throbber
US007450598B2
`
`(12) United States Patent
`Chen et al.
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 7.450,598 B2
`Nov. 11, 2008
`
`(54)
`
`(75)
`
`(73)
`
`(*)
`
`(21)
`(22)
`(65)
`
`(51)
`
`(52)
`(58)
`
`(56)
`
`SYSTEMAND METHOD TO PROVISION
`MPLS/VPN NETWORK
`
`Inventors: Wenge Chen, Pleasanton, CA (US);
`Holly Chen, San Ramon, CA (US);
`Kuo-Hui Liu, San Ramon, CA (US);
`Shih Chung Soon, Dublin, CA (US);
`Bei Zhou, Pleasanton, CA (US)
`Assignee: AT&T Intellectual Property I, L.P.,
`Reno, NV (US)
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 957 days.
`Appl. No.: 10/736,445
`
`Notice:
`
`Filed:
`
`Dec. 15, 2003
`
`Prior Publication Data
`US 2006/O182O37 A1
`Aug. 17, 2006
`
`Int. C.
`(2006.01)
`H04L 2/54
`U.S. Cl. ....................................... 370/409; 370/254
`Field of Classification Search ................. 370/254,
`370/401, 230, 234, 223
`See application file for complete search history.
`References Cited
`U.S. PATENT DOCUMENTS
`
`3/2003 Howard et al.
`6,529,513 B1
`3, 2003 Dantu et al.
`6,532,088 B1
`7/2003 Aukia et al.
`6,594,268 B1 ck
`6/2005 Zavgren, Jr. ................ 370.245
`6,909,696 B1 ck
`4/2006 Datta et al. ..
`... 709,223
`7,024,472 B1
`2002fO181477 A1* 12, 2002 MO et al. .....
`... 370, 401
`2002/0186664 A1* 12/2002 Gibson et al. ...
`... 370,254
`2002/019 1541 A1* 12/2002 Buchanan et al. ........... 370,230
`2003/0079043 A1* 4/2003 Chang et al. ................ TO9,249
`2004/0037275 A1* 2, 2004 Li et al. .......
`... 370/370
`2004/0093492 A1* 5, 2004 Daude et al. ................ T13,156
`2004/0255028 A1* 12/2004 Chu et al. ................... 709,227
`
`
`
`2005/025 1568 A1* 1 1/2005 Zavgren, Jr. ................ 709,223
`2006/0215578 A1* 9/2006 Andrapalliyalet al. ...... 370,254
`2007/0226325 A1
`9, 2007 Bawa et al. ................. 709,223
`2007/0226630 A1* 9, 2007 Farid et al. .................. 715.734
`
`(Continued)
`FOREIGN PATENT DOCUMENTS
`
`WO
`
`WOO2 O98046 A2 * 12/2002
`
`(Continued)
`OTHER PUBLICATIONS
`
`The latest in virtual private networks: part I Metz, C.; Internet Com
`puting, IEEE vol. 7, Issue 1, Jan.-Feb. 2003 pp. 87-91.*
`Primary Examiner Edan Orgad
`Assistant Examiner Salman Ahmed
`(74) Attorney, Agent, or Firm Toler Law Group
`
`(57)
`
`ABSTRACT
`
`The disclosed method and system provides a new service
`provision interface that allows operator use without requiring
`many of the specific technical network details, such as VRF,
`RT, SOO, route redistribution, etc. Further, the translation
`from a customer's requirements (including both VPN topol
`ogy membership requirement and L2, L3 requirement from
`customer) into technical network configuration commands
`are handled using an automated method that is transparent to
`the operator.
`
`In a particular illustrative embodiment of this patent disclo
`sure, a high level table with reduced technical detail is gen
`erated by an operator and an automated provisioning system,
`without operator visibility or required operator interaction,
`creates intermediate data including network Specific techni
`cal information in an automated E. tO G a deplov
`ble network topology includi p VRF i RT assi p
`e networ E. ogy including
`al
`asS1gnments
`or use in network prov1s10ning.
`
`23 Claims, 9 Drawing Sheets
`
`ONPE 440 / ?
`CE1
`FullMesh. Both F1
`FullMesh Both FM2
`
`422
`
`CE4
`Both FM
`Both FM2
`
`424
`
`426
`
`428
`
`433
`
`Both FM
`
`Both FM 1
`
`Both FM 4
`
`402
`404
`408
`
`FullMesh
`Central
`48 Service
`Esport HS25 Hub
`H&S
`0.
`2WRFs import HS2.SSake
`H&S
`WRF
`WRFP
`414
`ONPE2450
`
`wRF
`
`Both FM3
`
`Export CS4 Server import
`liport CS4 Servenpo
`
`WRF2
`
`export HS18 Hub
`export HS16 Hub
`Export HSS Hub
`import HS Spoke import HSS Spoke import RS6Spoke
`WRF3
`WRF4
`432
`
`ONP346
`Topology CES
`FullMe8
`FullMe8
`FMesh
`Central
`Service
`H&S
`2WRFs
`WRF on P3
`
`Export HS25 Hub
`port HS25 Spoke
`WRF1
`
`CE8
`
`cEf
`
`itFM2
`
`Export HS25 Spoks
`
`inport HS25 Hui
`
`WRF2
`
`WRF3
`
`CE8
`
`Beth FM3
`Both CS4Sarver
`import CS Server import
`ExportHS25 Hub
`inportHS25 Spoke
`WRF 4
`
`CE2
`
`FullMesh
`FullMesh
`FullMesh Both FM 3
`Central
`Both CS4 Server import
`Service
`CS Serve lified
`H&S
`2WRFs
`H&S
`WR
`
`CE3
`
`Both F3
`
`Export HS18Spoke
`importHS6 Hub
`
`CE9
`Both FM 1
`
`Both F3
`Export CS Sanet import Export CS4. Serve import
`import CS4 Server Export importCS4Server Export
`Export HS15 Hub
`import HSSpoke
`
`ExportHS16 Hub
`liport HS&Spoke
`
`Ex.1014
`CISCO SYSTEMS, INC. / Page 1 of 15
`
`

`

`US 7.450,598 B2
`Page 2
`
`U.S. PATENT DOCUMENTS
`
`ck
`5/2008 Elias et al. .................. 370/401
`2008/0101385 A1
`FOREIGN PATENT DOCUMENTS
`WOO2 O995.71 A2 * 12/2002
`
`WO
`
`WO
`WO
`WO
`
`WOO2 100.043 A1 * 12/2002
`WO O2O995.71
`* 12/2002
`WOO3OO9528
`* 1 2003
`
`* cited by examiner
`
`Ex.1014
`CISCO SYSTEMS, INC. / Page 2 of 15
`
`

`

`U.S. Patent
`
`Nov. 11, 2008
`
`Sheet 1 of 9
`
`US 7.450,598 B2
`
`102
`
`TABLE1
`OPERATOR INPUT TO CREATE:
`PART 1. WHICH CE JOINS WHAT VPNS AND THE ROLE OF THE CE IN THIS VPN
`PART 2. L2 AND L3 REQUIREMENT FROM CUSTOMERS
`PART3. INTERFACE ANDIPADDRESS, ETC. ASSIGNED BY OPERATION
`
`
`
`
`
`AUTOMATED
`PROVISIONING
`
`TABLE 2 WRF/RT
`GENERATION
`RULES
`
`TABLE 4 INTERFACE
`AND ROUTING
`GENERATION RULES
`
`
`
`
`
`
`
`140
`
`
`
`
`
`TROUBLESHOOTING
`SYSTEM
`
`
`
`EXPORT FILE122
`
`TABLE 3
`GENERATED
`WRFS AND
`ASSOCATED RTS
`
`
`
`TABLE 5 CL
`COMMANDSFOR
`INTERFACE AND
`ROUTING
`CONFIGURATION FOR
`EACH VRF AND EACH
`CE-PE INTERFACE
`
`
`
`
`
`
`
`Ex.1014
`CISCO SYSTEMS, INC. / Page 3 of 15
`
`

`

`Nov.11, 2008
`
`Sheet 2 of 9
`
`US 7,450,598 B2
`
`*
`uw
`O
`
`c€ONO]ceOND
`
`a.
`3 a
`a
`
`dd
`
`
`
`WLY'990)9‘OHO
`
`‘uojejnsdesua)juawauinbas77
`
`
`
`S8H|_SNdA
`
`
`
`S8H|_9NdA
`
`U.S. Patent
`Q01AaSC02TeeaP|ss]onan]FFHePtNUNPCTaeeSS)PtPCTaeeenPpNMNTONUMTCUaeePE130}
`
`
`
`
`
`
`
`DNINOISIAOUdADIAYASNdA/STdW40SIdWVXS:«4b19eL2b30]FOPorzo]630/830]30950]S30]P39P30}||gJaWO}SND|ysawojsny COLATEVL
`_€3dbadddUOS0epe}uldjFrSSSSeSeSasfsie
`
`
`
`
`SOd|ilsrasLISS]WESOd]0/239osusmaeyTateMyaooleebad]badcidbddCad]
`
`
`
`oneisAdSO|_dO83JoeddSOSHEIS|=ddSO|__4dSO
`OHO}DYNO]ceOUD]cEOND]91OHO9SCyan]ceaoeavydddj_4ddd]
`
`910HdddYs}deusciey
`9b}ceACLS
`lro]
`
`
`
`
`ual]Jual9|sensasyaI9JOAI8S
`
`juawauinbad¢7
`p02CHed
`
`6666
`
`SweatyBunnou
`
`Ex.1014
`CISCO SYSTEMS, INC./ Page 4 of 15
`
`Ex.1014
`CISCO SYSTEMS, INC. / Page 4 of 15
`
`
`
`
`
`

`

`U.S. Patent
`
`Nov.11, 2008
`
`Sheet 3 of 9
`
`US 7,450,598 B2
`
`
`
`
`
`SMAayods”uZSHHodxy
`
`TVOISOT‘2FEV
`
`
`
`AYAa40dSyoreJO}S]yOMJaaS”USDpoduyproduOle
`
`(4dUOUaAa)4DYoRAJO}S4YABUCw@yodS1SHJIMANHbSH4YAS8H
`
`AYA3DayxodsJoyS1yOMayods“ULSHyodwyQnULSHvodaasva
`
`JD[le40,ewesaveAeyyynqHLIM)
`
`
`
`
`QUHSNHJO}LyanbiunaucQnHU-ZSHyodx3ayodsU-2SHvodxQhU-ZSHYodu|
`(4dUoUaAd)3DYoRSJO}S4YABUCwreyods2SHJNAay0dSgNHZSH4YA|49HSNHZSHJNA
`
`
`
`
`
`
`
`
`JHAJONASJO}SLYOM]podseAlag”U~$9yodxyJanagUSOYyjogSOIAYSS
`
`SYAGNHJO}SLYOMQnULSHyodxZayodsULSHWodxZAYASNO
`"SdJUaIAYIPUO4YAlinv4ad
`90€yOECOE
`
`
`JMOdSONV€NHGASVESYAOML=28HAXOdSGNVSNHG3SVdSYASNO=+8HHSAWTINS=WI
`
`JO4yordJo}JHA8UQ|wWoeyodgUSOSYAJaAlagUSDSMATWHLNao
`ddYorU0JHA8UQUWyjogUWdSYAHSSWTIN4
`
`$31I9010d01LN3Y3SSI0YOdNdAOLSLYGALVIDOSSVONVSYAJOONiddVW
`
`
`
`304OYSEWNNJONANDSS=NdAdOYSEWNNJONANDAS=UADIAYSSWYLNAD=SO
`
`
`
`
`
`3Dayodsyoes10}S}yOM,
`
`
`
`Jo}1yanbiunauo
`
`JAMAay0dSNH
`
`
`
`"SJJUBAYIPUOJNA3D
`
`£DIA
`
`
`
`(OITWLINI)SLYGNV(A104Ni)SYANdA
`
`ADO1Od0L
`
`
`
`poduiyyanaguso
`
`le
`
`(31n0w
`
`Ex.1014
`CISCO SYSTEMS, INC./ Page 5 of 15
`
`Ex.1014
`CISCO SYSTEMS, INC. / Page 5 of 15
`
`

`

`
`Pp
`PF
`
`
` Ewiyog|EWwiwog|EWwog|USOIIMS|sOpoONPOY
`ay0dS91SHHOw]|ayods9°4SHyoaW]|ayods91SHvodw)
`QnH9FSHOdXZ|GNH9LSHModxZ|qnH9LSHuodxZ
`
`
`podui[Janesp$9yodxz|yodwyseslegp-§oyodxg
`
`
`yodxyJanesp$dpod|yodxysenesp$dyodu|
`LW4iogEw4iogLWwiog
`
`¥SMA€JuA
`PiettT
`
`€Wi40gYysey[IN4
`__7
`PEYHOO|
`
`
`ayodS“9LSHyodxyS8H
`
`@SMAbSUAGadYOSYA
`
`Or
`
`LWyjog
`
`@WJ4jog
`
`20P
`
`
`
`poduiJaniag”p§)yodxZ
`
`
`
`podwiysalespSOyodtu
`
`ayodsӢ2SHwodui)
`QnS~2SHwodxy
`
`OSFZ3dNO
`
`U.S. Patent
`
`Nov.11, 2008
`
`Sheet 4 of 9
`
`US 7,450,598 B2
`
`ayO0s9LSHvodw|
`
`QnH9”LSHwodx3
`
`VeOIA
`
`qnHG”LSHwodxg
`
`
`
`Hod}JanespSOyjog
`
`
`
`podui|JaAlaspSO
`
`jesjU99)
`
`Bd1NS
`
`SH
`
`Ex.1014
`CISCO SYSTEMS, INC./ Page 6 of 15
`
`Ex.1014
`CISCO SYSTEMS, INC. / Page 6 of 15
`
`
`
`
`
`
`
`
`

`

`U.S. Patent
`U.S. Patent
`
`Nov.11, 2008
`
`Sheet 5 of 9
`
`US 7.450,598 B2
`US 7,450,598 B2
`
`GhDIA ySYA€SMA&AMAbdA€AdUOSMA
`Posing|Posoins|Poseting|PRD|ABojodoy|
`ayods¢Z7SHyoduw|ayodsS¢ZSHHod]|SREGnHGSZSHwodxzQnHGZSHvoduy
`
`
`
`ayodS~G-ZSHwodxy|qnHG-ZSHwodxgS8H
`
`
`
`
`
`BIAIBS
`
`097€adNO
`
`Ex.1014
`CISCO SYSTEMS, INC./ Page 7 of 15
`
`Ex.1014
`CISCO SYSTEMS, INC. / Page 7 of 15
`
`
`

`

`U.S. Patent
`
`Nov. 11, 2008
`
`Sheet 6 of 9
`
`US 7.450,598 B2
`
`506
`
`TERMINAL - 508
`
`DISPLAY
`
`
`
`
`
`
`
`INPUTIOUTPUT
`DEVICE
`
`COMPUTER
`SYSTEM
`MEMORY
`
`
`
`
`
`
`
`FIG. 5
`
`520
`
`BACKBONE
`NETWORK
`
`Ex.1014
`CISCO SYSTEMS, INC. / Page 8 of 15
`
`

`

`U.S. Patent
`
`Nov. 11, 2008
`
`Sheet 7 Of 9
`
`US 7.450,598 B2
`
`RECEIVINGA HIGHLEVELDESCRIPTION OF A TOPOLOGY OFA
`NETWORK
`
`APPLYING ASET OF RULESTO THE TOPOLOGY OF THENETWORK TO
`PRODUCE A PLURALITY OF ROUTE TARGETS ASSOCIATED WITH
`VIRTUAL PRIVATE NETWORKS TO BE ASSIGNED TO THE NETWORK
`
`GROUPING ASET OF ROUTE TARGETS FROM THE PLURALITY OF
`ROUTE TARGETS WITH RESPECT TO EACH CUSTOMEREQUIPMENT
`NODE WITHIN THE NETWORK TO FORMA GROUP OF ROUTE TARGET
`SETS
`
`REMOVING DUPLICATE SETS OF ROUTE TARGETS FROM THE GROUP
`OF ROUTE TARGET SETS TO FORMA REDUCED SIZE SET OF ROUTE
`TARGETS
`
`ASSIGNING EACH SET OF ROUTE TARGETS IN THE REDUCED SIZE SET
`OF ROUTE TARGETS TO AVIRTUAL ROUTING AND FORWARDING
`(VRF) ELEMENT WHERE ALL THE CES WITH THE SAMERT SET ON
`ONE PE SHOULD SHARE ONE VRF
`
`
`
`
`
`
`
`
`
`GENERATING ANOUTPUT FILE INCLUDING OUTPUT DATA THAT
`IDENTIFIESEACH OF THE WRFS AND THE ASSOCIATED ROUTE
`TARGETS ASSIGNED TO EACH OF THE WRFS
`
`602
`
`604
`
`606
`
`610
`
`612
`
`FIG. 6
`
`Ex.1014
`CISCO SYSTEMS, INC. / Page 9 of 15
`
`

`

`U.S. Patent
`
`Nov. 11, 2008
`
`Sheet 8 of 9
`
`US 7.450,598 B2
`
`PROVIDING ASET OF RULES REGARDING ASSIGNMENT OF
`ROUTE TARGETS FOREACH OF A PLURALITY OF VIRTUAL
`PRIVATE NETWORKS
`
`702
`
`CONFIGURINGPROVIDEREQUIPMENTELEMENTS OFA
`BACKBONE NETWORK
`
`704
`
`
`
`CONFIGURING CUSTOMEREQUIPMENTNODES, EACH OF
`THE CUSTOMEREQUIPMENT NODES HAVINGA
`RELATIONSHIPLINK TO AT LEAST ONE OF THE PROVIDER
`EQUIPMENTELEMENTS
`
`ASSIGNING ROUTE TARGETS TO EACH OF THE CUSTOMER
`EQUIPMENT NODES BASED ON TOPOLOGY REQUIREMENTS
`OF THE BACKBONE NETWORKAND BASED ON THE SET OF
`RULES
`
`706
`
`708
`
`CONFIGURINGEACH OF THE CUSTOMEREQUIPMENT
`NODES AND VRFS ON THE CORRESPONDING PROVIDER
`EQUIPMENTELEMENTS TO FORMALOGICAL TOPOLOGY
`
`710
`
`FIG. 7
`
`Ex.1014
`CISCO SYSTEMS, INC. / Page 10 of 15
`
`

`

`U.S. Patent
`
`Nov. 11, 2008
`
`Sheet 9 Of 9
`
`US 7.450,598 B2
`
`ADD, DELETE, ORMODIFY ASITE OF A VPN
`
`UPDATE THE OPERATIONS INPUT TABLE TOMATCH
`THE MODIFIED NETWORK TOPOLOGY FOR THE
`UPDATED VPNS
`
`RE-EXECUTE THE AUTOMATED PROVISIONING
`METHOD (SEE 130 OFFIG. 1) TODETERMINEIF
`CHANGES TO WRFSAND/ORRTS ARENEEDED
`
`802
`
`804
`
`806
`
`
`
`SEND NECESSARY CL COMMANDS TO DEPLOYED
`NETWORKEQUIPMENT TO PROVISIONNEW VPN
`TOPOLOGY
`
`808
`
`FIG. 8
`
`Ex.1014
`CISCO SYSTEMS, INC. / Page 11 of 15
`
`

`

`US 7,450,598 B2
`
`1.
`SYSTEMAND METHOD TO PROVISION
`MPLS/VPN NETWORK
`
`FIELD OF THE INVENTION
`
`The present disclosure relates generally to provisioning
`procedures for networks.
`
`BACKGROUND
`
`In connection with the deployment of high speed data
`communications networks, manual methods and some forms
`of automated provisioning software tools have been used.
`Some of Such provisioning tools are available for multi pro
`tocol label switching (MPLS) virtual private network (VPN)
`services.
`However, these provisioning tools have some significant
`drawbacks. For example, operators are required to have an
`in-depth understanding of the technical details of the MPLS
`BGP/VPN technology and how to translate a customer's gen
`eral requirement into Such technical details. The operator is
`required to provide technical details and make technical deci
`sions, such as the specific assignment and deployment of
`virtual routing and forwarding (VRFs), route targets (RTs),
`routing redistribution, site of origin, and other similar tech
`nical network details.
`Secondly, these approaches/tools typically require opera
`tors to provision each customer edge router/provider edge
`router (CE-PE) access individually, again requiring knowl
`edge of technical details, which makes the provisioning pro
`cess/procedures complex and error prone. The troubleshoot
`ing of mistakes made during this process is usually difficult
`and costly.
`Thirdly, these approaches/tools do not provide the flexibil
`ity needed to easily accommodate new VPN topology and
`service changes. Accordingly, there is a need for an improved
`system and method of provisioning MPLS/VPN systems.
`
`10
`
`15
`
`25
`
`30
`
`35
`
`BRIEF DESCRIPTION OF DRAWINGS
`
`2
`produce a plurality of route targets (RTs) associated with
`virtual private networks to be assigned to the network, group
`ing a set of route targets from the plurality of route targets
`with respect to each customer equipment node within the
`network to form a group of route target sets, removing dupli
`cate sets of route targets from the group of route target sets to
`form a reduced size set of route targets; assigning each set of
`route targets in the reduced size set of route targets to a VRF
`all the CEs with the same RT set on one PE should share one
`VRF, and generating an output file including output data that
`identifies each of the VRFs and the associated route targets
`assigned to each of the VRFs.
`In a particular embodiment, the computer network opera
`tions system includes a terminal having a display portion, a
`data input device to receive input from a user, and a computer
`system having a memory and a processor. The computer
`system is coupled to the terminal and to the data input device.
`The display portion of the terminal provides an input Screen
`having a data format configured to prompt the user to provide
`high-level network topology data via the data input device.
`The high-level network topology data includes virtual private
`network information with respect to a backbone data net
`work. The computer system converts the high-level network
`topology data into a set of route targets to be assigned to
`VRFs. The set of assigned route targets are stored in the
`memory.
`The disclosed method and system provides a new service
`provision interface that allows operator use without requiring
`many of the specific technical network details. Further, the
`translation from a customer's requirements into technical
`network configuration commands are handled using an auto
`mated method that is transparent to the operator. The techni
`cal requirements for operators are significantly reduced
`allowing operators with less technical experience can be
`trained at a lower cost. Further, the VPN service order process
`to be handled more efficiently and more quickly. Also, due to
`automation, the number of mistakes made during the provi
`Sioning process is reduced.
`In addition, the disclosed service provisioning method
`allows provisioning in an efficient manner using an overall
`system view instead of a link by link method. The disclosed
`provisioning system may consider the cost of assigning VRFs
`as well as access costs when determining which provideredge
`router (PE) a particular customer edge router (CE) is to be
`attached to.
`Referring to FIG. 1, a flow diagram that illustrates a par
`ticular embodiment of a provisioning procedure is shown.
`The flow diagram includes a first table 102 that is formed by
`operator input and includes an automated provisioning sys
`tem 130 that includes a plurality of additional tables created
`by an automated software tool. The output 132 from the
`automated provisioning processing is a set of commands that
`are deployed to a network, such as to various PE nodes within
`an MPLS network. Data files 122 may be exported from the
`automated provisioning system 130 and sent to other systems,
`such as a troubleshooting system 140 or a billing system 150.
`The data files 122 provided by the provisioning system 130
`are often useful to technical Support personnel in resolving
`technical problems reported by customers, such as issues
`relating to network configurations and performance. Also, the
`billing system 150 may use input from the exported file 122 to
`add new billing parameters and to charge for use of network
`resources, such as charges based on the number of virtual
`routing and forwarding elements (VRFs) used by a particular
`VPN topology. Thus, the cost of assigning VRFs may be
`considered in the bills sent to customers.
`
`40
`
`45
`
`FIG. 1 is general diagram that illustrates an automated
`provisioning process.
`FIG. 2 is a general diagram that illustrates an MPLS/VPN
`service provisioning table.
`FIG. 3 is a general diagram that illustrates a rule set for
`VRF and RT mapping.
`FIG. 4 is a general diagram that illustrates tables for VPN
`to CE mapping for various PE elements.
`FIG. 5 is a block diagram to illustrate a network and com
`puter system that may be used to execute a provisioning
`50
`process.
`FIG. 6 is a flow diagram that illustrates a particular provi
`Sioning procedure.
`FIG. 7 is a flow diagram that illustrates other aspects of a
`provisioning procedure.
`FIG. 8 is a flow diagram that illustrates a method of provi
`Sioning a modified topology.
`
`55
`
`DETAILED DESCRIPTION
`
`The present disclosure is generally directed to a method of
`provisioning a virtual private network and a computer net
`work operations system that is configured to provide Such
`provisioning. In a particular embodiment, the automated
`method of provisioning a virtual private network includes
`receiving a high level description of a topology of a network,
`applying a set of rules to the topology of the network to
`
`60
`
`65
`
`Ex.1014
`CISCO SYSTEMS, INC. / Page 12 of 15
`
`

`

`3
`The operator inputted table 102 includes a first part that
`includes data to identify customer edge router (CE) and asso
`ciated VPNs. A second part of the table 102 identifies layer 2
`and layer 3 network requirements received from customers.
`The third part of the operatortable 102 includes interfaces and
`IP address assignments. A resulting data table 108 is provided
`to the automated provisioning system 130. Within the provi
`sioning system 130 a set of, VRF/RT rules 104 are used to
`generate a table 106 that includes assigned VRFs and RTs.
`Also, a table 112 having interface and routing generation
`rules is used to create CLI commands, such as in table 114, for
`each VRF and each associated CE-PE interface. The outputs
`from the generated VRFs and RTs and the CLI commands are
`communicated to a module 120 to generate CLI commands
`for the CEs and prepare data to be communicated to PEs. The
`resulting data output 132 is then deployed to PEs to deploy the
`provisioned topology in the network. An example of a VRF is
`found within a commercial router, such as those made by
`Cisco, Inc., that are deployed in distributed data communica
`tion networks.
`Referring to FIG. 2, an example of the operator inputted
`table 102 is illustrated. The table 102 includes a first portion
`202, a second portion 204, and a third portion 206. The first
`portion 202 includes VPN to CE mapping and topology selec
`tion or each VPN. The second portion 204 identifies the layer
`2 and layer 3 network requirements and CE locations. The
`third portion 206 identifies IP interface on PE and IP address
`and quality of service (QoS) requirements and profiles. Cus
`tomer information is also included in table 102, such as the
`customer A and customer B in the first row; CE1-CE11
`belong to customer A and CE12-CE13 belong to Customer B.
`Referring to FIG. 3, a logical mapping table of VRFs and
`associated RTS is shown. The logical mapping table includes
`row entries of full mesh 310, hub and spoke with two VRFs
`312, hub and spoke with one VRF 314, and a central service
`row 316. The column entries include the assigned RTs and
`VRFs 330, 332, 334, and a comments column 306.
`Referring to FIG. 4, VRF and RT mapping tables 440, 450,
`and 460 for multiple PEs are shown. A first table 540 for PE1
`includes a plurality of VPN row elements 402-412, a VRF
`40
`indicator row 414, and a plurality of CE columns 422-430.
`The table 440 also includes a topology indication column
`420. As shown, one of the VRFs, VRF 4 labeled 432 is shared
`by two CEs, CE12 in column 428 and CE13 in column 430.
`By providing for a shared VRF, the number of used VRFs for
`the desired VPN topology is beneficially reduced and for a
`large network provides for reduced VRF deployment costs.
`Thus, the resulting set of VRFs is a reduced size set. In
`accordance with the VRF generation rules, RTs are assigned
`for each CE based on its topology requirement in Table 1 and
`the RT generation rules in Table 2. If multiple CEs share the
`same RT set, such as the last CE12 and CE13, then they share
`one VRF. Generally, each VRF owns all the RTs in its column,
`However, all the CE members of one full mesh VPN belong to
`another full mesh VPN, which means that one VPN is the
`55
`subset of another VPN. Therefore, the corresponding VRF
`may not need the RT of the subset VPN if it makes no differ
`ence to the customers.
`Dualhoming requirement can also be handled with respect
`to Table 1. There are 3 common scenarios for dualhoming:
`1. Two CES connecting to two PE by two physical or logical
`links. This scenario can be handled by Table 1 natively.
`2. One CE connecting to two PE by two physical or logical
`links. Two columns for each CE are used. Part 1 for these
`two columns are the same. There may be the same or
`different L2 or L3 requirement in part 2, one IP interface
`and IP address/mask on each PE in part 3.
`
`50
`
`35
`
`45
`
`60
`
`65
`
`US 7,450,598 B2
`
`10
`
`15
`
`25
`
`30
`
`4
`3. One CE connecting to one PE by two parallel physical
`links or logical links. Two columns for each CE are used.
`Part 1 for these two columns are the same. There may be
`the same or different L2 or L3 requirement in part 2,
`operation needs to assign two IP interfaces and two IP
`addresses/masks on the PE.
`The “Site” concept in industry standard RFC2547bis can
`also be easily integrated into Table 1 by adding a row named
`“Site” in Table 1 which tells which site each CE belong to. If
`a customer wants the traffic between two or more CEs go
`through its private network only, which means that customer
`does not rely on the SP network as both primary and backup
`connection for these CEs, these CEs should be assigned to
`one site. The same SOO (Site of Origin) should be configured
`for the CE-PE interfaces on PEs to avoid routing loop if
`EBGP is used as the CE-PE routing protocol.
`Referring to FIG. 5, a sample operations system for imple
`menting the disclosed provisioning procedure is shown. The
`operations system includes a computer system 502 with a
`memory 504. The computer system 502 is coupled to a back
`bone network 520, such as a MPLS network. The computer
`system 502 has an input/output device 510 and a terminal 506
`with a display 508 used to interface to network operations
`personnel. Computer Software that can receive an operator
`input table and can perform automated provisioning proce
`dures to deploy VRF and RT assignments for network ele
`ments within the backbone network 520 can be disposed in
`the memory 504 and executed by the computer system 502.
`An example of a suitable computer system 502 is a commer
`cially available personal computer or workstation.
`Referring to FIG. 6, a particular embodiment of a method
`of provisioning a network is illustrated. A high level descrip
`tion of a network topology, such as the table 102 of FIG. 1, is
`received, at 602. A set of provisioning rules is applied to the
`topology of the network to produce a plurality of route targets
`(RTs) associated with virtual private networks to be assigned
`to the network, at 604. A set of route targets from the plurality
`of route targets is grouped with respect to each customer edge
`router (CE) within the network to form a group of route target
`sets, at 606. Duplicate sets of route targets are removed from
`the group of route targets to form a reduced size set of route
`targets, at 608. Each set of route targets in the reduced size set
`of route targets is assigned to a virtual routing and forwarding
`(VRF) element all the CEs with the same RT set on one PE
`should share one VRF, at 610. By reducing the number of
`route targets and by sharing VRFs, less network resources are
`consumed by the desired network topology. An output file is
`generated, at 612, that includes output data that identifies
`each of the VRFs and the associated route targets assigned to
`each of the VRFs. The output file may be deployed to physical
`network equipment to complete the provisioning process.
`Referring to FIG. 7, another particular embodiment of a
`method of provisioning is illustrated. A set of rules is pro
`vided regarding assignment of route targets for each of a
`plurality of virtual private networks, at 702. Provider edge
`routers (PE) of a backbone network are configured, at 704.
`Customer edge routers (CE) are configured, at 706. Each of
`the CE nodes has a relationship link to at least one of the PE
`elements. Route targets are assigned to each of the CE nodes
`based on topology requirements of the backbone network and
`based on the set of rules, at 708. An example of the set of rules
`is the table of rules illustrated in FIG.3. Each of the CE nodes
`and VRFs are configured with respect to the corresponding
`PE elements to form a logical network topology, at 710. The
`logical topology may be converted into an output file that is
`deployed in physical router equipment, to thereby provision
`Such equipment.
`
`Ex.1014
`CISCO SYSTEMS, INC. / Page 13 of 15
`
`

`

`US 7,450,598 B2
`
`5
`
`10
`
`15
`
`5
`Referring to FIG. 8, a method of provisioning for a modi
`fied network topology is shown. A particular site or a particu
`lar VPN is added, deleted, or modified, at 802. This modifi
`cation results in a changed topology. The operations table,
`such as the illustrated operator input table 102, is updated to
`correspond to the modified topology including updated
`VPNs, at 804. For example, a customer may add, delete, or
`change a desired VPN. The automated provisioning method
`(see system 130 of FIG. 1) is re-executed using the updated
`operations table as its input to determine whether any changes
`are needed to VRFs or RTs for the network, at 806. If changes
`are needed, a necessary set of VRF/RT commands to
`deployed network equipment is provided to provision the
`modified topology, at 808. Thus, a method of automatically
`provisioning a desired VPN network that can also handle
`modifications to the desired VPN topology with reduced reli
`ance on operator technical ability has been disclosed.
`As a particular example, when adding a new site to one or
`multiple existing VPNs, the provisioning steps described
`above with respect to FIG. 1 are repeated with adding the new
`CE column and the provision system 130 will automatically
`decide if a new VRF need to be added for this new site or just
`let this new CE join an existing VRF. When delete a site from
`existing VPN services, the provisioning steps described with
`respect to FIG. 1 are repeated with deleting the CE and the
`25
`provision system 130 will automatically decide if the CE
`attached VRF need to be deleted or not. When changing a
`VPN topology, the above described steps are repeated with
`modified VPN topology and the role of each CE in this topol
`ogy, and the provision system 130 will automatically deter
`mine the VRFs and associated RTs. When adding a new VPN,
`the above described provisioning steps are repeated with
`modified VPN topology and the role of each CE in this topol
`ogy, and the provision system will automatically decide the
`VRFs and associated RTs. When deleting a existing VPN, the
`provisioning steps are repeated with deleting the VPN and the
`provision system will automatically decide the VRFs and
`associated RTs.
`The disclosed provisioning system may feed the informa
`tion of how many VRFs need to be used for each customer
`40
`into billing system to easily support billing of MPLS/VPN
`services based on both the cost of VRFs as well as access costs
`since VRF is a limited resource in PE routers. The disclosed
`method and system provides a new service provision inter
`face that allows operator use without requiring many of the
`specific technical network details, such as VRF, RT, SOO.
`route redistribution, etc. Further, the translation from a cus
`tomer's requirements into technical network configuration
`commands are handled using an automated method that is
`transparent to the operator. The disclosed service provision
`ing method allows provisioning in an efficient manner using
`an overall system view instead of a link by link method.
`The above disclosed subject matter is to be considered
`illustrative, and not restrictive, and the appended claims are
`intended to cover all Such modifications, enhancements, and
`other embodiments which fall within the true spirit and scope
`of the present invention. Thus, to the maximum extent
`allowed by law, the scope of the present invention is to be
`determined by the broadest permissible interpretation of the
`following claims and their equivalents, and shall not be
`restricted or limited by the foregoing detailed description.
`What is claimed is:
`1. An automated method of provisioning a virtual private
`network, the method comprising:
`receiving, from an operator, data comprising a plurality of
`data entries, a first set of the plurality of data entries
`identifying customer edge (CE) routers, a second set of
`
`50
`
`6
`the plurality of data entries identifying provider edge
`(PE) routers corresponding to each of the customer edge
`routers, and a third set of the plurality of data entries
`identifying a topology type of a virtual private network
`(VPN);
`applying a set of rules to the data to produce a plurality of
`route targets stored in a memory and associated with
`virtual private networks to be assigned to the network;
`grouping a set of route targets from the plurality of route
`targets with respect to each customer equipment node
`within the network to form a group of route target sets;
`removing duplicate route target sets from the group of
`route target sets to forma reduced size of route target sets
`based on the route targets between duplicate route target
`sets being the same;
`assigning each set of route targets (RT) in the reduced size
`set of route targets to a virtual routing and forwarding
`(VRF) element and all the CEs with the same RT set on
`one PE share one VRF; and
`generating an output file including output data that identi
`fies each of the VRFs and the associated route targets
`assigned to each of the VRFs;
`wherein the memory includes a virtual routing and for
`warding (VRF) element to route target data mapping for
`each of a plurality of provider edge routers (PEs) and
`wherein all of the customer edge routers (CEs) with the
`same route target (RT) set on one PE share one VRF.
`2. The method of claim 1, further comprising communi
`cating the output data to a network element within the net
`work.
`3. The method of claim 1, further comprising communi
`cating the output file to a system having a display.
`4. The method of claim 1, further comprising displaying a
`report based on the output data.
`5. The method of claim 1, wherein the network element is
`aVRF component within a data router and wherein the topol
`ogy type is selected from full mesh, central service and hub
`and spoke topology types.
`6. The method of claim 1, wherein the network is a multi
`protocol label switching (MPLS) network and wherein the
`plurality of data entries has a table format wherein the rows
`are virtual private networks, a set of columns are defined by
`the customer edge routers and the table entries include the
`associated provider edge routes.
`7. A computer network operations system comprising:
`a terminal having a display portion;
`a data input device to receive input from a user;
`a computer system having a memory and a processor, the
`computer system coupled to the terminal and to the data
`input device;
`wherein the display portion of the terminal provides an
`input Screen having a data format configured to prompt
`the user to provide high-level network topology data via
`the data input device, the high-level network topology
`data including a plurality of data entries, a first set of the
`plurality of data entries identifying customer edge (CE)
`routers, a second set of the plurality of data entries
`identifying provider edge (PE) routers

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket