides for redundant connections within a network, where data transmitted from one attachment to the network to another is constrained to follow a loop free path. It reduces the physical topology of the network to an active topology that is both loop free (‘tree’) and fully connected (‘spanning’).
- Redundant connection of the edge devices to the active topology network creates a possibility of a loop forming through the edge device to maintain the spanning tree. Thus in the prior art, edge devices coupled to the spanning tree network, have not participated in the tree, so that they do not become transit nodes for traffic of the network. In the past, the selection of one link or another for connection to the interior of a network, has been performed by a simple physical layer redundancy scheme that interrogates the health of the links from an edge switch to the network. One link is configured as a primary, or active, link and the secondary link is activated only if the primary fails a simple connectivity test to the remainder of the network, e.g. loss of the transmitted light signal. However, this fails to select the best route for the connection to the root of the tree in an active topology, like that provided by the spanning tree.
- It is desirable therefore to provide a technique for selecting an active port for connection of an edge device to a spanning tree network or other active topology network, which is easy to configure, scalable and efficient.
- This invention comprises a method for configuring a network, and a network configured according to such method, providing resilient, redundant connection to an edge device. The system improves on the prior art arrangements, while not allowing the edge device to participate in the active topology of the network managed for example according to a spanning tree protocol, by choosing the active link from the edge device to the network on the basis of the active topology information received by the device, but not allowing it to forward or generate active topology information. This arrangement protects against a failure in the network that causes the switch connected to by the edge device to be separated from the main body of the network, by allowing the edge device to use the active topology information propagated in the network to select a link to the network based upon changes that occur remote from the switch to which it has immediate connection.
- According to one embodiment of the invention, the method manages the redundant connections of an edge device between a first network and a second network, where the second network is managed according to a spanning tree protocol in which spanning tree configuration messages propagate among switches in the second network. The redundant connections are made via a plurality of ports on the edge device coupled to the second network. The method comprises
- monitoring spanning tree configuration messages at least one port of the plurality of ports on the edge device coupled to the second network;
- selecting a port in the plurality of ports on the edge device coupled to the second network as an active port for traffic between the second network and the edge device, in response to the spanning tree configuration messages; and
- preventing traffic ingressing at any port coupled to the second network from egressing at any port coupled to the second network.
- The active port is selected in a preferred embodiment by selecting a port having a least cost path to a root of the second network according to the spanning tree protocol. The edge device does not propagate, nor generate spanning tree configuration messages.
- According to one aspect of the invention, a communication system is provided using technology that has been developed within the communications, enterprise data networking, electronic commerce, and carrier service provider industries. The system is configured to provide service in new ways, supporting secure point-to-multipoint channels, and other connectivity options in a manner particularly complementary to a provisioning process and system described in the above referenced application entitled E-COMMERCE SYSTEM FACILITATING SERVICE NETWORKS INCLUDING BROADBAND COMMUNICATION SERVICE NETWORKS.
- The network architecture in a preferred embodiment organizes switches into demarcation devices, access switches and interior switches.
- Demarcation devices (also referred to herein as service interface units) are edge devices typically, but not necessarily, located on a single customer's premises. Each demarcation device supports one or more of service interfaces, identifiable by unique addresses such as Ethernet MAC addresses, by which a customer network is connected to the active topology network, and one or more ‘drops’ that connect to access ports on access switches.
- Access switches are located on premises physically secured, linked by a communication media of choice, including for example fiber optic cable, to a collocation site in the metropolitan area network. In addition to access ports coupled to the demarcation devices, the access switches have interior network ports that connect to interior switches at the collocation sites within the network.
- Interior switches form the heart of the network, typically in collocation sites of the metropolitan area network, having ports coupled to the interior ports of the access switches.
- The identity of the connected device on a service interface is ascertained by observing packets transmitted by the device at the service interface of the demarcation device. Each packet contains a source address, such as a source MAC address. The MAC address is captured by the service interface and a notification sent to the system managing the network using normal network management protocols. The management system assures itself that the MAC address is unique. Filters are configured on access ports of the access switches to ensure that only packets with source addresses checked in this way are accepted from the attached demarcation device. Similarly only packets from source addresses that are permitted to transmit to the demarcation device are allowed to egress from the access port to the demarcation device.
- Interior switches do not filter or otherwise constrain connections on the basis of the identities of devices attached to either the transmitting or receiving service interfaces. This allows the active topology maintained by interior switches to scale independently of the number of active connections through the network, and to reconfigure rapidly since information concerning individual connections does not have to be communicated or changed during reconfiguration.
- Modification of the spanning tree for resilient redundant connection of an edge device, such as a packet switch positioned as a demarcation device, to a network is provided according to the present invention. In the network, demarcation devices can provide for redundant connections to the rest of the network. Selection of one link in preference to another can be achieved by use of the spanning tree or another active topology protocol. However, only traffic that is transmitted by or destined for a given customer is allowed to reach that customer's demarcation device. It is not desirable that a demarcation device act as a transit link in the network, that would be used to ensure full connectivity from one part of the network to another, either during a reconfiguration of the network or while the active topology is stable. Rather the network should partition if there is no connectivity other than through a demarcation devices between the two halves.
- A range of options is offered to customers to control changes to the source MAC address used on the service interfaces of demarcation devices including automatic configuration, latching of a learnt address, explicit manual configuration, and identification of attempts at intrusion into the network.
- The system is capable of extension to allow additional security protocols to establish the identity of the connecting system. Once that identity has been established, the MAC address of the transmitting system is used, as described above, to secure connections.
- Disconnection and reconnection of the device can be detected, even if the same MAC address is used throughout. This protects against attempts to masquerade once a device identity has been established.
- A foundation of industry standard products and practices in the following areas is used to construct the novel networks, including for one example:
- Fiber optic transmission technology using WDM (wave division multiplexing) to carry additional bandwidth through the use of many ‘colors’ of light on a single fiber, controlled and
- Gigabit (or higher) Ethernet packet switching technology to accept and deliver IP data from and to customers, providing a highly reliable service.
- Electronic commerce technology to allow customers and their authorized agents to order, configure, and manage the communications services delivered and to enter into business agreements with other suppliers of services using the system's communication services.
- In each of these areas a number of novel practices and inventions support and advance the communications network and services.
- Configuration of links and link segments to facilitate rapid reconfiguration of interconnected packet switches is provided in support of the commercial provisioning system.
- A set of rules and heuristics is provided for the use and configuration of fiber optic transmission facilities, purchased or leased in ring configurations, as a set of links comprising selected concatenated segments from a set of rings. The resulting configurations have benefits in networks including:
- 1) They allow the use of high bandwidth low cost enterprise data packet switching equipment in the collocation facilities, while providing high network availability through the use of rapid reconfiguration with redundant links and switches.
- 2) They allow the use of general mesh topologies to support redundancy, rather than restriction to rings or rings with extraordinary interconnection arrangements.
- In addition to realizing these topologies by concatenating physical segments from rings, equipment is provided so that a link can comprise logical segments, each consisting for example of a wavelength of light transmitted and received by WDM (wavelength division multiplexing) equipment attached to the physical fiber segment running between two locations on a ring. Electronic switching of the transmitted information stream at each ring node from one wavelength on a segment to another wavelength on the next, or to an attached device, allows for electronic rearrangement of the set of links connected to each packet switch in the network.
- Spatial reuse in a packet based data network with a ring topology is accomplished in the preferred network configuration. The network architecture uses packet switches with rapid reconfiguration protocols and VLAN technology to constrain packets that might otherwise be broadcast or flooded to the necessary paths between access ports in the network. Thus a combination of existing standard technologies serves to support the same robust efficient communications goals sought by new non-standard equipment.
- Security arrangements for a packet switched data transmission network using LAN switches are provided. The network makes use of packet data switching equipment that is typically used in private data networks. While such equipment has facilities that can be used to construct ad-hoc security arrangements, a systematic approach to security is provided by the present invention.
- The network ensures that no data is ever delivered to a service interface other than the service interface(s) explicitly authorized by the customer whose network attached equipment transmits the data, and that no data is received on a service interface other than data from the service interface(s) explicitly authorized by the customer whose network attached equipment is receiving the data.
- The mechanisms that the system uses to ensure such secure delivery include:
- (a) The organization of switches within the network architecture and the placement of security functions within that architecture.
- (b) Assuring a unique identity for each device connected to a service interface anywhere within the network.
- (c) Checking that identity at points identified within the network (see a. above)
- (d) Ensuring that the identity of each of the customers/parties controlling the assignment of service interfaces and the connections between them is securely known.
- (e) Providing for the known delegation of control within the constraints imposed by (d) above.
- FIG. 1 is a diagram of a commercial communication service with an Internet based provisioning server according to the present invention.
- FIG. 2 is a block diagram of a network managed according to an active topology protocol, and including edge devices with resilient, redundant connections to the network, according to the present invention.
- FIG. 3 is a diagram illustrating an edge device architecture according to the present invention.
- FIG. 4 shows a network configured according to a spanning tree protocol, with edge devices according to the present invention.
- FIG. 5 illustrates a redundant switch access service with parallel drops.
- FIG. 6 illustrates a parallel single tenant access service with two drops coupled to a single access switch.
- FIG. 7 illustrates a fully redundant single tenant access service according to one aspect of the invention.
- FIG. 8 illustrates a collocation facility access arrangement for connection to the secure MAN of the present mention.
- FIG. 9 illustrates another example collocation facility access arrangement.
- FIG. 10 illustrates a fiber MAN network physically laid out as a ring, and partitioned as segments of the secure MAN of the present invention.
- FIG. 1 illustrates a communications service example, based on provisioning links among a variety of customers within a secure metropolitan area network MAN. In FIG. 1, a secure MAN based upon a layer two packet switched protocol, preferably Ethernet, and in which the switches are managed by an active topology protocol such as the spanning tree protocol, is represented by
cloud 60. A number of customers, includingInternet service provider 61,outsourcing vendor 62, “enterprise 1” with aNorth campus 63, a West campus 24, and a South campus 25, and “enterprise” 2 66 andenterprise 3 67, are coupled to thesecure MAN 60 by appropriate physical and logical interfaces. Aprovisioning server 71 is coupled to thesecure MAN 60, either using the secure MAN medium or by other communication channels to the switches and other resources in the secure MAN, and facilitates transactions among the customers of thesecure MAN 60 for establishing communication channels, such as the virtual connections discussed above, and provisioning of services agreed to by the customers with the resources of thesecure MAN 60. In one embodiment, configuring and allocating of services within thesecure MAN 60 to support the links among the customers, is managed by the provisioning server using a management protocol such as Telnet or SNMP, under which filters and other control data structures in the switches are configured. In this manner, the provisioning server is available via the Internet to customers and potential customers of thesecure MAN 60, using standard technology. - Virtual connection services allow rich connectivity among all customer locations on the secure MAN network. Examples include:
- A mesh connected, multipoint-to-multipoint virtual connection service35 dedicated to a single enterprise for connecting campuses together.
- A point-to-multipoint
virtual connection service 76 connecting an Internet Service Provider to customers. - A point-to-point virtual connection service77 connecting an enterprise location to an outsourcing vendor.
- A point-to-point virtual connection service78 connecting two enterprises.
- A single customer can have simultaneous intra-enterprise and extra-enterprise communications using the secure MAN, provisioned according to the present invention.
- Edge devices (not shown) between the customer networks or devices, and the secure MAN support security processes for the MAN, and include redundant connections to switches in the network in a preferred configuration for improved reliability and efficiency.
- A detailed description of one example of the secure MAN provisioning embodiment is provided in the above referenced application entitled, E-COMMERCE SYSTEM FACILITATING SERVICE NETWORKS INCLUDING BROADBAND COMMUNICATION SERVICE NETWORKS, which is incorporated by reference as if fully set forth herein.
- FIG. 2 is a block diagram of a network configured according to the present invention to support point-to-multipoint virtual connections, among a plurality of customers of a public metropolitan area network. The customers have
local networks customer 100 is connected by links 100-1 and 100-2 to theservice interface unit 105. Thecustomer 100 connected by links 100-3 and 100-4 to theservice interface unit 106. Thecustomer 101 is connected by link 101-1 to theservice interface unit 107. Thecustomer 102 connected by the links 102-1 and 102-2 toservice interface unit 108.Customer 103 is connected by link 103-1 toservice interface unit 109. The service interface units comprise switches at customer premises in which demarcation points for access to the metropolitan area network are established. Each of the links 100-1 through 100-4, 101-1, 102-1, 102-2, and 103-1 are connected at the customer side to ports on customer devices having unique MAC addresses. Thus the demarcation points for the network can be considered ports on the service interface unit characterized by the unique MAC addresses of the attached customer equipment. - The service interface units105-109 are connected by point-to-point links to access
switches service interface unit 105 is coupled by links 105-1 and 105-2 to theaccess switch 110.Service interface unit 105 is coupled by the link 105-3 to theaccess switch 111.Service interface unit 106 is coupled by the link 106-1 to theaccess switch 110, and by link 106-2 to theaccess switch 111.Service interface unit 107 is coupled by the link 107-1 to theaccess switch 111, and by the link 107-2 to theaccess switch 112.Service interface unit 108 is coupled by the link 108-1 to theaccess switch 111, and by the link 108-2 to theaccess switch 112.Service interface unit 109 is coupled by the link 109-1 and by the link 109-2 to theaccess switch 112. The service interface units 105-109 are managed so that only one of the links between the service interface units and an access switch in the network is active at anytime. A modified spanning tree protocol is utilized to select the active link as described below. - The access switches110-112 are coupled to interior switches of the
metropolitan area network 115. - According to the preferred embodiment of the present invention, the security arrangements for the virtual channels are deployed in the access switches110-112 via source address filtering based upon the unique MAC addresses of the demarcation points at service interface units in the network.
- The following excerpt from the IEEE Draft P802.1w/D9, from pages 37-38, provides background concerning operation of one standard spanning tree protocol, known as the Rapid Spanning Tree Algorithm, used for managing an active topology of the network including the access switches and interior switches.
- The Rapid Spanning Tree Algorithm assigns one of the following Port Roles to each Bridge Port: Root Port, Designated Port, Alternate Port, or Backup Port. A fifth role, Disabled Port, identifies a Port as having no role within the operation of Spanning Tree. Port Role assignments for ports throughout the Bridged Local Area Network are determined by: a) A unique Bridge Identifier associated with each Bridge, b) A Path Cost associated with each Bridge Port, c) A Port Identifier associated with each Bridge Port, as follows.
- The Bridge with the best Bridge Identifier is selected as the Root Bridge. The unique Bridge Identifier for each Bridge is derived, in part, from the Bridge Address (7.12.5) and, in part, from a manageable priority component (9.2.5). The relative priority of Bridges is determined by the numerical comparison of the unique identifiers, with the lower numerical value indicating the better identifier. Every Bridge has a Root Path Cost associated with it. For the Root Bridge this is zero. For all other Bridges it is the sum of the Path Costs for each Bridge Port receiving frames on the least cost path from the Root Bridge to that Bridge. The Path Cost associated with each Port may be manageable. Additionally, 17.28.2 recommends default values for the Path Costs associated with Ports attached to LANs of specific MAC types and speeds.
- The Bridge Port on each Bridge receiving the frames on the least cost path from the Root Bridge is assigned the role of Root Port for that Bridge (the Root Bridge does not have a Root Port). If a Bridge has two or more ports with the same least Path Cost sum from the Root, then the port with the best Port Identifier is selected as the Root Port. Part of the Port Identifier is fixed and is different for each Port on a Bridge, and part is a manageable priority component (9.2.7). The relative priority of Ports is determined by the numerical comparison of the unique identifiers, with the lower numerical value indicating the better identifier.
- Each LAN in the Bridged Local Area Network also has an associated Root Path Cost. This is the Root Path Cost of the lowest cost Bridge with a Bridge Port connected to that LAN. This Bridge is selected as the Designated Bridge for that LAN. If there are two or more Bridges with the same Root Path Cost, then the Bridge with the best priority (least numerical value) is selected as the Designated Bridge. The Bridge Port on the Designated Bridge that is connected to the LAN is assigned the role of Designated Port for that LAN. If the Designated Bridge has two or more ports connected to the LAN, then the Bridge Port with the best priority Port Identifier (least numerical value) is selected as the Designated Port. In a Bridged Local Area Network whose physical topology is stable, i.e. the Rapid Spanning Tree Algorithm has communicated consistent information throughout the network, every LAN has one and only one assigned Designated Port, and every Bridge with the exception of the Root Bridge has a Root Port connected to a LAN.
- Any operational Bridge Port that is not assigned a Port Role of Root Port or Designated Port is a Backup Port if that Bridge is the Designated Bridge for the attached LAN, and an Alternate Port otherwise. An Alternate Port offers an alternate path in the direction of the Root Bridge to that provided by the Bridge's own Root Port, whereas a Backup Port acts as a backup for the path provided by a Designated Port in the direction of the leaves of the Spanning Tree. Backup Ports exist only where there are two or more connections from a given Bridge to a given LAN; hence, they (and the Designated Ports that they back up) can only exist where two ports are connected together in loopback by a point to point link, or where the Bridge has two or more connections to a shared media LAN segment.
- NOTE—The distinction between the Alternate and Backup Port Roles does not appear in the Spanning Tree Algorithm and Protocol described in Clause8. This distinction is introduced in RSTP in order to make it possible to describe the possibility of rapidly transitioning an Alternate Port to Forwarding on failure of the Root Port.
- (IEEE Draft P802.1w/D9“Supplement to ISO/IEC 15802-3 (IEEE Std 802. 1D), Information technology—Telecommunications and information exchange between systems—Local and metropolitan area networks—Common specifications—Part 3: Media Access Control (MAC) Bridges: Rapid Reconfiguration,” Sponsor: LAN MAN Standards Committee of the IEEE Computer Society, Jan. 12, 2001, pages 37-38. (numerical references in parenthesis in the quote are to sections of P802.1w/D9))
- IEEE Draft P802.1w/D9 and IEEE Std 802.1D are incorporated by reference as if fully set forth herein, providing examples of spanning tree protocols, and of 802.1 standard spanning tree protocols.
- According to the present invention, the spanning tree protocol (or another active topology protocol) is used on edge devices, which act as an interface between customer equipment and a network executing the active topology protocol, to selected an active connection to the network. In this example, the spanning tree protocol is run to select a Root Port, and to use the selected port as the active connection to the network. However, no packets ingressing at a port coupled to the spanning tree network are allowed to egress at any port coupled to the spanning tree network. Ports coupled to the spanning tree network that are not selected as the active port, are placed in blocking state, and provide a backup connection to the spanning tree network. No traffic is allowed to traverse the edge device, except that destined to the customer equipment, or originating in the customer equipment. The edge device, and the customer equipment are therefore protected from becoming a link between portions of the spanning tree network, while taking advantage of the intelligence of the spanning tree protocol to make efficient choices of active links to the network. If the spanning tree costs of the ports change, then the ports coupled to the spanning tree network in the blocking state may be selected as the active port.
- FIG. 3 illustrates a basic configuration of a network using the modified spanning tree protocol of the present invention. A
Metropolitan Area Network 120 includesinterior switches interior switches links Service interface unit 129 is coupled to the access switches bylinks - The access switches and the interior switches participate in the spanning tree, and propagate spanning tree configuration messages, known as BPDUs, to support the dynamic configuration of the switches in the spanning tree network. Thus, the best route to the root of the network can change in response to events remote from the
service interface unit 129. Theservice interface unit 129 selects an active link based upon the spanning tree information received from the access switches 123 and 124. Thus,service interface unit 129 selects either link 131 or link 132 as an active link in response to the spanning tree configuration messages received at one or both of the network interfaces coupled to thelinks links links links access switch 124, will not follow theroute 136 onlink 132 toservice interface unit 129, and onlink 131 to accessswitch 123 in its route to the root of the tree, even if thisroute 136 would otherwise be the least cost route according to the spanning tree. - FIG. 4 shows one example network topology with spanning tree configuration information, according to a preferred embodiment in which the interior switches comprise high speed Ethernet switches in collocation sites in a metropolitan area network. The network includes a plurality of fiber segment extending between collocation sites. The fiber segments are arranged for configuration as a ring, but partitioned and managed according to a spanning tree protocol. The switches P5 and P6 correspond to the
interior switches - In FIG. 4, the filled circle, unfilled circle, and parallel line markings correspond to the designated port, root port, and alternate port in the blocking state, respectively, according to the spanning tree protocol. In this example, the switch P1 is the root of the tree. The switch P1 has five designated ports. One designated port is coupled to an alternate port on switch P3 via an internal link. Another designated port on switch P1 is coupled to a root port on switch P2 via a link 2-1. Another designated port on switch P1 is coupled to a root port on switch P5 via link 5-1. A fourth designated port on switch P1 is coupled to a root port on switch P4 via a link 1-4. A fifth designated port on switch P1 is coupled to a root port on P2 via a link 1-2. A designated port on switch P6 is coupled via a link 6-3 to a root port on switch P3. A designated port on switch P5 is coupled to an alternate port on switch P6 via an internal link. A designated port on switch P2 is coupled to a root port on switch P6 via link 2-6. A designated port on switch P2 is coupled via an internal link to an alternate port on switch P4.
- The access switches123 and 124, and the
service interface unit 129 have the same reference numerals as used in FIG. 3. Switch P5 has designated ports coupled vialinks access switches links access switches service interface unit 129, which elects the network interface coupled to link 131 as the active link, and the network interface coupled to link 132 as the backup link. This could be changed for example if thelink 125 were broken, making the port coupled to link 126 become selected as the root port onswitch 123. The best route to the root for theservice interface unit 129 would change fromlink 131 to link 132, in this case; because the route throughaccess switch 124, and interior switch P5 to the root P1, is a lower cost path than the route throughaccess switch 123 onlink 126, interior switch P6, and interior switch P2 to the root P1. - FIG. 5 shows configuration of an access service for a spanning tree network according to the present invention, and includes a
demarcation device 200, asecure network switch 201 and customer-ownedequipment 202. Thedemarcation device 200 supports a plurality of service interfaces to customer equipment in this example. - A
demarcation device 200 is typically situated between customer-owned equipment and a secure MAN access switch. Thedemarcation device 200 connects to customer-ownedequipment 202 through one or more service interfaces 203. Thedemarcation device 200 converts between the physical layer of thedrop 204 and that of the service interfaces 203. Thedemarcation device 200 also performs surveillance and maintenance functions. - The
drop 204 will typically use a fiber optic link with at least 1 Gbps bandwidth although other transmission technologies may be used, e.g., high bandwidth wireless transmission. The type of transmission used is transparent to the customer. - The
service interface 203 is the point at which customer-ownedequipment 202, typically an internet protocol IP or multiprotocol router, is attached. Thisinterface 203 runs IP over 10/100/1000 Mbps Ethernet for example, using either a copper or fiber physical layer. An auto-sensing 10/100 Ethernet service interface may also be used. Also, other higher speed Ethernet technologies could be used. - In the secure MAN, the ‘demarcation devices’ situated on individual customer's premises can provide for redundant connections to the rest of the network. Selection of one link in preference to another can be achieved by use of the spanning tree or a similar protocol. However, only traffic that is transmitted by or destined for a given customer is allowed to reach that customer's demarcation device (a packet switch). It is not desirable that a demarcation device act as a transit link in the network, ensuring full connectivity from one part of the network to another, either during a reconfiguration of the network or while the active topology is stable. Rather the network should partition if there is no other connectivity between the two halves.
- In the past, the simple selection of one link or another for connection to the interior of a network has been performed by a simple physical layer redundancy scheme that interrogates the health of the links from a demarcation device switch to the network. One link is configured as a primary link and the secondary link is activated only if the primary fails a simple connectivity test to the remainder of the network, e.g. loss of the transmitted light signal.
- One embodiment of the secure MAN improves on this prior arrangement, while not allowing the demarcation device to participate in the active topology of the network, by choosing the active link from the demarcation device to the network on the basis of the spanning tree information received by the device, but not allowing it to forward or generate spanning tree information. This arrangement protects against a failure in the network that causes the switch connected to by the demarcation device to be separated from the main body of the network.
- The access option of FIG. 5 involves use of a redundant switch access service, in which a
second drop 210 is connected from thedemarcation device 200 to a differentsecure MAN switch 211. This is done to maximize diversity. A failure of a drop, the switch, or the switch port will result in data flowing over the drop to be rerouted over the redundant drop in a very short time, e.g., less than 50 ms. - In redundant switch single tenant access service, the drops will typically reside within the same physical path from the customer premises to the first splice point at which point they will follow diverse physical paths.
- Parallel single tenant access service is another alternative, as shown in FIG. 6. In this case, drops204 and 212 terminate on the same
secure MAN switch 201. Unlike redundant single tenant access service, the multiple drops 204, 212 can be used for load sharing in that data can flow over the drops simultaneously. In the event of a failure of a drop or the switch port, data flowing over the drop will be rerouted to the other drop in a very short time, e.g., less than 50 ms. In parallel single tenant access service, the drops will typically reside within the same physical path from the customer premises to the point-of-presence of the first secure MAN switch. - Another access service option is fully redundant single tenant access service as illustrated in FIG. 7, including
redundant demarcation devices redundant switches redundant drops service interfaces - In fully redundant single tenant access service, the drops will typically reside within the same fiber optic cable from the customer premises to the first splice point at which point they will follow diverse physical paths.
- In both of the above examples, each demarcation device is dedicated to a single customer. In addition, the secure MAN Services that a customer sees across the service interface is the same no matter which configuration is used.
- In another situation co-location facility access is used as shown in FIGS. 8 and 9. In some ways collocation facility access is like multi-tenant access. However, the secure MAN service provider will have leased space in the facility in which the customer demarcation device is placed. The preferred configuration for a collocation facility is shown in FIG. 8. The
demarcation device 320 is in the customer'srack 321 and dual connected back todifferent switches 322, 323 located in asecure MAN rack 324. These connections are effected by Gigabit Ethernet multi-mode fiber cross-connects. The customer-owned equipment connects to the demarcation device with the appropriate Ethernet cable. Additional customers may use the same co-location facility, as shown bydemarcation device 324 inrack 325. - In some cases, the customer may not want to accommodate the demarcation device in his or her rack space. In this case, the configuration is that shown in FIG. 9. The
demarcation device 330 is in the secure MAN rack and is dual connected to the twoswitches equipment demarcation device 330 via an appropriate Ethernet cross-connect. In large collocation facilities, this cross-connect will typically be multimode fiber. Ademarcation device 330 can be used for supporting multiple customers. - There are other possibilities including a mix of centralized and distributed demarcation a devices. It may also be possible and/or desirable to share a demarcation device among more than one customer.
- Once customers have established connections to the secure MAN network, links among them are established using the provisioning system referenced above. Links in this example embodiment are referred to as virtual connections.
- Virtual connection service provides the transfer of data between multiple service interfaces. Three kinds of virtual connection services in this example, include point-to-point, point-to-multipoint, and multipoint-to-multipoint.
- In point-to-point virtual connections, an internet protocol IP packet delivered across a service interface is delivered to exactly one other service interface. Of course, in addition to IP, other higher layer protocols may be utilized for virtual connections of all types. This service is like a physical wire.
- Virtual connections among customers in the preferred embodiment are established by Physical Layer (layer1) and data link layer (layer 2) contructs.
- FIG. 10 illustrates a fiber ring network extending around a path of about 20 miles, which is made of bundles of fibers laid in right of ways within a metropolitan area. Segments of the ring are logically partitioned as segments of an ethernet network, configured as a tree, rather than a ring, illustrating a layout according to the present invention other than the cross-connected broken ring. Switches in the tree comprise standard 100 Megabit, Gigabit or higher ethernet switches configured according to the Spanning Tree Protocol, or variations of the Spanning Tree Protocol.
- In FIG. 10, switch P1 is a root of the tree, labeled P1, 0, P1 to indicate that the root of the tree is P1, the distance to the root is 0, and the upstream (toward the root) switch is P1. The interconnection of the tree can be understood by the upstream links for the switches. Thus there are no upstream links from switch P1. Switch P2 (P1,1,P1) is connected by fibers F1 and F2 to switch P1. Switch P3 (P1,2,P2) is connected by fiber F7 to switch P2. Fibers I1 and I2 are configured as backup links to switch P1 from switch P3. Switch P4 is connected by fibers F3 and F4 to switch P1. Fibers I3 and I4 are connected as backup links to switch P2 from switch P4. Switch P5 is connected by fibers F5 and F6 to switch P1. Fiber F8 is connected as a backup link from switch P5 to switch P2. Switch P6 is connected by fibers F9 and F10 to switch P2. Fiber F12 is a backup link from switch P6 to switch P5. Switch P7 is connected by fiber F11 to switch P3. Fibers I5 and I6 act as backup links to switch P5 from switch P7. Switch P8 is connected by fiber F13 to switch P5. Fibers I7 and I8 are connected as backup links from switch P8 to switch P6.
- The fibers F1 to F13 and I1 to I8 comprise dark fibers in the fiber ring, which have been partitioned as point to point fiber segments in the tree as shown. Thus, fiber of a single ring can be re-used spatially. That is segments of a single ring can be used independently for point-to-point links in the tree.
- The interior switches are managed according to the spanning tree protocol. However, edge devices, such as the demarcation devices described above, execute the modified spanning tree process to select an active link to the network, without the possibility of becoming a transit link for the interior switches.
- The present invention provides a system facilitating high data bandwidth interconnection between private networked locations to those who choose not to operate their own facilities. It provides security, performance reporting, and bandwidth management to all its customers. Furthermore, provisioning of connections in the secure MAN is simplified, automatic, and accomplished with very low transaction costs.
- While the present invention is disclosed by reference to the preferred embodiments and examples detailed above, it is to be understood that these examples are intended in an illustrative rather than in a limiting sense. It is contemplated that modifications and combinations will readily occur to those skilled in the art, which modifications and combinations will be within the spirit of the invention and the scope of the appended claims.
Claims (21)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/796,842 US20020023170A1 (en) | 2000-03-02 | 2001-03-01 | Use of active topology protocols, including the spanning tree, for resilient redundant connection of an edge device |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US18647000P | 2000-03-02 | 2000-03-02 | |
US63456600A | 2000-08-09 | 2000-08-09 | |
US09/796,842 US20020023170A1 (en) | 2000-03-02 | 2001-03-01 | Use of active topology protocols, including the spanning tree, for resilient redundant connection of an edge device |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US63456600A Continuation-In-Part | 2000-03-02 | 2000-08-09 |
Publications (1)
Publication Number | Publication Date |
---|---|
US20020023170A1 true US20020023170A1 (en) | 2002-02-21 |
Family
ID=26882122
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/796,842 Abandoned US20020023170A1 (en) | 2000-03-02 | 2001-03-01 | Use of active topology protocols, including the spanning tree, for resilient redundant connection of an edge device |
US09/796,825 Expired - Lifetime US6826158B2 (en) | 2000-03-02 | 2001-03-01 | Broadband tree-configured ring for metropolitan area networks |
US09/796,922 Abandoned US20020038253A1 (en) | 2000-03-02 | 2001-03-01 | Point-to-multipoint virtual circuits for metropolitan area networks |
Family Applications After (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/796,825 Expired - Lifetime US6826158B2 (en) | 2000-03-02 | 2001-03-01 | Broadband tree-configured ring for metropolitan area networks |
US09/796,922 Abandoned US20020038253A1 (en) | 2000-03-02 | 2001-03-01 | Point-to-multipoint virtual circuits for metropolitan area networks |
Country Status (2)
Country | Link |
---|---|
US (3) | US20020023170A1 (en) |
EP (1) | EP1132844A3 (en) |
Cited By (39)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020009092A1 (en) * | 2000-03-02 | 2002-01-24 | Seaman Michael J. | Broadband tree-configured ring for metropolitan area networks |
US20030043736A1 (en) * | 2001-09-04 | 2003-03-06 | Gonda Rumi Sheryar | Method for supporting SDH/SONET APS on ethernet |
US20030180047A1 (en) * | 2000-05-22 | 2003-09-25 | Winston Way | Fully protected broadcast and select all optical network |
US20030229807A1 (en) * | 2002-05-14 | 2003-12-11 | The Research Foundation Of State University Of New York, University At Buffalo | Segment protection scheme for a network |
US20040098510A1 (en) * | 2002-11-15 | 2004-05-20 | Ewert Peter M. | Communicating between network processors |
US20040105455A1 (en) * | 2002-08-29 | 2004-06-03 | Seaman Michael John | Automatic edge port and one way connectivity detection with rapid reconfiguration for shared media in spanning tree configured bridged Local Area Networks |
US20050050220A1 (en) * | 2003-08-26 | 2005-03-03 | Alcatel | Selective transmission rate limiter for rapid spanning tree protocol |
US20050254448A1 (en) * | 2002-05-08 | 2005-11-17 | Haitao Tang | Distribution scheme for distributing information in a network |
US20050286908A1 (en) * | 2004-06-15 | 2005-12-29 | Way Winston I | Optical communication using duobinary modulation |
US20060007869A1 (en) * | 2004-07-09 | 2006-01-12 | Fujitsu Limited | Method for preventing control packet loop and bridge apparatus using the method |
US20060092862A1 (en) * | 2000-09-11 | 2006-05-04 | Benedetto Marco D | STP root guard |
US20060123428A1 (en) * | 2003-05-15 | 2006-06-08 | Nantasket Software, Inc. | Network management system permitting remote management of systems by users with limited skills |
US20060171302A1 (en) * | 2005-02-03 | 2006-08-03 | Cisco Technology, Inc. | Data transmission in a network comprising bridges |
WO2006119375A2 (en) * | 2005-05-02 | 2006-11-09 | Opvista, Incorporated | Multiple interconnected broadcast and select optical ring networks with revertible protection switch |
US20060269295A1 (en) * | 2000-05-22 | 2006-11-30 | Opvista Incorporated, A California Corporation | Optical double sideband modulation technique with increased spectral efficiency |
US7154861B1 (en) * | 2002-04-22 | 2006-12-26 | Extreme Networks | Method and system for a virtual local area network to span multiple loop free network topology domains |
US20060291378A1 (en) * | 2005-06-28 | 2006-12-28 | Alcatel | Communication path redundancy protection systems and methods |
US20070076635A1 (en) * | 2005-09-16 | 2007-04-05 | Cisco Technology, Inc. | Mechanism to implement a layer 2 gateway |
US20070086332A1 (en) * | 2005-10-13 | 2007-04-19 | Way Winston I | Optical ring networks using circulating optical probe in protection switching with automatic reversion |
KR100723883B1 (en) | 2005-12-07 | 2007-05-31 | 한국전자통신연구원 | Root switch in ethernet network and method for mapping switch to a unique identifier by using the same |
US20080250137A1 (en) * | 2007-04-09 | 2008-10-09 | International Business Machines Corporation | System and method for intrusion prevention high availability fail over |
GB2449178A (en) * | 2007-05-11 | 2008-11-12 | Boeing Co | Dynamic switching to a redundant bridge by a node using bridge protoccol data unit (BPDU) messages and the rapid spanning tree protocol (RSTP) |
US20080279096A1 (en) * | 2007-05-11 | 2008-11-13 | Sullivan Michael J | Lightweight node based network redundancy solution leveraging rapid spanning tree protocol (rstp) |
US7602706B1 (en) * | 2003-05-15 | 2009-10-13 | Cisco Technology, Inc. | Inter-ring protection for shared packet rings |
US7680031B1 (en) * | 2002-04-26 | 2010-03-16 | Redback Networks Inc. | Method and apparatus for load balancing and protecting data traffic in an optical ring |
US20100097926A1 (en) * | 2008-10-21 | 2010-04-22 | Liquid Computing Corporation | Methods and systems for providing network access redundancy |
US7773883B1 (en) | 2007-05-04 | 2010-08-10 | Vello Systems, Inc. | Single-fiber optical ring networks based on optical double sideband modulation |
US20100322263A1 (en) * | 2009-06-18 | 2010-12-23 | Nortel Networks Limoted | Method and Apparatus for Implementing Control of Multiple Physically Dual Homed Devices |
US20110007741A1 (en) * | 2004-10-22 | 2011-01-13 | Cisco Technology, Inc. | Forwarding table reduction and multipath network forwarding |
US20110158641A1 (en) * | 2009-12-08 | 2011-06-30 | Vello Systems, Inc. | Subchannel Photonic Routing, Switching and Protection with Simplified Upgrades of WDM Optical Networks |
US20110206203A1 (en) * | 2010-02-22 | 2011-08-25 | Vello Systems, Inc. | Subchannel security at the optical layer |
US8175458B2 (en) | 2007-07-17 | 2012-05-08 | Vello Systems, Inc. | Optical ring networks having node-to-node optical communication channels for carrying data traffic |
US20130003550A1 (en) * | 2011-06-29 | 2013-01-03 | Broadcom Corporation | System and Method for Priority Based Flow Control Between Nodes |
US8542999B2 (en) | 2011-02-01 | 2013-09-24 | Vello Systems, Inc. | Minimizing bandwidth narrowing penalties in a wavelength selective switch optical network |
US8792352B2 (en) | 2005-10-11 | 2014-07-29 | Cisco Technology, Inc. | Methods and devices for backward congestion notification |
US8804529B2 (en) | 2007-08-21 | 2014-08-12 | Cisco Technology, Inc. | Backward congestion notification |
US8842694B2 (en) | 2004-10-22 | 2014-09-23 | Cisco Technology, Inc. | Fibre Channel over Ethernet |
US11025527B2 (en) * | 2019-07-22 | 2021-06-01 | Dell Products L.P. | Topology change processing in bridged networks using a spanning tree protocol |
US11950140B2 (en) | 2021-10-25 | 2024-04-02 | Dell Products Lp | System and method for providing device management and network management at an edge device |
Families Citing this family (131)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6963575B1 (en) * | 2000-06-07 | 2005-11-08 | Yipes Enterprise Services, Inc. | Enhanced data switching/routing for multi-regional IP over fiber network |
US6934262B1 (en) * | 2000-08-26 | 2005-08-23 | Cisco Technology, Inc. | Method and apparatus for restricting the assignment of VLANs |
US7133410B2 (en) * | 2001-02-12 | 2006-11-07 | Tellabs Operations, Inc. | Method and system for designing ring-based telecommunications networks |
US7283494B2 (en) * | 2001-04-18 | 2007-10-16 | Skypilot Networks, Inc. | Network channel access protocol-interference and load adaptive |
GB2377118B (en) * | 2001-06-27 | 2003-06-25 | 3Com Corp | Method and apparatus for determining unmanaged network devices in the topology of a network |
US7054264B2 (en) * | 2001-07-24 | 2006-05-30 | Corrigent Systems Ltd. | Interconnect and gateway protection in bidirectional ring networks |
US7145878B2 (en) * | 2001-07-27 | 2006-12-05 | Corrigent Systems Ltd. | Avoiding overlapping segments in transparent LAN services on ring-based networks |
US7061859B2 (en) * | 2001-08-30 | 2006-06-13 | Corrigent Systems Ltd. | Fast protection in ring topologies |
US20030048501A1 (en) * | 2001-09-12 | 2003-03-13 | Michael Guess | Metropolitan area local access service system |
AU2002340023A1 (en) | 2001-09-24 | 2003-04-07 | Rumi Sheryar Gonda | Method for supporting ethernet mac circuits |
US7283478B2 (en) * | 2001-11-28 | 2007-10-16 | Corrigent Systems Ltd. | Traffic engineering in bi-directional ring networks |
US7177946B1 (en) * | 2001-12-06 | 2007-02-13 | Cisco Technology, Inc. | Optimal sync for rapid spanning tree protocol |
EP3401794A1 (en) * | 2002-01-08 | 2018-11-14 | Seven Networks, LLC | Connection architecture for a mobile network |
GB0200838D0 (en) * | 2002-01-15 | 2002-03-06 | Xchangepoint Holdings Ltd | Virtual local area network interconnection |
US7751409B1 (en) * | 2002-03-20 | 2010-07-06 | Oracle America, Inc. | Logical service domains for enabling network mobility |
US7529180B1 (en) * | 2002-03-29 | 2009-05-05 | Marvell International Ltd. | Switch failover for aggregated data communication links |
US7489867B1 (en) * | 2002-05-06 | 2009-02-10 | Cisco Technology, Inc. | VoIP service over an ethernet network carried by a DWDM optical supervisory channel |
JP4032816B2 (en) * | 2002-05-08 | 2008-01-16 | 株式会社日立製作所 | Storage network topology management system |
US7941558B2 (en) * | 2002-06-04 | 2011-05-10 | Alcatel-Lucent Usa Inc. | Loop elimination in a communications network |
US7346709B2 (en) * | 2002-08-28 | 2008-03-18 | Tellabs Operations, Inc. | Methods for assigning rings in a network |
US8463947B2 (en) * | 2002-08-28 | 2013-06-11 | Tellabs Operations, Inc. | Method of finding rings for optimal routing of digital information |
KR100456674B1 (en) * | 2002-11-09 | 2004-11-10 | 한국전자통신연구원 | Method and apparatus for determining communication path on network using spanning tree and detecting circuits |
JP3799010B2 (en) * | 2002-12-19 | 2006-07-19 | アンリツ株式会社 | Mesh network bridge |
US7917468B2 (en) | 2005-08-01 | 2011-03-29 | Seven Networks, Inc. | Linking of personal information management data |
US7853563B2 (en) | 2005-08-01 | 2010-12-14 | Seven Networks, Inc. | Universal data aggregation |
US8468126B2 (en) | 2005-08-01 | 2013-06-18 | Seven Networks, Inc. | Publishing data in an information community |
US8867333B2 (en) * | 2003-03-31 | 2014-10-21 | Alcatel Lucent | Restoration path calculation considering shared-risk link groups in mesh networks |
US7643408B2 (en) * | 2003-03-31 | 2010-01-05 | Alcatel-Lucent Usa Inc. | Restoration time in networks |
US8296407B2 (en) * | 2003-03-31 | 2012-10-23 | Alcatel Lucent | Calculation, representation, and maintenance of sharing information in mesh networks |
US7689693B2 (en) * | 2003-03-31 | 2010-03-30 | Alcatel-Lucent Usa Inc. | Primary/restoration path calculation in mesh networks based on multiple-cost criteria |
US7646706B2 (en) * | 2003-03-31 | 2010-01-12 | Alcatel-Lucent Usa Inc. | Restoration time in mesh networks |
US20040202185A1 (en) * | 2003-04-14 | 2004-10-14 | International Business Machines Corporation | Multiple virtual local area network support for shared network adapters |
US7376832B2 (en) | 2003-04-21 | 2008-05-20 | International Business Machines Corporation | Distributed method, system and computer program product for establishing security in a publish/subscribe data processing broker network |
US7558844B1 (en) | 2003-05-06 | 2009-07-07 | Juniper Networks, Inc. | Systems and methods for implementing dynamic subscriber interfaces |
US7336605B2 (en) | 2003-05-13 | 2008-02-26 | Corrigent Systems, Inc. | Bandwidth allocation for link aggregation |
US8078756B2 (en) * | 2003-06-03 | 2011-12-13 | Cisco Technology, Inc. | Computing a path for an open ended uni-directional path protected switched ring |
US7596595B2 (en) * | 2003-06-18 | 2009-09-29 | Utah State University | Efficient unicast-based multicast tree construction and maintenance for multimedia transmission |
US20050141523A1 (en) * | 2003-12-29 | 2005-06-30 | Chiang Yeh | Traffic engineering scheme using distributed feedback |
US8718057B1 (en) * | 2004-01-20 | 2014-05-06 | Nortel Networks Limited | Ethernet LAN service enhancements |
US8111612B2 (en) * | 2004-04-02 | 2012-02-07 | Alcatel Lucent | Link-based recovery with demand granularity in mesh networks |
US7418000B2 (en) * | 2004-06-03 | 2008-08-26 | Corrigent Systems Ltd. | Automated weight calculation for packet networks |
US7733812B2 (en) * | 2004-06-07 | 2010-06-08 | Alcatel | Method for enabling multipoint network services over a ring topology network |
US7330431B2 (en) * | 2004-09-03 | 2008-02-12 | Corrigent Systems Ltd. | Multipoint to multipoint communication over ring topologies |
GB2418326B (en) * | 2004-09-17 | 2007-04-11 | Hewlett Packard Development Co | Network vitrualization |
US7958208B2 (en) * | 2004-09-22 | 2011-06-07 | At&T Intellectual Property I, L.P. | System and method for designing a customized switched metro Ethernet data network |
WO2006045102A2 (en) * | 2004-10-20 | 2006-04-27 | Seven Networks, Inc. | Method and apparatus for intercepting events in a communication system |
US8010082B2 (en) | 2004-10-20 | 2011-08-30 | Seven Networks, Inc. | Flexible billing architecture |
US7974223B2 (en) | 2004-11-19 | 2011-07-05 | Corrigent Systems Ltd. | Virtual private LAN service over ring networks |
US7706781B2 (en) | 2004-11-22 | 2010-04-27 | Seven Networks International Oy | Data security in a mobile e-mail service |
FI117152B (en) | 2004-12-03 | 2006-06-30 | Seven Networks Internat Oy | E-mail service provisioning method for mobile terminal, involves using domain part and further parameters to generate new parameter set in list of setting parameter sets, if provisioning of e-mail service is successful |
US7877703B1 (en) | 2005-03-14 | 2011-01-25 | Seven Networks, Inc. | Intelligent rendering of information in a limited display environment |
US7768932B2 (en) * | 2005-04-13 | 2010-08-03 | Hewlett-Packard Development Company, L.P. | Method for analyzing a system in a network |
US7796742B1 (en) | 2005-04-21 | 2010-09-14 | Seven Networks, Inc. | Systems and methods for simplified provisioning |
US8438633B1 (en) | 2005-04-21 | 2013-05-07 | Seven Networks, Inc. | Flexible real-time inbox access |
US7957276B2 (en) | 2005-04-28 | 2011-06-07 | Telcordia Licensing Company, Llc | Call admission control and preemption control over a secure tactical network |
WO2006136660A1 (en) | 2005-06-21 | 2006-12-28 | Seven Networks International Oy | Maintaining an ip connection in a mobile network |
US7792017B2 (en) * | 2005-06-24 | 2010-09-07 | Infinera Corporation | Virtual local area network configuration for multi-chassis network element |
US8069166B2 (en) | 2005-08-01 | 2011-11-29 | Seven Networks, Inc. | Managing user-to-user contact with inferred presence information |
JP4283792B2 (en) * | 2005-08-29 | 2009-06-24 | 富士通株式会社 | Band control method and transmission apparatus |
US7933237B2 (en) | 2005-12-23 | 2011-04-26 | Telcordia Licensing Company, Llc | Ensuring quality of service of communications in networks |
US7983150B2 (en) | 2006-01-18 | 2011-07-19 | Corrigent Systems Ltd. | VPLS failure protection in ring networks |
US7769395B2 (en) * | 2006-06-20 | 2010-08-03 | Seven Networks, Inc. | Location-based operations and messaging |
US7808931B2 (en) | 2006-03-02 | 2010-10-05 | Corrigent Systems Ltd. | High capacity ring communication network |
US8274989B1 (en) * | 2006-03-31 | 2012-09-25 | Rockstar Bidco, LP | Point-to-multipoint (P2MP) resilience for GMPLS control of ethernet |
US7593400B2 (en) | 2006-05-19 | 2009-09-22 | Corrigent Systems Ltd. | MAC address learning in a distributed bridge |
US9250972B2 (en) * | 2006-06-19 | 2016-02-02 | International Business Machines Corporation | Orchestrated peer-to-peer server provisioning |
US7760668B1 (en) | 2006-06-20 | 2010-07-20 | Force 10 Networks, Inc. | Self-reconfiguring spanning tree |
US20080001717A1 (en) * | 2006-06-20 | 2008-01-03 | Trevor Fiatal | System and method for group management |
US7660303B2 (en) | 2006-08-22 | 2010-02-09 | Corrigent Systems Ltd. | Point-to-multipoint functionality in a bridged network |
US8340110B2 (en) | 2006-09-15 | 2012-12-25 | Trapeze Networks, Inc. | Quality of service provisioning for wireless networks |
US7903586B2 (en) * | 2006-11-01 | 2011-03-08 | Alcatel Lucent | Ring rapid multiple spanning tree protocol system and method |
KR20080082830A (en) * | 2007-03-09 | 2008-09-12 | 삼성전자주식회사 | Flushing processing unit and method of switching device in network for using spanning tree protocol |
US8693494B2 (en) | 2007-06-01 | 2014-04-08 | Seven Networks, Inc. | Polling |
US8805425B2 (en) | 2007-06-01 | 2014-08-12 | Seven Networks, Inc. | Integrated messaging |
US8385355B1 (en) * | 2007-11-07 | 2013-02-26 | Brixham Solutions Ltd | E-Trees over MPLS and PBB-TE networks |
CN100534024C (en) * | 2007-11-26 | 2009-08-26 | 中控科技集团有限公司 | Industry ethernet based fault processing method, system and a switching arrangement |
US8364181B2 (en) | 2007-12-10 | 2013-01-29 | Seven Networks, Inc. | Electronic-mail filtering for mobile devices |
US9002828B2 (en) | 2007-12-13 | 2015-04-07 | Seven Networks, Inc. | Predictive content delivery |
US8793305B2 (en) | 2007-12-13 | 2014-07-29 | Seven Networks, Inc. | Content delivery to a mobile device from a content service |
US8107921B2 (en) | 2008-01-11 | 2012-01-31 | Seven Networks, Inc. | Mobile virtual network operator |
US8862657B2 (en) | 2008-01-25 | 2014-10-14 | Seven Networks, Inc. | Policy based content service |
US20090193338A1 (en) | 2008-01-28 | 2009-07-30 | Trevor Fiatal | Reducing network and battery consumption during content delivery and playback |
US7995488B2 (en) * | 2008-02-29 | 2011-08-09 | Telefonaktiebolaget L M Ericsson (Publ) | Connectivity fault management for ethernet tree (E-Tree) type services |
US8787947B2 (en) | 2008-06-18 | 2014-07-22 | Seven Networks, Inc. | Application discovery on mobile devices |
US8078158B2 (en) | 2008-06-26 | 2011-12-13 | Seven Networks, Inc. | Provisioning applications for a mobile device |
US8909759B2 (en) | 2008-10-10 | 2014-12-09 | Seven Networks, Inc. | Bandwidth measurement |
CN102714611B (en) * | 2010-01-29 | 2016-04-27 | 惠普发展公司,有限责任合伙企业 | The configuration of network link in virtual connection environment |
WO2011126889A2 (en) | 2010-03-30 | 2011-10-13 | Seven Networks, Inc. | 3d mobile user interface with configurable workspace management |
US8838783B2 (en) | 2010-07-26 | 2014-09-16 | Seven Networks, Inc. | Distributed caching for resource and mobile network traffic management |
GB2500333B (en) | 2010-07-26 | 2014-10-08 | Seven Networks Inc | Mobile application traffic optimization |
US9077630B2 (en) | 2010-07-26 | 2015-07-07 | Seven Networks, Inc. | Distributed implementation of dynamic wireless traffic policy |
US9043433B2 (en) | 2010-07-26 | 2015-05-26 | Seven Networks, Inc. | Mobile network traffic coordination across multiple applications |
US9330196B2 (en) | 2010-11-01 | 2016-05-03 | Seven Networks, Llc | Wireless traffic management system cache optimization using http headers |
US8484314B2 (en) | 2010-11-01 | 2013-07-09 | Seven Networks, Inc. | Distributed caching in a wireless network of content delivered for a mobile application over a long-held request |
WO2012061437A1 (en) | 2010-11-01 | 2012-05-10 | Michael Luna | Cache defeat detection and caching of content addressed by identifiers intended to defeat cache |
GB2499534B (en) | 2010-11-01 | 2018-09-19 | Seven Networks Llc | Caching adapted for mobile application behavior and network conditions |
US9060032B2 (en) | 2010-11-01 | 2015-06-16 | Seven Networks, Inc. | Selective data compression by a distributed traffic management system to reduce mobile data traffic and signaling traffic |
WO2012060995A2 (en) | 2010-11-01 | 2012-05-10 | Michael Luna | Distributed caching in a wireless network of content delivered for a mobile application over a long-held request |
US8326985B2 (en) | 2010-11-01 | 2012-12-04 | Seven Networks, Inc. | Distributed management of keep-alive message signaling for mobile network resource conservation and optimization |
US8843153B2 (en) | 2010-11-01 | 2014-09-23 | Seven Networks, Inc. | Mobile traffic categorization and policy for network use optimization while preserving user experience |
US8166164B1 (en) | 2010-11-01 | 2012-04-24 | Seven Networks, Inc. | Application and network-based long poll request detection and cacheability assessment therefor |
GB2495463B (en) | 2010-11-22 | 2013-10-09 | Seven Networks Inc | Aligning data transfer to optimize connections established for transmission over a wireless network |
GB2500327B (en) | 2010-11-22 | 2019-11-06 | Seven Networks Llc | Optimization of resource polling intervals to satisfy mobile device requests |
GB2501416B (en) | 2011-01-07 | 2018-03-21 | Seven Networks Llc | System and method for reduction of mobile network traffic used for domain name system (DNS) queries |
WO2012145533A2 (en) | 2011-04-19 | 2012-10-26 | Seven Networks, Inc. | Shared resource and virtual resource management in a networked environment |
GB2504037B (en) | 2011-04-27 | 2014-12-24 | Seven Networks Inc | Mobile device which offloads requests made by a mobile application to a remote entity for conservation of mobile device and network resources |
WO2012149434A2 (en) | 2011-04-27 | 2012-11-01 | Seven Networks, Inc. | Detecting and preserving state for satisfying application requests in a distributed proxy and cache system |
WO2013015994A1 (en) | 2011-07-27 | 2013-01-31 | Seven Networks, Inc. | Monitoring mobile application activities for malicious traffic on a mobile device |
US9692732B2 (en) | 2011-11-29 | 2017-06-27 | Amazon Technologies, Inc. | Network connection automation |
US8868753B2 (en) | 2011-12-06 | 2014-10-21 | Seven Networks, Inc. | System of redundantly clustered machines to provide failover mechanisms for mobile traffic management and network resource conservation |
US8934414B2 (en) | 2011-12-06 | 2015-01-13 | Seven Networks, Inc. | Cellular or WiFi mobile traffic optimization based on public or private network destination |
WO2013086447A1 (en) | 2011-12-07 | 2013-06-13 | Seven Networks, Inc. | Radio-awareness of mobile device for sending server-side control signals using a wireless network optimized transport protocol |
US9009250B2 (en) | 2011-12-07 | 2015-04-14 | Seven Networks, Inc. | Flexible and dynamic integration schemas of a traffic management system with various network operators for network traffic alleviation |
US8861354B2 (en) | 2011-12-14 | 2014-10-14 | Seven Networks, Inc. | Hierarchies and categories for management and deployment of policies for distributed wireless traffic optimization |
EP2792188B1 (en) | 2011-12-14 | 2019-03-20 | Seven Networks, LLC | Mobile network reporting and usage analytics system and method using aggregation of data in a distributed traffic optimization system |
US9832095B2 (en) | 2011-12-14 | 2017-11-28 | Seven Networks, Llc | Operation modes for mobile traffic optimization and concurrent management of optimized and non-optimized traffic |
GB2499306B (en) | 2012-01-05 | 2014-10-22 | Seven Networks Inc | Managing user interaction with an application on a mobile device |
WO2013116856A1 (en) | 2012-02-02 | 2013-08-08 | Seven Networks, Inc. | Dynamic categorization of applications for network access in a mobile network |
US9326189B2 (en) | 2012-02-03 | 2016-04-26 | Seven Networks, Llc | User as an end point for profiling and optimizing the delivery of content and data in a wireless network |
US8812695B2 (en) | 2012-04-09 | 2014-08-19 | Seven Networks, Inc. | Method and system for management of a virtual network connection without heartbeat messages |
US10263899B2 (en) | 2012-04-10 | 2019-04-16 | Seven Networks, Llc | Enhanced customer service for mobile carriers using real-time and historical mobile application and traffic or optimization data associated with mobile devices in a mobile network |
US8817598B2 (en) * | 2012-04-19 | 2014-08-26 | Cisco Technology, Inc. | Hardware based convergence for a ring network |
WO2014011216A1 (en) | 2012-07-13 | 2014-01-16 | Seven Networks, Inc. | Dynamic bandwidth adjustment for browsing or streaming activity in a wireless network based on prediction of user behavior when interacting with mobile applications |
US9161258B2 (en) | 2012-10-24 | 2015-10-13 | Seven Networks, Llc | Optimized and selective management of policy deployment to mobile clients in a congested network to prevent further aggravation of network congestion |
US9307493B2 (en) | 2012-12-20 | 2016-04-05 | Seven Networks, Llc | Systems and methods for application management of mobile device radio state promotion and demotion |
US9241314B2 (en) | 2013-01-23 | 2016-01-19 | Seven Networks, Llc | Mobile device with application or context aware fast dormancy |
US8874761B2 (en) | 2013-01-25 | 2014-10-28 | Seven Networks, Inc. | Signaling optimization in a wireless network for traffic utilizing proprietary and non-proprietary protocols |
US8750123B1 (en) | 2013-03-11 | 2014-06-10 | Seven Networks, Inc. | Mobile device equipped with mobile network congestion recognition to make intelligent decisions regarding connecting to an operator network |
US9065765B2 (en) | 2013-07-22 | 2015-06-23 | Seven Networks, Inc. | Proxy server associated with a mobile carrier for enhancing mobile traffic management in a mobile network |
US11563806B1 (en) * | 2019-05-17 | 2023-01-24 | R-Stor, Inc. | Content distribution network system and method |
CN113645114A (en) * | 2021-08-13 | 2021-11-12 | 广汽丰田汽车有限公司 | Network failure prevention system, network management method, vehicle, and storage medium |
Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4872157A (en) * | 1988-03-31 | 1989-10-03 | American Telephone And Telegraph Company, At&T Bell Laboratories | Architecture and organization of a high performance metropolitan area telecommunications packet network |
US4872158A (en) * | 1988-03-31 | 1989-10-03 | American Telephone And Telegraph Company, At&T Bell Laboratories | Distributed control rapid connection circuit switch |
US5081621A (en) * | 1988-04-05 | 1992-01-14 | Hitachi, Ltd. | Method and apparatus for controlling data communication on a multi-network |
US5517498A (en) * | 1993-09-20 | 1996-05-14 | International Business Machines Corporation | Spatial reuse of bandwidth on a ring network |
US5757795A (en) * | 1996-04-25 | 1998-05-26 | Compaq Computer Corporation | Method and apparatus for hashing addresses in a network switch |
US5881131A (en) * | 1993-11-16 | 1999-03-09 | Bell Atlantic Network Services, Inc. | Analysis and validation system for provisioning network related facilities |
US5935209A (en) * | 1996-09-09 | 1999-08-10 | Next Level Communications | System and method for managing fiber-to-the-curb network elements |
US6085238A (en) * | 1996-04-23 | 2000-07-04 | Matsushita Electric Works, Ltd. | Virtual LAN system |
US6084858A (en) * | 1997-01-29 | 2000-07-04 | Cabletron Systems, Inc. | Distribution of communication load over multiple paths based upon link utilization |
US6094687A (en) * | 1998-01-17 | 2000-07-25 | Fore Systems, Inc. | System and method for connecting source nodes and destination nodes regarding efficient quality of services route determination using connection profiles |
US6262977B1 (en) * | 1998-08-28 | 2001-07-17 | 3Com Corporation | High availability spanning tree with rapid reconfiguration |
US6304575B1 (en) * | 1998-08-31 | 2001-10-16 | Cisco Technology, Inc. | Token ring spanning tree protocol |
US6515969B1 (en) * | 1999-03-01 | 2003-02-04 | Cisco Technology, Inc. | Virtual local area network membership registration protocol for multiple spanning tree network environments |
US6535490B1 (en) * | 1999-03-04 | 2003-03-18 | 3Com Corporation | High availability spanning tree with rapid reconfiguration with alternate port selection |
US6629149B1 (en) * | 1999-08-17 | 2003-09-30 | At&T Corp. | Network system and method |
US6628624B1 (en) * | 1998-12-09 | 2003-09-30 | Cisco Technology, Inc. | Value-added features for the spanning tree protocol |
Family Cites Families (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB9401092D0 (en) * | 1994-01-21 | 1994-03-16 | Newbridge Networks Corp | A network management system |
US5742604A (en) * | 1996-03-28 | 1998-04-21 | Cisco Systems, Inc. | Interswitch link mechanism for connecting high-performance network switches |
EP0844755B1 (en) * | 1996-08-27 | 2007-10-03 | Nippon Telegraph And Telephone Corporation | Trunk transmission network |
US5923659A (en) * | 1996-09-20 | 1999-07-13 | Bell Atlantic Network Services, Inc. | Telecommunications network |
US6157647A (en) * | 1996-11-06 | 2000-12-05 | 3Com Corporation | Direct addressing between VLAN subnets |
AU729166B2 (en) * | 1996-12-06 | 2001-01-25 | Telcordia Technologies, Inc. | Inter-ring cross-connect for survivable multi-wavelength optical communication networks |
US5940376A (en) * | 1997-01-29 | 1999-08-17 | Cabletron Systems, Inc. | Method and apparatus to establish a tap-point in a switched network using self-configuring switches having distributed configuration capabilities |
US6041057A (en) * | 1997-03-24 | 2000-03-21 | Xylan Corporation | Self-configuring ATM network |
US6331983B1 (en) * | 1997-05-06 | 2001-12-18 | Enterasys Networks, Inc. | Multicast switching |
US6061335A (en) * | 1997-07-24 | 2000-05-09 | At&T Corp | Method for designing SONET ring networks suitable for local access |
US6295146B1 (en) * | 1998-01-14 | 2001-09-25 | Mci Communications Corporation | System and method for sharing a spare channel among two or more optical ring networks |
US6674727B1 (en) * | 1998-11-30 | 2004-01-06 | Cisco Technology, Inc. | Distributed ring protocol and database |
US6373826B1 (en) * | 1998-12-15 | 2002-04-16 | Nortel Networks Limited | Spanning tree algorithm |
US6707789B1 (en) * | 1998-12-18 | 2004-03-16 | At&T Corp. | Flexible SONET ring with integrated cross-connect system |
EP1132844A3 (en) * | 2000-03-02 | 2002-06-05 | Telseon IP Services Inc. | E-commerce system facilitating service networks including broadband communication service networks |
US6744769B1 (en) * | 2000-10-19 | 2004-06-01 | Nortel Networks Limited | Path provisioning on ring-based networks |
-
2001
- 2001-02-22 EP EP01301581A patent/EP1132844A3/en not_active Withdrawn
- 2001-03-01 US US09/796,842 patent/US20020023170A1/en not_active Abandoned
- 2001-03-01 US US09/796,825 patent/US6826158B2/en not_active Expired - Lifetime
- 2001-03-01 US US09/796,922 patent/US20020038253A1/en not_active Abandoned
Patent Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4872157A (en) * | 1988-03-31 | 1989-10-03 | American Telephone And Telegraph Company, At&T Bell Laboratories | Architecture and organization of a high performance metropolitan area telecommunications packet network |
US4872158A (en) * | 1988-03-31 | 1989-10-03 | American Telephone And Telegraph Company, At&T Bell Laboratories | Distributed control rapid connection circuit switch |
US5081621A (en) * | 1988-04-05 | 1992-01-14 | Hitachi, Ltd. | Method and apparatus for controlling data communication on a multi-network |
US5517498A (en) * | 1993-09-20 | 1996-05-14 | International Business Machines Corporation | Spatial reuse of bandwidth on a ring network |
US5881131A (en) * | 1993-11-16 | 1999-03-09 | Bell Atlantic Network Services, Inc. | Analysis and validation system for provisioning network related facilities |
US6085238A (en) * | 1996-04-23 | 2000-07-04 | Matsushita Electric Works, Ltd. | Virtual LAN system |
US5757795A (en) * | 1996-04-25 | 1998-05-26 | Compaq Computer Corporation | Method and apparatus for hashing addresses in a network switch |
US5935209A (en) * | 1996-09-09 | 1999-08-10 | Next Level Communications | System and method for managing fiber-to-the-curb network elements |
US6084858A (en) * | 1997-01-29 | 2000-07-04 | Cabletron Systems, Inc. | Distribution of communication load over multiple paths based upon link utilization |
US6094687A (en) * | 1998-01-17 | 2000-07-25 | Fore Systems, Inc. | System and method for connecting source nodes and destination nodes regarding efficient quality of services route determination using connection profiles |
US6262977B1 (en) * | 1998-08-28 | 2001-07-17 | 3Com Corporation | High availability spanning tree with rapid reconfiguration |
US6304575B1 (en) * | 1998-08-31 | 2001-10-16 | Cisco Technology, Inc. | Token ring spanning tree protocol |
US6628624B1 (en) * | 1998-12-09 | 2003-09-30 | Cisco Technology, Inc. | Value-added features for the spanning tree protocol |
US6515969B1 (en) * | 1999-03-01 | 2003-02-04 | Cisco Technology, Inc. | Virtual local area network membership registration protocol for multiple spanning tree network environments |
US6535490B1 (en) * | 1999-03-04 | 2003-03-18 | 3Com Corporation | High availability spanning tree with rapid reconfiguration with alternate port selection |
US6629149B1 (en) * | 1999-08-17 | 2003-09-30 | At&T Corp. | Network system and method |
Cited By (72)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020009092A1 (en) * | 2000-03-02 | 2002-01-24 | Seaman Michael J. | Broadband tree-configured ring for metropolitan area networks |
US6826158B2 (en) * | 2000-03-02 | 2004-11-30 | Onfiber Communications, Inc. | Broadband tree-configured ring for metropolitan area networks |
US20060275034A9 (en) * | 2000-05-22 | 2006-12-07 | Winston Way | Fully protected broadcast and select all optical network |
US20030180047A1 (en) * | 2000-05-22 | 2003-09-25 | Winston Way | Fully protected broadcast and select all optical network |
US20060269295A1 (en) * | 2000-05-22 | 2006-11-30 | Opvista Incorporated, A California Corporation | Optical double sideband modulation technique with increased spectral efficiency |
US7515833B2 (en) | 2000-05-22 | 2009-04-07 | Opvista Incorporated | Optical double sideband modulation technique with increased spectral efficiency |
US7499647B2 (en) | 2000-05-22 | 2009-03-03 | Opvista Incorporated | Fully protected broadcast and select all optical network |
US7545757B2 (en) * | 2000-09-11 | 2009-06-09 | Cisco Technolohy, Inc. | STP root guard |
US20060092862A1 (en) * | 2000-09-11 | 2006-05-04 | Benedetto Marco D | STP root guard |
US20080259786A1 (en) * | 2001-09-04 | 2008-10-23 | Rumi Sheryar Gonda | System and method for supporting sdh/sonet aps on ethernet |
US7746768B2 (en) | 2001-09-04 | 2010-06-29 | Rumi Sheryar Gonda | System and method for supporting SDH/SONET APS on ethernet |
US7394758B2 (en) | 2001-09-04 | 2008-07-01 | Rumi Sheryar Gonda | Method for supporting SDH/SONET APS on Ethernet |
US20030043736A1 (en) * | 2001-09-04 | 2003-03-06 | Gonda Rumi Sheryar | Method for supporting SDH/SONET APS on ethernet |
US7154861B1 (en) * | 2002-04-22 | 2006-12-26 | Extreme Networks | Method and system for a virtual local area network to span multiple loop free network topology domains |
US7680031B1 (en) * | 2002-04-26 | 2010-03-16 | Redback Networks Inc. | Method and apparatus for load balancing and protecting data traffic in an optical ring |
US20050254448A1 (en) * | 2002-05-08 | 2005-11-17 | Haitao Tang | Distribution scheme for distributing information in a network |
US8023435B2 (en) * | 2002-05-08 | 2011-09-20 | Nokia Corporation | Distribution scheme for distributing information in a network |
US7398321B2 (en) * | 2002-05-14 | 2008-07-08 | The Research Foundation Of Suny | Segment protection scheme for a network |
US20030229807A1 (en) * | 2002-05-14 | 2003-12-11 | The Research Foundation Of State University Of New York, University At Buffalo | Segment protection scheme for a network |
US20040105455A1 (en) * | 2002-08-29 | 2004-06-03 | Seaman Michael John | Automatic edge port and one way connectivity detection with rapid reconfiguration for shared media in spanning tree configured bridged Local Area Networks |
US20040098510A1 (en) * | 2002-11-15 | 2004-05-20 | Ewert Peter M. | Communicating between network processors |
US20060123428A1 (en) * | 2003-05-15 | 2006-06-08 | Nantasket Software, Inc. | Network management system permitting remote management of systems by users with limited skills |
US7602706B1 (en) * | 2003-05-15 | 2009-10-13 | Cisco Technology, Inc. | Inter-ring protection for shared packet rings |
US20050050220A1 (en) * | 2003-08-26 | 2005-03-03 | Alcatel | Selective transmission rate limiter for rapid spanning tree protocol |
US7324461B2 (en) | 2003-08-26 | 2008-01-29 | Alcatel Lucent | Selective transmission rate limiter for rapid spanning tree protocol |
US7577367B2 (en) | 2004-06-15 | 2009-08-18 | Op Vista Incorporated | Optical communication using duobinary modulation |
US20050286908A1 (en) * | 2004-06-15 | 2005-12-29 | Way Winston I | Optical communication using duobinary modulation |
US20060007869A1 (en) * | 2004-07-09 | 2006-01-12 | Fujitsu Limited | Method for preventing control packet loop and bridge apparatus using the method |
US8582467B2 (en) * | 2004-07-09 | 2013-11-12 | Fujitsu Limited | Method for preventing control packet looping and bridge apparatus using the method |
US9246834B2 (en) | 2004-10-22 | 2016-01-26 | Cisco Technology, Inc. | Fibre channel over ethernet |
US20110007741A1 (en) * | 2004-10-22 | 2011-01-13 | Cisco Technology, Inc. | Forwarding table reduction and multipath network forwarding |
US8532099B2 (en) * | 2004-10-22 | 2013-09-10 | Cisco Technology, Inc. | Forwarding table reduction and multipath network forwarding |
US8842694B2 (en) | 2004-10-22 | 2014-09-23 | Cisco Technology, Inc. | Fibre Channel over Ethernet |
US20060171302A1 (en) * | 2005-02-03 | 2006-08-03 | Cisco Technology, Inc. | Data transmission in a network comprising bridges |
US20060275035A1 (en) * | 2005-05-02 | 2006-12-07 | Way Winston I | Multiple interconnected broadcast and select optical ring networks with revertible protection switch |
WO2006119375A3 (en) * | 2005-05-02 | 2007-10-11 | Opvista Inc | Multiple interconnected broadcast and select optical ring networks with revertible protection switch |
WO2006119375A2 (en) * | 2005-05-02 | 2006-11-09 | Opvista, Incorporated | Multiple interconnected broadcast and select optical ring networks with revertible protection switch |
US20060291378A1 (en) * | 2005-06-28 | 2006-12-28 | Alcatel | Communication path redundancy protection systems and methods |
US9203731B2 (en) * | 2005-09-16 | 2015-12-01 | Cisco Technology, Inc. | Mechanism to implement a layer 2 gateway |
US20070076635A1 (en) * | 2005-09-16 | 2007-04-05 | Cisco Technology, Inc. | Mechanism to implement a layer 2 gateway |
US8792352B2 (en) | 2005-10-11 | 2014-07-29 | Cisco Technology, Inc. | Methods and devices for backward congestion notification |
US20070086332A1 (en) * | 2005-10-13 | 2007-04-19 | Way Winston I | Optical ring networks using circulating optical probe in protection switching with automatic reversion |
US8139476B2 (en) | 2005-10-13 | 2012-03-20 | Vello Systems, Inc. | Optical ring networks using circulating optical probe in protection switching with automatic reversion |
KR100723883B1 (en) | 2005-12-07 | 2007-05-31 | 한국전자통신연구원 | Root switch in ethernet network and method for mapping switch to a unique identifier by using the same |
US7836360B2 (en) * | 2007-04-09 | 2010-11-16 | International Business Machines Corporation | System and method for intrusion prevention high availability fail over |
US20080250137A1 (en) * | 2007-04-09 | 2008-10-09 | International Business Machines Corporation | System and method for intrusion prevention high availability fail over |
US7773883B1 (en) | 2007-05-04 | 2010-08-10 | Vello Systems, Inc. | Single-fiber optical ring networks based on optical double sideband modulation |
US20080279096A1 (en) * | 2007-05-11 | 2008-11-13 | Sullivan Michael J | Lightweight node based network redundancy solution leveraging rapid spanning tree protocol (rstp) |
GB2449178A (en) * | 2007-05-11 | 2008-11-12 | Boeing Co | Dynamic switching to a redundant bridge by a node using bridge protoccol data unit (BPDU) messages and the rapid spanning tree protocol (RSTP) |
GB2449178B (en) * | 2007-05-11 | 2009-09-23 | Boeing Co | Lightweight node based network redundancy solution leveraging rapid spanning tree protocol (RSTP) |
US7792056B2 (en) * | 2007-05-11 | 2010-09-07 | The Boeing Company | Lightweight node based network redundancy solution leveraging rapid spanning tree protocol (RSTP) |
US8175458B2 (en) | 2007-07-17 | 2012-05-08 | Vello Systems, Inc. | Optical ring networks having node-to-node optical communication channels for carrying data traffic |
US8804529B2 (en) | 2007-08-21 | 2014-08-12 | Cisco Technology, Inc. | Backward congestion notification |
US9237034B2 (en) * | 2008-10-21 | 2016-01-12 | Iii Holdings 1, Llc | Methods and systems for providing network access redundancy |
US20100097926A1 (en) * | 2008-10-21 | 2010-04-22 | Liquid Computing Corporation | Methods and systems for providing network access redundancy |
US9979678B2 (en) | 2008-10-21 | 2018-05-22 | Iii Holdings 1, Llc | Methods and systems for providing network access redundancy |
US20100322263A1 (en) * | 2009-06-18 | 2010-12-23 | Nortel Networks Limoted | Method and Apparatus for Implementing Control of Multiple Physically Dual Homed Devices |
US8649259B2 (en) | 2009-06-18 | 2014-02-11 | Rockstar Consortium Us Lp | Method and apparatus for implementing control of multiple physically dual homed devices |
US8184648B2 (en) * | 2009-06-18 | 2012-05-22 | Rockstar Bidco, LP | Method and apparatus for implementing control of multiple physically dual homed devices |
US8744262B2 (en) | 2009-12-08 | 2014-06-03 | Vello Systems, Inc. | Optical subchannel routing, protection switching and security |
US10972209B2 (en) | 2009-12-08 | 2021-04-06 | Snell Holdings, Llc | Subchannel photonic routing, switching and protection with simplified upgrades of WDM optical networks |
US9054832B2 (en) | 2009-12-08 | 2015-06-09 | Treq Labs, Inc. | Management, monitoring and performance optimization of optical networks |
US10630418B2 (en) | 2009-12-08 | 2020-04-21 | Snell Holdings, Llc | Optical subchannel routing, protection switching and security |
US20110158641A1 (en) * | 2009-12-08 | 2011-06-30 | Vello Systems, Inc. | Subchannel Photonic Routing, Switching and Protection with Simplified Upgrades of WDM Optical Networks |
US9485050B2 (en) | 2009-12-08 | 2016-11-01 | Treq Labs, Inc. | Subchannel photonic routing, switching and protection with simplified upgrades of WDM optical networks |
US8705741B2 (en) | 2010-02-22 | 2014-04-22 | Vello Systems, Inc. | Subchannel security at the optical layer |
US20110206203A1 (en) * | 2010-02-22 | 2011-08-25 | Vello Systems, Inc. | Subchannel security at the optical layer |
US8542999B2 (en) | 2011-02-01 | 2013-09-24 | Vello Systems, Inc. | Minimizing bandwidth narrowing penalties in a wavelength selective switch optical network |
US9124524B2 (en) * | 2011-06-29 | 2015-09-01 | Broadcom Corporation | System and method for priority based flow control between nodes |
US20130003550A1 (en) * | 2011-06-29 | 2013-01-03 | Broadcom Corporation | System and Method for Priority Based Flow Control Between Nodes |
US11025527B2 (en) * | 2019-07-22 | 2021-06-01 | Dell Products L.P. | Topology change processing in bridged networks using a spanning tree protocol |
US11950140B2 (en) | 2021-10-25 | 2024-04-02 | Dell Products Lp | System and method for providing device management and network management at an edge device |
Also Published As
Publication number | Publication date |
---|---|
US20020009092A1 (en) | 2002-01-24 |
EP1132844A3 (en) | 2002-06-05 |
EP1132844A2 (en) | 2001-09-12 |
US20020038253A1 (en) | 2002-03-28 |
US6826158B2 (en) | 2004-11-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20020023170A1 (en) | Use of active topology protocols, including the spanning tree, for resilient redundant connection of an edge device | |
US8854975B2 (en) | Scaling OAM for point-to-point trunking | |
US6963575B1 (en) | Enhanced data switching/routing for multi-regional IP over fiber network | |
KR101503629B1 (en) | Differential forwarding in address-based carrier networks | |
US7872991B2 (en) | Methods and systems for providing MPLS-based layer-2 virtual private network services | |
US7272137B2 (en) | Data stream filtering apparatus and method | |
EP1974485B1 (en) | Vpls failure protection in ring networks | |
RU2530338C2 (en) | Prepared connection based on state of communication lines of providers (plsb) with routed redundancy | |
US7152115B2 (en) | Virtual private networks | |
US8687519B2 (en) | Forced medium access control (MAC) learning in bridged ethernet networks | |
US7986619B2 (en) | Packet network system | |
KR20070095374A (en) | Connection-oriented communications scheme for connection-less communications traffic | |
CN102273138A (en) | Inter-network carrier Ethernet service protection | |
US20070121664A1 (en) | Method and system for double data rate transmission | |
JP5295273B2 (en) | Data stream filtering apparatus and method | |
US20090279551A1 (en) | Vertical integration of network management for ethernet and the optical transport | |
WO2008053145A1 (en) | Ethernet p-cycle protection scheme | |
Forouzan | Local area networks | |
US20070121619A1 (en) | Communications distribution system | |
US7715429B2 (en) | Interconnect system for supply chain management of virtual private network services | |
JP7243202B2 (en) | Network management device, method and program | |
JP2004032633A (en) | System and method for monitoring transmission network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: TELSEON IP SERVICES, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SEAMAN, MICHAEL J.;JAIN, VIPIN;REEL/FRAME:011584/0864 Effective date: 20010228 |
|
AS | Assignment |
Owner name: ONFIBER COMMUNICATIONS, INC., COLORADO Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:TELSEON IP SERVICES INC.;REEL/FRAME:013374/0513 Effective date: 20020731 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |
|
AS | Assignment |
Owner name: COMERICA BANK, MICHIGAN Free format text: SECURITY AGREEMENT;ASSIGNORS:ONFIBER COMMUNICATIONS, INC.;ONFIBER CARRIER SERVICES - VIRGINIA, INC.;INFO-TECH COMMUNICATIONS;AND OTHERS;REEL/FRAME:017379/0215 Effective date: 20051006 |
|
AS | Assignment |
Owner name: ONFIBER CARRIER SERVICES, INC., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:COMERICA BANK;REEL/FRAME:018847/0033 Effective date: 20070202 Owner name: ONFIBER CARRIER SERVICES-VIRGINIA, INC., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:COMERICA BANK;REEL/FRAME:018847/0033 Effective date: 20070202 Owner name: INFO-TECH COMMUNICATIONS, TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:COMERICA BANK;REEL/FRAME:018847/0033 Effective date: 20070202 Owner name: ONFIBER COMMUNICATIONS, INC., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:COMERICA BANK;REEL/FRAME:018847/0033 Effective date: 20070202 |
|
AS | Assignment |
Owner name: QWEST COMMUNICATIONS INTERNATIONAL INC., COLORADO Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ONFIBER COMMUNICATIONS, INC.;REEL/FRAME:019781/0759 Effective date: 20070830 |