throbber
(19) United States
`(12) Patent Application Publication (10) Pub. No.: US 2004/0095946A1
`(43) Pub. Date:
`May 20, 2004
`Baker
`
`US 20040095946A1
`
`(54)
`
`(76)
`
`(21)
`(22)
`
`LOGICAL STAR TOPOLOGIES FOR
`NON-STAR NETWORKS
`
`Inventor: Albert D. Baker, Lincroft, NJ (US)
`Correspondence Address:
`MENDELSOHN AND ASSOCATES PC
`1515 MARKET STREET
`SUTE 715
`PHILADELPHIA, PA 19102 (US)
`Appl. No.:
`10/298,704
`
`Filed:
`
`Nov. 18, 2002
`
`Publication Classification
`
`(51)
`(52)
`
`Es. Oyo E'.
`
`ABSTRACT
`(57)
`A logical Star architecture imposed on an underlying non
`star network, for example a Virtual Path Ring (VPR),
`enhances a mesh protocol with an automatic method for
`Virtual Path ID (VPI) generation. The VPIs are used by the
`mesh protocols inherent routing function to effect automatic
`configuration at installation, automatic reconfiguration at
`node updates, and automatic reconfiguration for protection
`Switching. The imposition of the logical Star architecture on
`a VPR reduces node-to-node Switching costs (e.g., delay, as
`well as memory and processing costs) Since all nodes in a
`logical Star topology are at most two logical hops away. The
`logical Star also conserves virtual path address Space relative
`to a fully configured ring. Additionally, the imposition of the
`logical Star architecture allows existing Star functions to be
`deployed on the underlying network. Finally, when the
`underlying architecture is a ring, the protection advantages
`of ring networks can be preserved.
`
`NO
`
`PH8
`
`PH1
`
`N7
`
`PH7
`
`N6
`
`PH6
`
`N5
`
`N1
`
`PH2
`
`N2
`
`PH3
`
`N3
`
`PH5
`
`PH4
`
`Arista Networks, Inc.
`Ex. 1005, p. 1
`
`

`

`Patent Application Publication May 20, 2004 Sheet 1 of 9
`
`US 2004/0095946A1
`
`N
`
`I
`
`-
`
`o
`
`g
`
`2
`
`2
`
`2
`
`f
`
`Arista Networks, Inc.
`Ex. 1005, p. 2
`
`

`

`Patent Application Publication May 20, 2004 Sheet 2 of 9
`
`US 2004/0095946A1
`
`9
`
`S
`
`s
`
`S2
`
`Arista Networks, Inc.
`Ex. 1005, p. 3
`
`

`

`Patent Application Publication May 20, 2004 Sheet 3 of 9
`
`US 2004/0095946A1
`
`3O2
`
`Administer ring
`
`
`
`
`
`Initial Run
`or Topology
`Update
`?
`
`
`
`
`
`
`
`
`
`Analyze PTSE
`database to
`determine number
`of nodes on ring
`
`Set COunter to 1
`
`Partition Virtual
`Path (VP) space
`
`Assign VPs from
`head (0) to
`node(counter)
`
`Increment COunter
`
`NO
`
`3O8
`
`310
`
`312
`
`314
`
`Yes
`
`316
`
`More nodes 2
`
`FIG. 3
`
`Arista Networks, Inc.
`Ex. 1005, p. 4
`
`

`

`Patent Application Publication May 20, 2004 Sheet 4 of 9
`
`US 2004/0095946A1
`
`
`
`Arista Networks, Inc.
`Ex. 1005, p. 5
`
`

`

`Patent Application Publication May 20, 2004 Sheet 5 of 9
`
`US 2004/0095946A1
`
`9.
`
`S
`
`g
`
`2
`
`Arista Networks, Inc.
`Ex. 1005, p. 6
`
`

`

`Patent Application Publication May 20, 2004 Sheet 6 of 9
`
`US 2004/0095946A1
`
`
`
`Arista Networks, Inc.
`Ex. 1005, p. 7
`
`

`

`Patent Application Publication May 20, 2004 Sheet 7 of 9
`
`US 2004/0095946A1
`
`€T|ZHd|
`||
`| | ||
`| ||
`
`Ie?ued { L— —9N9.Hd| |?seW
`
`
`L–––––––––-----------------------#77- - - - - - -–1
`
`
`
`---
`
`0Hd
`
`
`
`———— || TI -------º?-----
`
`| |
`
`Arista Networks, Inc.
`Ex. 1005, p. 8
`
`

`

`Patent Application Publication May 20, 2004 Sheet 8 of 9
`
`US 2004/0095946A1
`
`2
`
`o
`
`h
`
`5
`
`9
`
`Sp
`
`83
`
`S
`
`2
`
`S
`
`O
`
`CD
`
`Arista Networks, Inc.
`Ex. 1005, p. 9
`
`

`

`Patent Application Publication May 20, 2004 Sheet 9 of 9
`
`US 2004/0095946A1
`
`
`
`Arista Networks, Inc.
`Ex. 1005, p. 10
`
`

`

`US 2004/0095946 A1
`
`May 20, 2004
`
`LOGICAL STAR TOPOLOGIES FOR NON-STAR
`NETWORKS
`
`BACKGROUND OF THE INVENTION
`0001) 1. Field of the Invention
`0002 The invention relates to routing signals through
`communication networks.
`0003 2. Description of the Related Art
`0004. A star network is a network of nodes having a
`topology in which one of the nodes (called “the central
`node') is directly connected to every other node in the
`network, while each of those other nodes is directly con
`nected only to the central node.
`0005 One advantage of star networks is that traffic can be
`transmitted between any two nodes in the network with at
`most two “hops, where a hop is defined as transmission
`between two directly connected nodes. For every hop in a
`connection, the node at the beginning of the hop performs a
`certain amount of Signal processing to route the Signal
`towards the node at the end of the hop. The greater the
`number of hops in a connection, the greater the total amount
`of Such processing overhead for the connection. From the
`perspective of minimizing processing overhead and asSoci
`ated communication latency, the fewer hops in a connection,
`the better. From this perspective, Star networks are attractive
`because each connection in the network has only one hop or
`two hops maximum.
`0006. One of the disadvantages of star networks is that
`the central node is involved in all network traffic. In par
`ticular, for each Star network connection, the central node is
`either a terminal node (i.e., the start node or the end node for
`the connection) or an intermediate node (i.e., a pass-through
`node for a connection between two non-central nodes). As a
`result, as the number of connections in a Star network
`increases, traffic bottlenecks are more and more likely to
`occur at the central node.
`0007 Another disadvantage of star networks is that the
`central node corresponds to a potential Single point of failure
`for the entire network. If the central node fails, then all
`communication in the network will cease.
`0008. A star topology is useful for applications in which
`most or all traffic is to and/or from a Single node. In Such
`applications, that node is configured to be the central node
`in the Star network. On the other hand, a Star topology is not
`generally Suitable for the backbone of a Service provider
`network, because it creates both a bottleneck and a single
`point of failure.
`0009. To avoid the disadvantages of star networks asso
`ciated with traffic bottlenecks and Single points of failure,
`networks, Such as Service provider networks, may be con
`figured with non-Star topologies Such as a ring topology. In
`a ring network, every node in the network is directly
`connected to exactly two other nodes. Ring networks are leSS
`Susceptible to traffic bottlenecks than Star networks because
`there is no Single node in a ring network that is involved in
`all possible network traffic. Ring networks also avoid the
`Single point of failure problems associated with Star net
`WorkS. In particular, if any particular node or physical link
`fails in a ring network, then, in accordance with a typical
`ring-based protection Scheme, any traffic associated with
`
`that failed node or link may simply be routed around the ring
`in the other direction (assuming that Sufficient bandwidth is
`available).
`0010. On the other hand, one of the disadvantages of ring
`networks as compared to Star networks is that the minimum
`distance between two nodes on diametrically opposing sides
`of an n-node ring network is n/2 hops. AS Such, as the
`number of nodes in a ring network increases, the average
`amount of processing overhead per network connection also
`increases.
`0011. It should be noted that the previous discussion
`focuses on ideal topologies and ideal advantages and dis
`advantages thereof. In practice, not all ring nodes are
`equivalent, nor are all of the spoke nodes of a Star equiva
`lent. For example, in Some situations, one or more ring
`nodes in a ring or hub or spoke nodes in a Star may typically
`be connected to one or more network feeders, potentially in
`a sparing arrangement. A feeder-connected node is typically
`equipped with additional redundant hardware for improved
`robustness to failure.
`
`SUMMARY OF THE INVENTION
`0012. The problems in the prior art are addressed in
`accordance with the principles of the invention by overlay
`ing a logical Star topology on a non-Star network, Such as a
`ring network, Such that Signals are transmitted through the
`underlying non-Star network in accordance with the Overlaid
`logical Star topology. In an overlaid logical Star topology,
`each "logical hop” between two nodes in the logical star
`topology involves two or more nodes in the underlying
`non-Star network, i.e., the node at the beginning of the
`logical hop, the node at the end of the logical hop, and Zero,
`one, or more intermediate nodes. In Such a logical hop, the
`processing needed to be performed by an intermediate node
`to route the Signal to the next node in the logical hop is leSS
`than the amount of processing performed by the node at the
`beginning of a hop. As a result, the amount of processing
`overhead associated with a logical hop {N1, N} involving
`a sequence of nodes, N, N,..., N, where n is greater than
`two, is less than the amount of processing overhead asso
`ciated with the two or more hops (i.e., {N1, N2}, ..., {N-1,
`N}) that would otherwise be involved in transmitting a
`Signal from node N to node N in the underlying non-Star
`network.
`0013. On the other hand, because the underlying physical
`network has a non-Star topology, networks of the invention
`have fewer problems associated with traffic bottlenecks and
`Single points of failure than physical Star networks. In the
`case where the underlying network is a protected ring, for
`example, the resulting overlaid Star network benefits from
`the robustness of the underlying ring while retaining the
`routing simplicity of a Star.
`0014.
`In one embodiment, the invention is a method for
`routing Signals in a non-Star network having a plurality of
`nodes connected in a non-Star topology. The method
`involves overlaying a logical Star topology on the non-Star
`network and routing the Signals in the non-Star network
`according to the logical Star topology.
`0015. In another embodiment, the invention is a non-star
`network having a plurality of nodes connected in a non-Star
`topology, wherein the non-Star network is adapted to route
`
`Arista Networks, Inc.
`Ex. 1005, p. 11
`
`

`

`US 2004/0095946 A1
`
`May 20, 2004
`
`Signals in the network according to a logical Star topology
`that is overlaid on the non-Star network.
`0016. In another embodiment, the invention is a method
`for automatically assigning network resources to a collection
`of elements in a network. The method includes detecting the
`topology of connected elements in the network, partitioning
`resources of the network, allocating the network resources,
`and assigning the network resources to the network ele
`mentS.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`0.017. Other aspects, features, and advantages of the
`invention will become more fully apparent from the follow
`ing detailed description, the appended claims, and the
`accompanying drawings in which:
`0.018
`FIG. 1 depicts an exemplary bidirectional ring
`network overlaid with a logical Star topology according to
`one embodiment of this invention.
`FIG. 2 depicts another exemplary ring network.
`0019)
`0020 FIG. 3 depicts a procedure for virtual path assign
`ment according to one embodiment of this invention.
`0021
`FIG. 4 depicts a logical star topology overlaid on
`the ring network of FIG. 2 according to one embodiment of
`this invention.
`0022 FIG. 5 depicts the logical star topology of the
`network of FIG. 4.
`0023 FIG. 6 depicts an exemplary non-star, non-ring
`network overlaid with a logical ring topology according to
`one embodiment of this invention.
`0024 FIG. 7 depicts the logical ring topology of the
`network of FIG. 6.
`0.025
`FIG. 8 depicts another non-star, non-ring network
`overlaid with a logical ring topology according to one
`embodiment of this invention.
`0.026
`FIG. 9 depicts the logical ring topology of the
`network of FIG. 8.
`0.027
`FIG. 10 depicts an exemplary bidirectional pro
`tected ring network.
`0028 FIG. 11 depicts a logical star topology overlaid on
`the network of FIG. 10 according to one embodiment of the
`invention.
`
`66
`
`DETAILED DESCRIPTION
`0029) Reference herein to “one embodiment” or “an
`embodiment’ means that a particular feature, Structure, or
`characteristic described in connection with the embodiment
`can be included in at least one embodiment of the invention.
`The appearances of the phrase “in one embodiment' in
`various places in the Specification are not necessarily all
`referring to the same embodiment, nor are Separate or
`alternative embodiments mutually exclusive of other
`embodiments.
`0.030. According to embodiments of the invention, a
`logical Star topology is overlaid on an underlying non-Star
`network, Such as a ring network. Depending on the particu
`lar implementation, the underlying ring topology may cor
`respond to the topology of the actual physical network or it
`
`may itself correspond to a logical ring topology overlaid on
`a further underlying non-ring (and non-Star) network. In
`theory, the invention may involve the Sequential overlaying
`of one or more logical topologies on top of the ultimate,
`actual physical network.
`Physical Ring with Logical Star Overlay
`FIG. 1 illustrates a bidirectional physical commu
`0031
`nications ring where N0 through N7 represent routing and
`Switching nodes, PH1 through PH8 represent bidirectional
`physical links between nodes, and VP1 through VP7 repre
`Sent bidirectional virtual paths associated with a logical Star
`topology overlaid on the physical ring according to one
`embodiment of this invention.
`0032 Here PH1 links NO to N1, PH2 links N1 to N2, PH3
`links N2 to N3, PH4 links N3 to N4, PH4 links N4 to N5,
`PH5 links N5 to N6, PH6 links N6 to N7, PH7 links and PH8
`links N7 to N0. The physical links between the nodes result
`in a physical ring topology. The virtual paths, however,
`represent a logical Star topology overlaid on the physical
`ring, where node N0 is the central node of the logical star
`topology. In particular, VP1 links N0 to N1, VP2 links N0
`to N2, VP3 links NO to N3, VP4 links NO to N4, VP5 links
`N0 to N5, VP6 links NO to N6, and VP7 links NO to N7. As
`used in this specification, the terms “virtual” and “logical”
`are used interchangeably.
`0033) One metric associated with cost of communication
`from one node in a communication network to any other
`node in that network is the number of hops a signal must
`pass through on its way from a communication Source to its
`destination. In the exemplary ring network of FIG. 1, the
`minimum number of hops between diametrically opposed
`nodes (e.g., N2 and N6) is four, and the average number of
`hops between all nodes is 1% or about 2.29. Meanwhile, in
`the logical star topology of FIG. 1, the maximum number of
`logical hops from any node to any other node is two, and the
`average number of logical hops between all nodes is 7/4 or
`1.75.
`0034) Take, for example, communication from node N2
`to node N6 in the network of FIG. 1. Absent the invention,
`communication from N2 to N6 would involve a minimum of
`four hops, e.g., a first hop from N2 to N3 via physical path
`PH3, a second hop from N3 to N4 via physical path PH4, a
`third hop from N4 to N5 via physical path PH5, and a fourth
`hop from N5 to N6 via physical path PH6.
`0035. With the overlaid logical star topology of the
`invention, however, the number of logical hops from N2 to
`N6 is two, i.e., a first logical hop from N2 to NO via virtual
`path VP2 and a second logical hop from N0 to N6 via VP6.
`In reality, the first logical hop involves communication from
`N2 to N0 via intermediate node N1, while the second logical
`hop involves communication from node N0 to N6 via
`intermediate node N7. Although the total number of physical
`hops in the two topologies is the same (i.e., four), the total
`amount of overhead processing for the two communications
`is different. In particular, the communication absent the
`invention involves “full-overhead” processing at nodes N2,
`N3, N4, and N5, while the communication in the overlaid
`logical Star topology of the invention involves full-overhead
`processing at nodes N2 and N0 (i.e., the start nodes of the
`two logical hops), but only “reduced-overhead” processing
`at nodes N1 and N7 (i.e., the intermediate nodes of the two
`
`Arista Networks, Inc.
`Ex. 1005, p. 12
`
`

`

`US 2004/0095946 A1
`
`May 20, 2004
`
`logical hops). As a result, the total overhead processing for
`the communication of the invention is less than that for the
`communication absent the invention.
`0036) As the number of nodes in the underlying ring
`network increases, the advantages of the logical Star overlay
`become even more Significant. In general, in an n-node ring,
`the maximum and average numbers of physical hops
`between nodes in the ring are n/2 and n/4(n-1), respectively.
`Meanwhile, the maximum and average numbers of logical
`hops in an n-node logical Star overlay are two and 20n-1)/n,
`respectively. Note that, as n increases, the average number
`of hops in the underlying ring network approaches a limit of
`n/4, while the average number of logical hops in the Overlaid
`Star topology approaches a limit of two.
`
`Multi-Access Technology
`0037 Fiber-optic rings were historically constructed with
`Synchronous Optical NETwork (SONET) and/or Synchro
`nous Data Hierarchy (SDH) terminals and Add/Drop Mul
`tiplexers (ADMs). The forward and protection paths were
`typically implemented with Separate fibers or Separate wave
`lengths on the same fiber. These systems suffered from
`wasted bandwidth associated with the limitations of the
`fixed Time Division Multiplex (TDM) access methodology
`of SONET. Recently, multi-access platforms have been
`developed using Asynchronous Transfer Mode (ATM) over
`SONET to overcome Some of the bandwidth utilization
`problems associated with SONET-only solutions.
`0.038 A common multi-access technology is known as
`ATM Virtual Path Ring (VPR). ATM VPR uses ATM cell
`multiplexing instead of TDM in order to gain the benefits of
`Statistical multiplexing for transport of data traffic on a fiber
`ring. An ATM Switch can use ATM cell mappings to SONET
`frames to make use of an existing physical SONET ring
`infrastructure. ATMVP rings are ring configurations with a
`SONET physical layer that may either carry ATM traffic
`exclusively or a combination of ATM and Synchronous
`Transfer Mode (STM) traffic. The former configurations are
`supported by pure ATM Add/Drop Multiplexers (ADMs)
`and the latter by hybrid ADMs. GR-2837-CORE, Issue 5,
`“ATM Virtual Path Ring Functionality in SONET-Generic
`Criteria” (incorporated herein by reference in its entirety)
`provides generic functional criteria for incorporating ATM
`VPR functionality into SONET rings. It introduces a modi
`fied terminology for SONET, ATM, and hybrid SONET/
`ATM entities and provides a general SONET ATM ring
`evolution overview. It further introduces functional models,
`discusses potential applications and operations functionality,
`and presents a set of ATMVP level requirements for SONET
`ATM VPADMS.
`0039. Another relevant multi-access technology is
`Dynamic Packet Transport (DPT). DPT enables IP packets
`to be carried directly over the ring. The IP packets are carried
`in SONET frames. The entire capacity of the ring is treated
`as a Single bandwidth pool for the purposes of Statistically
`multiplexing IP packets. If a ring failure occurs, then the ring
`will wrap and a priority mechanism and a fairness algorithm
`will determine the allocation of available bandwidth among
`devices.
`0040 Both of these technologies can be implemented
`incrementally on an existing SONET ring network by dedi
`cating some of the SONET TDM bandwidth to the new
`
`technology. They can also be implemented directly on a
`DWDM network by using SONET framing and at the same
`time avoiding the expense of SONET multiplexers. Both of
`these technologies can also Support the overlay of a logical
`Star topology per the invention.
`ATM Adaptation
`0041 AS discussed earlier, for many telecommunications
`carriers today, it is common to use an ASynchronous Trans
`fer Mode (ATM) adaptation layer on top of a SONET ring.
`One key advantage of this approach is efficient Support for
`multiple protocols in spite of the rigid underlying SONET
`TDM infrastructure. One well-known adaptation mecha
`nism for mapping ATM over a SONET ring is the Virtual
`Path Ring (VPR).
`0042. In setting up a VPR, the relationship between the
`ring nodes and their virtual paths is administered at instal
`lation time. This is a costly and error-prone operation.
`Further, if the ring is altered, then the administration must be
`redone, with the additional complexity that the new nodes
`and path assignments do not interfere with previously
`administered characteristics.
`0043. Additionally, node-to-node signaling is challeng
`ing. If node-to-node paths are administered, at least one
`unique virtual path (VP) must be assigned from every node
`in the ring to every other node in the ring. In an n-node
`network, the number of VPs required is (n-n)/2. Managing
`this number of VPS can put a burden on System management
`and administration resources. Further, if the protection capa
`bility of the underlying ring is to be maintained, then the
`reverse direction paths must also be provisioned. Provision
`ing errors may result in incorrect operation of the network
`and may remain hidden until a path Switch occurs. If the
`node-to-node paths are not administered, then, to reach a
`node on the opposite side of the ring in a Switched Virtual
`Circuit (SVC) environment, signaling procedures must be
`executed on each and every intervening node. This causes an
`incremental delay per node that can cumulatively become
`unacceptably large on large rings, and which is exacerbated
`on busy rings.
`0044) In the case where the underlying network is an
`Asynchronous Transfer Mode (ATM) Virtual Path Ring
`(VPR) routed according the Private Network-Network Inter
`face (PNNI), a special Ring Administration task is assigned
`to the peer group leader (PGL). This Ring Administration
`task assigns virtual path IDs (VPIs) to effect a star overlay
`on the VPR at installation and to reconfigure the star overlay
`automatically at node additions, deletions, or link failures.
`Imposition or overlay of the logical Star architecture on the
`VPR reduces node-to-node Switching costs (e.g., delay, as
`well as memory and processing costs) Since all nodes in a
`Star topology are at most two logical hops away. The logical
`Star also conserves virtual path address Space relative to a
`fully configured VPR. Finally, since the underlying network
`is a VPR, the robustness associated with protection Switch
`ing is preserved.
`
`Virtual Path Ring
`0045 AVPR represents one very practical example of a
`ring abstraction of an underlying network upon which this
`invention can be implemented. One embodiment of the
`invention manipulates the PNNI routing and Signaling pro
`
`Arista Networks, Inc.
`Ex. 1005, p. 13
`
`

`

`US 2004/0095946 A1
`
`May 20, 2004
`
`tocols on an (ATM) Virtual Path Ring (VPR) to effect the
`creation of the logical Star while maintaining compatibility
`with those protocols. Some implementation details in this
`context follow.
`0046 PNNI specifies a logical hierarchy of (partial or full
`mesh) networks for the purpose of generalized routing.
`PNNI includes a concept called “peer group leader election”
`(PGLE) whereby one of the logical nodes within a peer
`group of nodes is designated the "peer group leader” (PGL).
`The PGL has certain responsibilities with respect to routing
`and communication of (in Some cases, Summarized) topol
`ogy information to other nodes within its peer group and to
`other nodes above and below it in the peer group hierarchy.
`These responsibilities afford the PGL certain privileges with
`respect to topology and routing control. It is these privileges
`that are exploited in this implementation of the invention to
`impose a Star topology upon the VPR.
`0047 A PGL is elected by virtue of his relative “leader
`ship priority' within its peer group. The leadership priority
`is a parameter configured by the System administrator or
`derived by the invention according to knowledge of the
`system topology. It is thus possible to “rig” the PGLE. Per
`this invention, a "head' node is designated that will execute
`a set of Special "Star overlay procedures. Thus, one Step in
`the implementation of the Star overlay of this invention on
`a VPR is to rig the PGLE such that the designated “head”
`node of the star overlay is the one that gets elected PGL. The
`PGL (and thus the head node of the overlaid star network)
`is also a “border node according to PNNI terminology,
`which equates to it being an ATM feeder node in the context
`of ATM VPRs. Note that, in one implementation of this
`invention, the a priori knowledge of the peer group leader
`allows vendors to associate additional resources with the
`PGL (e.g., processing power, redundant hardware for pro
`tection, and memory) to better help the PGL/head node
`accomplish its assigned tasks. In preferred implementations,
`the head node will also be the central node in the logical Star
`topology, although that is not necessary.
`0.048. As per the PNNI reference specification, when a
`communications link becomes operational within a PNNI
`network, neighboring nodes exchange identification infor
`mation over the PNNI Routing Control Channel (RCC),
`which has the well-known Virtual Path ID and Virtual
`Circuit ID (VPI.VCI) address (0, 18). This is accomplished
`using the PNNI Hello protocol over these links whereby the
`nodes exchange their topology State information using PNNI
`Topology State Elements (PTSE) that are flooded through
`out the peer group. It is by this method that the members of
`the peer group become aware of the details of group mem
`bershipS and Synchronize their topology databases.
`0049 Referring to FIG. 2, assume NO is configured to be
`the head node and is also configured to have the highest
`leadership priority. When the system links become active,
`each adjacent node executes a “Hello” exchange with its
`neighbor, and, executing normative PNNI procedures,
`develops PTSE and floods those around the ring.
`0050 For example, N0 exchanges Hellos with N1 via
`path PHI, N1 exchanges Hellos with N2 via path PH2, N2
`exchanges Hellos with N3 via path PH3, and N3 exchanges
`Hellos with NO via path PH4. Via these neighbor-to-neigh
`bor exchanges, the latest topology information is flooded
`within this peer group.
`
`0051) Note that the head node N0 has been configured to
`have the highest leadership priority. Thus, it easily wins the
`PGLE, and it is also aware of the fact that it is both the PGL
`and the head node with respect to the logical Star topology
`overlay of this invention. AS Such, it knows that it must
`execute a set of Special "star overlay procedures including
`“Administer Ring” as outlined in FIG. 3.
`0.052 As illustrated by FIG. 3, when the head node
`executes the Administer Ring routine, at Step 304 it checks
`to see whether this is the initial run of the routine or whether
`a topology update has occurred. A topology State change
`could be triggered by a change in the PTSE database
`resulting from an addition or Subtraction of a node from the
`ring, a node failure, a change in traffic patterns, or other
`occurrences outlined in the PNNI specification. These would
`be detected by the head node via PNNI topology update
`meSSageS.
`0053 If this is the first time the routine has been run, then
`control flows to step 306. In step 306, the PTSE database is
`analyzed to determine the number of nodes currently on the
`ring. In step 308, a counter is initialized to “1” correspond
`ing to the index to the first node (e.g., per PTSE analysis) on
`the network beyond the head node. In step 310, the VP
`address Space is partitioned by the number of nodes, option
`ally leaving a Scatter of VP addresses in reserve for topology
`changes and growth as per the mechanism detailed in U.S.
`patent application Ser. No. 09/861,947, filed May 21, 2001
`as attorney docket no. Baker 24-2 (“the 947 application”),
`incorporated herein by reference in its entirety. In Step 312,
`for the node on the ring corresponding to the value of the
`counter, a VP or set of VPS, is assigned between the head
`node and that node. This assignment can be accomplished
`using the Interim Link Management Interface (ILMI) via the
`management (VPI.VCI) address (0, 16), where the node
`address information contained in the PTSES forms the basis
`for configuring the VP assignments. In Step 314, the counter
`is incremented by one and, in Step 316, a test is done to See
`whether the counter exceeds the number of nodes in the
`network (i.e., whether each of the nodes has been assigned
`a set of VP addresses). If there is another node, then
`processing returns to Step 312. If all the nodes have been
`assigned VP addresses, then control returns to the start of the
`Administer Ring routine at step 302.
`0054 The result of the Administer Ring routine is the
`assignment of one or more virtual paths from the head node
`to each of the other nodes in the ring. This logical architec
`ture equates to a Star topology that is overlaid on the
`underlying ring network, as depicted in FIG. 4, where
`VPG1, VPG2, and VPG3 represent sets of virtual path
`addresses where each of VPG1, VPG2 and VPG3 represent
`a set of one or more virtual paths assigned between the head
`node and another node in the network. The dotted lines in
`FIG. 4 represent virtual paths, while the Solid lines represent
`the communication links of the underlying ring network.
`0055. The following illustrates the application of the
`Administer Ring routine of FIG. 3 to the ring network of
`FIG. 2. AS discussed, as the nodes are powered up, they
`would load and run the procedures associated with SONET,
`ATM, VPR, and PNNI protocols at the appropriate points in
`their initialization and configuration along with SNMP and
`ILMI procedures as is conventional for networks of this
`type. Thus, at the PNNI level, the Hello protocol would be
`
`Arista Networks, Inc.
`Ex. 1005, p. 14
`
`

`

`US 2004/0095946 A1
`
`May 20, 2004
`
`executed, PTSE would be exchanged by the nodes, and
`knowledge of the addresses and interconnection topology of
`the ring would be established throughout the ring. According
`to this invention, assuming N0 is the network feeder, it
`would have been a priori configured with an initial leader
`ship priority above that of the other nodes N1, N2, and N3
`in the ring. It would thus be elected PGL through the normal
`PNNI PGLE and then load and run the Administer Ring
`routine of this invention.
`0056 Per FIG. 3, at step 304, the routine would detect
`that this is the initial run of the procedure and control would
`jump to step 306. In step 306, the PTSE database is analyzed
`to determine the number of nodes currently on the ring. In
`step 308, a counter is initialized to “1” corresponding to the
`indeX in an ATM address array corresponding to the first
`node on the network downstream from the head node (e.g.,
`N1). In step 310, the VP address space is partitioned by the
`number of nodes other than the head node (i.e., three), which
`resulted from the analysis of step 306. In this example, we
`will assume that 4 bits define the VP address space, resulting
`in a virtual address Space of 16 unique addresses. Thus in
`step 310, the virtual address space of 16 addresses is divide
`by 3 yielding 5 addresses per virtual path “set,” with one left
`over. It is typical to reserve Some of these addresses for
`future incremental expansion and modification, So in this
`example, 4 of the 16 will be set aside as reserve, leaving 12
`addresses for assignment to the virtual paths that define the
`Star topology (e.g., 4 addresses per virtual path Set). In Step
`312, corresponding to the value “1” of the counter, the
`logical route between node N0 and node N1 on the ring is
`assigned VPS 1, 2, 3, and 4. In other words, the set of virtual
`paths between node N0 and node N1 is defined to be virtual
`path set 1 (VPS1) where VPS1={VP1,VP2, VP3, VP4}),
`while VP 5 is held in reserve. The virtual paths defined by
`VPS1 are then assigned (e.g., via ILMI). In step 314, the
`counter is incremented by one and, in Step 316, a test is done
`to see whether the counter exceeds the number of nodes in
`the network (i.e., whether the route from the head node to
`each of the other nodes in the ring has been assigned a Set
`of VP addresses). In particular, the counter is incremented to
`2 in step 314, and control returns to step 312 where the set
`of virtual paths from node N0 to node N21 is defined to be
`VPS2={VP5, VP7, VP8, VP9). These paths are then
`assigned (again via ILMI or equivalent administration pro
`tocol), while VP 10 is held in reserve. Similarly, VPS3 get
`defined as {VP11, VP12, VP13, VP14) and ass

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket