WO2012118885A1 - Bonding engine configured to prevent data packet feedback during a loopback condition - Google Patents

Bonding engine configured to prevent data packet feedback during a loopback condition Download PDF

Info

Publication number
WO2012118885A1
WO2012118885A1 PCT/US2012/027096 US2012027096W WO2012118885A1 WO 2012118885 A1 WO2012118885 A1 WO 2012118885A1 US 2012027096 W US2012027096 W US 2012027096W WO 2012118885 A1 WO2012118885 A1 WO 2012118885A1
Authority
WO
WIPO (PCT)
Prior art keywords
bonding
fcs
data
bonding engine
packet
Prior art date
Application number
PCT/US2012/027096
Other languages
French (fr)
Inventor
Dennis MCMAHAN
Jerry GREER
Darrin GIEGER
Thomas DETWILER
Original Assignee
Adtran, Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Adtran, Inc filed Critical Adtran, Inc
Publication of WO2012118885A1 publication Critical patent/WO2012118885A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0056Systems characterized by the type of code used
    • H04L1/0061Error detection codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/0078Avoidance of errors by organising the transmitted data in a format specifically designed to deal with errors, e.g. location
    • H04L1/0079Formats for control data

Definitions

  • the present invention relates to packet communications, and more particularly, this invention relates to communications systems that use bonding engines configured to bond together a plurality of communications links as subscriber line pairs.
  • the standard Ethernet in the First Mile (EFM) bonding protocol is susceptible to looping back packets transparently when the underlying physical layer enters a loopback condition. This behavior has been shown in customer applications to cause the network feed to be disabled by a connected switch based on MAC address detection as a defense against DoS (Denial of Service).
  • MSAP Multi-Service Access Platform
  • TA5000 from ADTRAN, INC. of Huntsville, Alabama
  • a proprietary BACP (Bonding Aggregation Control Protocol) loopback detection will automatically disable links in an EFM group that are looped back. However, any packets that are received prior to the BACP packet will pass through the EFM engine towards the network.
  • a system and method transmits data and receives data packets within a bonding engine.
  • the data packets are fragmented into a plurality of packet fragments for communication across a bonded group of subscriber lines.
  • a Frame Check Sequence (FCS) in the data packet is inverted on one direction of the bonding group to prevent any data packets from propagating towards the network during a loopback condition.
  • FCS Frame Check Sequence
  • a BACP Protocol Data Unit is transmitted and has at least one additional bit indicating the ability to send and receive an inverted FCS. At least one additional bit in the BACP PDU indicates the status of whether packets are transmitted by a far-end bonding engine and were sent with an inverted FCS.
  • the method detects the ability of a far-end bonding engine to send and receive packets with an inverted FCS and negotiate which near-end or far-end bonding engine will transmit packets with an inverted FCS.
  • Packets are transmitted having an inverted FCS from a link device or terminal having a lower MAC address from the links on both ends of the bonding groups that support FCS inversion.
  • data packets are received within the bonding engine and the data packets are fragmented into a plurality of packet fragments for communication across a bonded group of subscriber lines. Each fragment is scrambled on a per-link basis to prevent any data packets from propagating towards the network during a loopback condition.
  • any scrambling settings are negotiated across a link group with overhead. Scrambling occurs at a link interface in anther example.
  • FIG. 1 is a state machine flowchart demonstrating the FCS inversion in accordance with a non-limiting example.
  • FIG. 2A is a block diagram of a BACP protocol data unit (PDU) showing the fixed header followed by a variable number of TLVs.
  • PDU BACP protocol data unit
  • FIG. 2B is a block diagram showing an example header.
  • FIG. 2C shows an organization-specific TLV and showing an OUI that identifies the organization that specifies the syntax and semantics of the rest of the value field of the TLV.
  • FIG. 3 is a high-level flowchart illustrating one example method in accordance with a non-limiting example.
  • FIG. 4 is a block diagram showing an embodiment of a communications system having a network, central office facility, including a telecommunications access module and network bonding engine and communicating with a plurality of customer premises, which can be used in accordance with a non-limiting example.
  • FIG. 5 is a block diagram showing greater details of the central office facility that includes a plurality of telecommunications access modules, a switch module and provision module in accordance with a non-limiting example.
  • FIG. 6 is a more detailed block diagram showing an example of a
  • telecommunications access module and various components that can be used in accordance with a non-limiting example.
  • FIG. 7 is a block diagram showing an example of a chassis located at a central office facility that receives the various access modules, switch module and provision module in accordance with a non-limiting example.
  • FIG. 8 is a block diagram showing an example of basic components of the access module, provision module and switch module connected to a chassis backplane in accordance with a non-limiting example.
  • the system inverts the Ethernet FCS on one direction of each EFM bonding group so that any traffic that is fed back inadvertently will fall the FCS check in a defragmenter.
  • the FCS failure prevents any packets from propagating towards the network, and the offending link can be disabled after a subsequent BACP loopback detection to determine the offending link.
  • the system automatically detects the ability of the far-end EFM bonding engine to send and receive packets with inverted FCS to negotiate which near-end (NE) or far- end (FE) bonding engine is actively transmitting packets with the inverted FCS.
  • Software provisioning or detection can be used to ensure that both ends of the link are protected from passing looped-back received packets in the presence of a line loopback.
  • any logical processing device can be used for the system, but in a specific example, the system is contained in FPGA firmware and operates in real-time to prevent excessive data loss or down time when operating in a compatible mode, a looped-back mode, or interfacing with legacy equipment such as supplied by ADTRAN, INC. or other vendor's equipment.
  • legacy equipment such as supplied by ADTRAN, INC. or other vendor's equipment.
  • additional bits have been introduced in the proprietary section of the BACP Protocol Data Unit (PDU) to indicate the capability to send and receive inverted FCS, as well as a status of whether packets transmitted by the bonding engine were sent with inverted FCS.
  • PDU BACP Protocol Data Unit
  • the inversion of the 32-bit Ethernet FCS by the transmitting terminal (or link) will cause the receiving terminal (or link) to drop the packet in error, unless a rare error event occurs.
  • the inversion of only the FCS (instead of the entire frame) permits a status check of whether or not the inversion is active to be toggled during the transmission of a packet without corruption. It is therefore possible to send an inverted FCS on all links on a transmitter, determined on a group-by-group basis. Furthermore, if a group's transmitter is inverting the FCS, its receiver should be prevented from inverting the FCS so that any looped-back packets will fail the FCS check and be terminated by the defragmentation in the bonding engine.
  • BACP PDU's are typically never sent with an inverted FCS.
  • the link/subscriber line may be ADSL, VDSL, HDSL, SHDSL, DS1, DS3, or any sub-variant thereof, or any future subscriber line protocol.
  • the state machine flowchart (FIG. 1) demonstrates the per-group setting of FCS inversion.
  • "Frag” corresponds to Fragment such as accomplished at a fragmenter circuit in a bonding engine and "Defrag” refers to Defragment such as accomplished in a defragmenter circuit in a bonding engine.
  • the defrag Upon reset, the defrag is set to expect an inverted FCS, so as to prevent the near-end frag and near-end defrag communicating if a loopback is set prior to establishing a Transmission Convergence (TC) synchronization (sync).
  • TC Transmission Convergence
  • the unit If at any time during operation the near-end terminal detects that the far-end link or terminal is incompatible, the unit will revert to non-inverted FCS operation on both frag and defrag.
  • the far-end link or terminal will be determined as incompatible individually for transmit (Tx) and receive (Rx) if BACP packets are received with O's in all bits, indicating FCS inversion capability/status.
  • the far-end link will also be determined incompatible if no valid BACP PDUs (regardless of MAC address) have been received on any bonded link within 1.6384 seconds in a non-limiting example, provided that the link is in near-end and far- end TC (transmit control) sync.
  • the ability and status bits are located in bits 6:4 in the 40th byte of the BACP PDU.
  • Bit 7 typically indicates the proprietary and the far-end loopback detect status bit.
  • Bit 6 advertises the near-end treatment FCS inversion capability.
  • Bit 5 advertises near-end receive FCS inversion capability.
  • Bit 4 indicates whether the current transmission has an inverted FCS (all bits are active-high positive indications).
  • Bits 6 and 5 are set to ⁇ for all for firmware employing this code, but can be selectively set to ⁇ ' by the frag_con and defrag__con registers in the EFM (Ethernet in the First Mile) core.
  • BACP PDU's are employed on a per-link basis to convey timestamp and loopback information.
  • FCS inversion is made on a per-group basis.
  • BACP frames may also be used to assist in identifying misconfigured groups. If, for example, two or more different MAC source addresses (besides the local MAC SA) appear in BACP frames received in the same group, the group may be disabled until the condition passes.
  • FIG. 2A shows a generic BACP PDU such as defined in the G.998-2 amendment 2 and showing the BACP POU header and a variable number of TLVs and the Ethernet FCS.
  • the BACP PDU header is fixed followed by the variable number of TLVs.
  • FIG. 2B shows a BACP header as a slow protocol sub-type.
  • Organizations may extend this protocol by including additional TLV information in the BACP PDU. This recommendation does not restrict or control organization-specific TLVs. They are controlled by the organization identified within the TLV.
  • the format of an organization- specific TLV is shown in FIG. 2C. the organization-specific TLVs can be included in any BACP PDU. They can be any length.
  • An OUI is used to identify the organization that specified the syntax and semantics of the rest of the value field of the TLV.
  • FIG. 3 illustrates a high-level flowchart illustrating an example method that could be used for the inverted FCS functionality.
  • the process begins by receiving data packets within a bonding engine (block 40).
  • the data packets are fragmented into a plurality of packet fragments for communication across a bonded group of links, each of which is a logical representation of a physical subscriber line (block 42).
  • a Frame Check Sequence (FCS) is inverted in the data packet on one direction of the bonding group (block 44) if the link terminals support inversion and have negotiated in this direction as explained above.
  • FCS Frame Check Sequence
  • the data packet is transmitted (block 46) and the inversion of the FCS prevents any data packets from propagating towards the network during a loopback condition.
  • FCS inversion or other modification
  • the preferred implementation uses FCS inversion on a per-group basis. This description is only a non-limiting example of the type of components that can be used.
  • a bonding engine within a network receives a data stream to be communicated to a customer premises (CP) and divides the data across subscriber lines extending from a network facility (e.g., a central office facility) to the customer premises.
  • a bonding engine at the customer premises receives the data from the multiple subscriber lines and reassembles the data to form the original data stream received and divided by the network bonding engine.
  • a data stream to be communicated from the customer premises through the network is received by the CP bonding engine, which divides the data across the multiple subscriber lines.
  • the network bonding engine receives such data and reassembles the data to form the original data stream received and divided by the CP bonding engine.
  • a line card typically a printed circuit board as part of a rack mounted module.
  • These line cards are typically held in slots of several chassis.
  • Each line card is also typically interfaced with a chassis backplane that enables the line card to communicate with various network devices and other equipment.
  • An example chassis includes a SAP from ADTRAN, INC., e.g., a TA5000.
  • FIG. 4 is a non-limiting example of a communications system 100 that can use the Inverted FCS or scrambling as described above.
  • the system 100 includes a network 102, such as the Public Switched Telephone Network (PSTN) or Internet, that routes data.
  • a network facility such as a central office (CO) 104, receives from the network 102 data destined for equipment or other devices at customer premises (CP) 110 (including bonding engine 110a) and transmits data to the customer premises via a plurality of communication links, such as the illustrated subscriber line pairs 112.
  • CP customer premises
  • bonding engine 110a customer premises
  • DSL digital subscriber line
  • ADSL Asymmetric Digital Subscriber Line
  • ADSL2 ADSL2, VDSL2, High-Bit-rate Digital Subscriber Line
  • HDSL High-Bit-rate Digital Subscriber Line
  • HDSL4 Very-high-data-rate Digital Subscriber Line
  • VDSL Very-high-data-rate Digital Subscriber Line
  • other types of protocols may be used to communicate data between the central office 104 and the customer premises 110.
  • the central office 104 includes at least one
  • telecommunications access module 120 which includes at least one bonding engine 122.
  • This access module includes a transceiver 124 and a processor module 126.
  • the transceiver 124 and processor module 126 could be separate from or integral with the bonding engine 122.
  • the access module could include other components as will be explained in greater detail below, including ports, memory, interfaces and buses.
  • the access module 120 typically can be formed as a Physical Medium Entity (P E) with each length terminated at one end via a network PME and the other end via a remote PME at the customer premises.
  • P E Physical Medium Entity
  • the customer premises would also include a transceiver and typical processors using data processing logic with various customer premises equipment.
  • the customer premises can include different types of processors, various ports, registers, databases, memory and control logic, including various registers and backplane interfaces.
  • the bonding engine could be formed using different configurations, including an ASIC, a processor or a Field Programmable Gate Array.
  • a network interface 127 communicates with the network 102.
  • the network bonding engine 122 includes various subcomponents as optional
  • FCS inversion/pocket modifier 122a including an FCS inversion/pocket modifier 122a; the fragmenter and defragmenter 122b; and the fragment modifier/scrambler 122c.
  • a transmission convergence (TC) sublayer 128 is located between the network bonding engine and the transceiver 124.
  • a plurality of SCR 124a are shown in dashed lines at the transceiver to indicate that they are optional and attached to the transceiver.
  • the transceiver 124 is connected to the various customer premises 110. Only one customer premises is illustrated in detail and the customer premises includes similar components as in the central office, including a processor module 110b and customer premises (CP) bonding engine 110a referred to above. Transmission control sublayer 110c is illustrated. The transceiver connects to optional SCR 110e. Multiple subscriber lines are illustrated and connected to the customer premises. For purposes of illustration, only three subscriber lines are illustrated. It should be understood that a number of customer premises can connect to the transceiver 124. it should be understood that the CP bonding engine 110a and TC sublayer 110c at the customer premises can include subcomponents similar to that of the central office.
  • the TC sublayer 128 is the layer in which Ethernet frames or EFM fragments are adapted to transparent data channels such as xDSL
  • EFM also called "PTM”
  • PTM EFM
  • TC there is a 65 byte frame with one byte allocated as overhead to assist in declaring whether the link is idle or carrying packets.
  • Another example of a TC is the ATM TC, which uses the 5* byte of the ATM ceil to align the data into ATM ceils at the receiver.
  • FIG. 5 is an example of the bonding system components located, for example, at a central office 104.
  • the central office has a plurality of access modules 120a-c that are coupled to and terminate subscriber lines 112a-c.
  • the access modules have ports 130a-c that are respectively coupled to and interfaced with subscriber lines 112a-c.
  • Each port has a unique address that identifies the port from the other ports of the other access modules.
  • the port addresses may be used to switch data among the modules as will be described in more detail below.
  • each access module 120a-c has at least one bonding engine 122a-c and at least one processor module 126a-c, which in one example, could be formed as a microprocessor or other controller.
  • the processor module includes registers and associated circuitry, for example, any memory and control logic, which could be separate or part of the processor module.
  • Each access module is coupled to a switch module 133, which switches data between the access modules and the network 102.
  • a provision module 140 is illustrated.
  • the switch module 133 receives from the network 102 data packets that are destined for equipment at the customer premise.
  • Each data packet includes a header and a data portion. Control and routing information is included in the header, and payload data is included in the data portion.
  • the header of the data packet may include a destination address identifying a communication device at the customer premises 110 to which the data packet is to be routed, in one non-limiting example, the header includes a Virtual Local Area Network (VLAN) tag.
  • VLAN Virtual Local Area Network
  • Other types of information may be included in the header, as is known in the art.
  • the data packets are formed in accordance with Ethernet protocol, but other types of packet protocols may be used in other embodiments.
  • the switch module 133 For each packet received from the network 102, in this non-limiting example, the switch module 133 transmits the packet to the appropriate access module based on information in the packet's header, such as the destination address or VLAN tag included in the header. In one example embodiment, all of the packets to be carried by the same bonding group (e.g., having the same destination address or VLAN tag) are routed to the same access module, but this is not necessary and routing could be to other access modules.
  • the bonding engine is configured to fragment the original data packet into a plurality of fragments. Each of the fragments is to be transmitted by a respective one of the subscriber lines of the bonding group.
  • control and routing information is included in the header, and payload data is included in the data portion.
  • the header may identify the port address of the port 130a-c that is coupled to the subscriber line 112a-c that is to carry the packet fragment.
  • One or more of the subscriber lines 112a-c of a bonding group may be coupled to and terminated by the same access module on which the group's bonding engine resides. In that example, it is unnecessary for the fragments carried by such subscriber line to be transmitted through the switch module 133.
  • a bonding engine such as at 122a provides a fragment to be carried by its respective subscriber line 112a, the fragment is transmitted directly to the port 130a coupled directly to such subscriber line without being communicated through the switch module 133.
  • fragments provided by the bonding engine 122a to be earned by subscriber lines 112b-c terminated by other modules 120b-c are transmitted to the switch module 133.
  • the switch module 133 For each such fragment, the switch module 133 analyzes the fragment's header, and based on the port address of such fragment, transmits the fragment to the access module 120b-c on which the identified port 130b-c resides.
  • any of the bonding engines can bond any of the subscriber lines 112 regardless of whether a given subscriber line is terminated by the same access module on which the bonding engine resides.
  • the provision module 140 operates together with the various access modules and switch module 133 to provision certain ports to form a bonding group by assessing the number of available subscriber line pairs that can be used and then adapting the maximum fragmentation size based on the line pairs. This fragmentation size is maintained as long as a line pair does not go out of service. If a line pair, such as perhaps on bonding engine 122b goes out of service, the
  • the provision module 140 is configured to provision the access modules together with the operation of the switch module and control the bonding process performed by access modules in a desired manner.
  • Each access module 120a-c includes different hardware components configured to terminate and drive the subscriber lines 112a-c terminated by the access modules. These access modules may include, however, software, firmware, and/or other hardware for performing other functions.
  • FIG. 6 is an example embodiment of an access module 120, which includes control logic 152 implemented in software and stored in a memory 155. The control logic 152, when implemented in software, can be stored and transported on any computer-readable medium for use by or in connection with an instruction execution apparatus that can fetch and execute instructions.
  • This example embodiment of the access module 120 includes the processing module 126 as noted before, for example, a digital signal processor (DSP) or a central processing unit (CPU), that communicates to and drives the other elements within the module 120 via a local interface 166, which can include at least one bus.
  • DSP digital signal processor
  • CPU central processing unit
  • the processing module 126 retrieves and executes instructions of the control logic 152.
  • the processing module includes appropriate registers 127 in this example.
  • the access module 120 in one example includes a Field
  • a Programmable Gate Array (FPGA) 168 for implementing hardware portions of the module, such as the module's bonding engine 122 if such engine is implemented in hardware.
  • the access module 120 also has registers as part of the processor module 126 configured to store various configuration settings.
  • a backplane interface 175 includes a connector configured to interface the access module 120 with a backplane of a chassis (not shown) as will be described in more detail below.
  • a fragmentation buffer 172 holds packet fragments.
  • the registers 127 as part of the processor module 126 store various parameters
  • configuration settings which preferably specify how various data packets and/or fragments are to be processed.
  • the configuration settings may indicate which of the bonding engines 122a-c receive a fragment from a particular subscriber line 112a-c terminated by an access module 122a-c. Further, the configuration settings may indicate how fragments received from a bonding group or link on another access module are to be processed.
  • the configuration settings may correlate the destination addresses or VLAN tags of data packets from the network 102 with port addresses.
  • a bonding engine 122 residing on the module 120 may use the configuration settings to allocate fragments across the subscriber lines 112 of a bonding group.
  • the bonding engine 122 uses port addresses when fragmenting a data packet having the foregoing VLAN tag as described.
  • the bonding engine 22 selects from the correlated port addresses for insertion into the fragment headers.
  • the fragments from the data packet are transmitted to and earned by the subscriber lines of the bonding group.
  • the port addresses inserted into the fragment headers are used by the switch module 133 to switch the fragments.
  • a group's bonding engine 122 based on the configuration settings in the registers of the processor module 126 and inserts a respective port address into the header of each fragment.
  • Some of the fragments may be carried by "local" subscriber lines, and some of the fragments may be carried by “external” subscriber lines.
  • a subscriber line is typically "local" relative to a particular access module 122 if it is coupled to a port on the access module such that the subscriber line is terminated by circuitry on that access module.
  • the switch module 133 as illustrated in FIG. 5 includes various components, including a local interface 200 and processing module 202, memory 204, control logic 206, a Field Programmable Gate Array (FPGA) 208, network interface 210, registers 203 as part of the processing module 202 and backplane interface 212 connected by various buses or local interface.
  • the registers 203 could be separate from the processing module.
  • the control logic 206 can be implemented in software and stored in memory and stored and transported on a computer-readable medium similar to the access module components, the processing module could be formed as a Digital Signal Processor (DSP) or a Central Processing Unit (CPU) that communicates to and drives other elements within the switch module 33 using the local interface such as at least one bus.
  • the processing module 202 can retrieve and execute instructions of the control logic 206.
  • the associated registers 203 are used in one example for storing various configuration settings.
  • the backplane interface 212 includes a connector for interfacing the module with the backplane of a chassis (not shown).
  • the FPGA 208 performs switching operations in one non-limiting example. It is possible that this switch module 133 could have a network interface coupled to a network connection such as a fiber optic cable.
  • Configuration settings in the various registers 203 would indicate how data from a network would be switched. For example, a fragment could be received from an access module 120 and the FPGA would consult registers using the port address in the fragment's header and based on that information determine which of the modules is to receive the packet.
  • the provision module 140 is similarly configured with an appropriate processor module 230, registers 231, memory 232, control logic 234, line data 236 and a local interface 238 through a backplane interface 240. Provisioning requests are received into the provision module, which operates with the various access modules 120 and switch module 133, for example, at the central office 104. Any data packets received from the network 102 could have VLAN tags in their headers. Any registers could indicate where the packets are to be transmitted based on their VLAN tags.
  • the switch module 133, three access modules 122a-c, and the provision module 140 are respectively inserted into slots of a chassis 252, but any number of such modules can be inserted.
  • Each of the subscriber lines 112a-c is coupled to a subscriber line interface 256 mounted on the chassis 252.
  • the subscriber line interface 256 interfaces the subscriber lines with a chassis backplane, which couples the subscriber lines to the access modules.
  • the chassis backplane also couples each access module and provision module to the switch module 133.
  • the backplane comprises a plurality of conductive connections (e.g., copper traces) for conductively coupling the subscriber lines 112a-c and the access modules 120a-c, and provision module 140 to the switch module 133.
  • the chassis backplane is conductively coupled to the backplane interface 175 of each access module (FIG. 5), the backplane interface 212 of the switch module 133, and the backplane interface 240 of the provision module 140.
  • a network connection 263, such as a fiber optic cable, for example, carrying a high-speed data stream is coupled to the switch module 133.
  • the switch module 133 may include a fiberoptic transceiver (not shown) to convert optical signals from the connection 263 into electrical signals and for converting electrical signals from the switch module 133 into optical signals.
  • the network connection 263 in another example may be coupled to the switch module 133 through the chassis backplane 264, and/or the subscriber lines and may be coupled directly to the access modules similar to how the network connection 263 is coupled directly to the switch module 133 (FIG. 8).
  • the provision module 140 is configured to provision the configuration settings of the different registers of the access modules 120 and any registers of the switch module 133.
  • the control logic of the provision module receives a provision request indicative of a bonding group to be added.
  • the provision request may include the port address of each port that is to be coupled to a subscriber line of a particular bonding group.
  • FIGS. 4-8 are non- limiting embodiments of a communications system that includes various access modules and components that can be used to implement FCS inversion or scrambling as described above, it should be understood that any different types of bonding systems can be used as non-limiting examples and as suggested by those skilled in the art. Only high-level components are illustrated because numerous and different variations of network systems and arrangements of components can be used to implement any necessary algorithms.

Abstract

A system and method transmits data and receives data packets within a bonding engine. The data packets are fragmented into a plurality of packet fragments for communication across a bonded group of subscriber lines. A Frame Check Sequence (FCS) in the data packet is inverted on one direction of the bonding group to prevent any data packets from propagating towards the network during a loopback condition.

Description

BONDING ENGINE CONFIGURED TO PREVENT DATA PACKET FEEDBACK DURING A LOOPBACK CONDITION
Related Application^)
[0001] This application claims priority to prior filed U.S. patent application Serial No. 13/037,477 filed March 1, 20 1, which is incorporated herein by reference in its entirety.
Field of the invention
[0002] The present invention relates to packet communications, and more particularly, this invention relates to communications systems that use bonding engines configured to bond together a plurality of communications links as subscriber line pairs.
Background of the Invention
[0003] The standard Ethernet in the First Mile (EFM) bonding protocol is susceptible to looping back packets transparently when the underlying physical layer enters a loopback condition. This behavior has been shown in customer applications to cause the network feed to be disabled by a connected switch based on MAC address detection as a defense against DoS (Denial of Service). One troubling case in particular is when an entire shelf in a Multi-Service Access Platform (MSAP) such as a TA5000 from ADTRAN, INC. of Huntsville, Alabama, has its network feed disabled as the result of a single DS1 tributary entering a loopback condition, in some networks, a proprietary BACP (Bonding Aggregation Control Protocol) loopback detection will automatically disable links in an EFM group that are looped back. However, any packets that are received prior to the BACP packet will pass through the EFM engine towards the network.
Summary of the Invention
[0004] A system and method transmits data and receives data packets within a bonding engine. The data packets are fragmented into a plurality of packet fragments for communication across a bonded group of subscriber lines. A Frame Check Sequence (FCS) in the data packet is inverted on one direction of the bonding group to prevent any data packets from propagating towards the network during a loopback condition.
[0005] Any data packets that are fed back inadvertently will fail an FCS check within a defragmenter at the bonding engine. An offending subscriber line is disabled in the bonded group after a Bonding Aggregation Control Protocol (BACP) loopback detection is performed. A BACP Protocol Data Unit (PDU) is transmitted and has at least one additional bit indicating the ability to send and receive an inverted FCS. At least one additional bit in the BACP PDU indicates the status of whether packets are transmitted by a far-end bonding engine and were sent with an inverted FCS.
[0006] The method detects the ability of a far-end bonding engine to send and receive packets with an inverted FCS and negotiate which near-end or far-end bonding engine will transmit packets with an inverted FCS. Packets are transmitted having an inverted FCS from a link device or terminal having a lower MAC address from the links on both ends of the bonding groups that support FCS inversion. In another example, data packets are received within the bonding engine and the data packets are fragmented into a plurality of packet fragments for communication across a bonded group of subscriber lines. Each fragment is scrambled on a per-link basis to prevent any data packets from propagating towards the network during a loopback condition. In one example, any scrambling settings are negotiated across a link group with overhead. Scrambling occurs at a link interface in anther example.
Brief Description of the Drawings [0007] Other objects, features and advantages of the present invention will become apparent from the detailed description of the invention which follows, when considered in light of the accompanying drawings in which:
[0008] FIG. 1 is a state machine flowchart demonstrating the FCS inversion in accordance with a non-limiting example.
[0009] FIG. 2A is a block diagram of a BACP protocol data unit (PDU) showing the fixed header followed by a variable number of TLVs.
[0010] FIG. 2B is a block diagram showing an example header.
[0011] FIG. 2C shows an organization-specific TLV and showing an OUI that identifies the organization that specifies the syntax and semantics of the rest of the value field of the TLV.
[0012] FIG. 3 is a high-level flowchart illustrating one example method in accordance with a non-limiting example.
[0013] FIG. 4 is a block diagram showing an embodiment of a communications system having a network, central office facility, including a telecommunications access module and network bonding engine and communicating with a plurality of customer premises, which can be used in accordance with a non-limiting example.
[0014] FIG. 5 is a block diagram showing greater details of the central office facility that includes a plurality of telecommunications access modules, a switch module and provision module in accordance with a non-limiting example.
[0015] FIG. 6 is a more detailed block diagram showing an example of a
telecommunications access module and various components that can be used in accordance with a non-limiting example.
[0016] FIG. 7 is a block diagram showing an example of a chassis located at a central office facility that receives the various access modules, switch module and provision module in accordance with a non-limiting example.
[0017] FIG. 8 is a block diagram showing an example of basic components of the access module, provision module and switch module connected to a chassis backplane in accordance with a non-limiting example.
Detailed Description of the Preferred Embodiments [0018] Different embodiments will now be described more fully hereinafter with reference to the accompanying drawings, in which preferred embodiments are shown. Many different forms can be set forth and described embodiments should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope to those skilled in the art.
[0019] In one non-limiting example, the system inverts the Ethernet FCS on one direction of each EFM bonding group so that any traffic that is fed back inadvertently will fall the FCS check in a defragmenter. The FCS failure prevents any packets from propagating towards the network, and the offending link can be disabled after a subsequent BACP loopback detection to determine the offending link.
[0020]The system automatically detects the ability of the far-end EFM bonding engine to send and receive packets with inverted FCS to negotiate which near-end (NE) or far- end (FE) bonding engine is actively transmitting packets with the inverted FCS.
Software provisioning or detection can be used to ensure that both ends of the link are protected from passing looped-back received packets in the presence of a line loopback.
[0021] Any logical processing device can be used for the system, but in a specific example, the system is contained in FPGA firmware and operates in real-time to prevent excessive data loss or down time when operating in a compatible mode, a looped-back mode, or interfacing with legacy equipment such as supplied by ADTRAN, INC. or other vendor's equipment. As explained in detail below, additional bits have been introduced in the proprietary section of the BACP Protocol Data Unit (PDU) to indicate the capability to send and receive inverted FCS, as well as a status of whether packets transmitted by the bonding engine were sent with inverted FCS. In a case when links on both ends of the bonding group support FCS inversion, the one
configured with a lower MAC address is nominated as the one to send packets with inverted FCS. BACP PDU's never have their FCS inverted regardless of the setting for the associated group.
[0022] It is possible to "scramble" instead of inverting the FCS at the end of the packet. It is possible to "scramble" each fragment on a per-link basis and the system negotiates the "scrambling" settings across a link group with "overhead" rather than BACP PDU frames. It is also possible to either modify/scramble/insert overhead at the per-group level and make changes to packets or at the per-link level, making changes to fragments prior to the TC sublayer or scrambling the payload after the TC sublayer. There are many combinations that could be used. In one preferred and current implementation, the per-group inversion of the FCS in the packet is used.
[0023] The inversion of the 32-bit Ethernet FCS by the transmitting terminal (or link) will cause the receiving terminal (or link) to drop the packet in error, unless a rare error event occurs. The inversion of only the FCS (instead of the entire frame) permits a status check of whether or not the inversion is active to be toggled during the transmission of a packet without corruption. It is therefore possible to send an inverted FCS on all links on a transmitter, determined on a group-by-group basis. Furthermore, if a group's transmitter is inverting the FCS, its receiver should be prevented from inverting the FCS so that any looped-back packets will fail the FCS check and be terminated by the defragmentation in the bonding engine. BACP PDU's are typically never sent with an inverted FCS. It should be understood that the link/subscriber line may be ADSL, VDSL, HDSL, SHDSL, DS1, DS3, or any sub-variant thereof, or any future subscriber line protocol.
[0024] A determination is made as to which end of the link is inverting the FCS once the group becomes active, since only a single bonding engine on either end of a link is allowed to do so. Making this determination in firmware (instead of software) is consistent with the scope and rapidity of BACP and reduces the overall design, integration, and test phase, (especially if the software control is provisionable by menus/CLI/SNMP). Therefore, additional bits, and in a non-limiting example, three additional bits, are defined in the BACP PDU to convey the ability of either end of the bonding engine and link to invert the FCS, as well as the current status of whether or not the sending end is actively inverting the FCS.
[0025] The state machine flowchart (FIG. 1) demonstrates the per-group setting of FCS inversion. "Frag" corresponds to Fragment such as accomplished at a fragmenter circuit in a bonding engine and "Defrag" refers to Defragment such as accomplished in a defragmenter circuit in a bonding engine. There are three valid states: (1) the backwards-compatible default state (in which neither end is transmitting or receiving an inverted FCS); (2) defrag inverting incoming FCS; and (3) frag inverting outgoing FCS. Upon reset, the defrag is set to expect an inverted FCS, so as to prevent the near-end frag and near-end defrag communicating if a loopback is set prior to establishing a Transmission Convergence (TC) synchronization (sync). If at any time during operation the near-end terminal detects that the far-end link or terminal is incompatible, the unit will revert to non-inverted FCS operation on both frag and defrag. The far-end link or terminal will be determined as incompatible individually for transmit (Tx) and receive (Rx) if BACP packets are received with O's in all bits, indicating FCS inversion capability/status. The far-end link will also be determined incompatible if no valid BACP PDUs (regardless of MAC address) have been received on any bonded link within 1.6384 seconds in a non-limiting example, provided that the link is in near-end and far- end TC (transmit control) sync.
[0026]Frag-side or defrag-side inversion will be selected automatically based on whether the register-based disable has been used to force either end to prohibit FCS inversion. In most circumstances, however, when both ends of a link are capable of both transmit and receive inversion, the links will use the MAC address on either end of the link to determine which unit performs the inversion. The lower MAC address will use FCS inversion on the fragmenter or transmit side, while the higher MAC address will use FCS inversion on the defragmenter or receive side. If the MAC addresses are equal (presuming a loopback), the packet at the fragmenter at the transmit link will have its FCS inverted and the defragmenter packet will be non-inverted.
[0027] In one non-limiting example, the ability and status bits are located in bits 6:4 in the 40th byte of the BACP PDU. Bit 7 typically indicates the proprietary and the far-end loopback detect status bit. Bit 6 advertises the near-end treatment FCS inversion capability. Bit 5 advertises near-end receive FCS inversion capability. Bit 4 indicates whether the current transmission has an inverted FCS (all bits are active-high positive indications). Bits 6 and 5 are set to Ύ for all for firmware employing this code, but can be selectively set to Ό' by the frag_con and defrag__con registers in the EFM (Ethernet in the First Mile) core. [0028] BACP PDU's are employed on a per-link basis to convey timestamp and loopback information. The use of FCS inversion is made on a per-group basis. BACP frames may also be used to assist in identifying misconfigured groups. If, for example, two or more different MAC source addresses (besides the local MAC SA) appear in BACP frames received in the same group, the group may be disabled until the condition passes.
[0029] FIG. 2A shows a generic BACP PDU such as defined in the G.998-2 amendment 2 and showing the BACP POU header and a variable number of TLVs and the Ethernet FCS. The BACP PDU header is fixed followed by the variable number of TLVs.
[0030] FIG. 2B shows a BACP header as a slow protocol sub-type. Organizations may extend this protocol by including additional TLV information in the BACP PDU. This recommendation does not restrict or control organization-specific TLVs. They are controlled by the organization identified within the TLV. The format of an organization- specific TLV is shown in FIG. 2C. the organization-specific TLVs can be included in any BACP PDU. They can be any length. An OUI is used to identify the organization that specified the syntax and semantics of the rest of the value field of the TLV.
[0031] FIG. 3 illustrates a high-level flowchart illustrating an example method that could be used for the inverted FCS functionality. The process begins by receiving data packets within a bonding engine (block 40). The data packets are fragmented into a plurality of packet fragments for communication across a bonded group of links, each of which is a logical representation of a physical subscriber line (block 42). A Frame Check Sequence (FCS) is inverted in the data packet on one direction of the bonding group (block 44) if the link terminals support inversion and have negotiated in this direction as explained above. The data packet is transmitted (block 46) and the inversion of the FCS prevents any data packets from propagating towards the network during a loopback condition.
[0032] A determination is made using BACP loopback detection whether there is an offending subscriber line in the bonded group (block 48). If so, the offending subscriber line is disabled (block 50). If not, the process continues (block 52).
[0033] There now follows details of example components and a communications system that can be used to allow the transmitting of data using the FCS inversion (or other modification) of a packet on a per-group basis, or the modification of each fragment on a per-link basis, or the scrambling of the TC payload on a per-subscriber-line basis, to prevent any data packets from propagating towards the network during a loopback condition. The preferred implementation uses FCS inversion on a per-group basis. This description is only a non-limiting example of the type of components that can be used.
[0034] It should be understood that typically a bonding engine within a network receives a data stream to be communicated to a customer premises (CP) and divides the data across subscriber lines extending from a network facility (e.g., a central office facility) to the customer premises. A bonding engine at the customer premises receives the data from the multiple subscriber lines and reassembles the data to form the original data stream received and divided by the network bonding engine. Similarly, a data stream to be communicated from the customer premises through the network is received by the CP bonding engine, which divides the data across the multiple subscriber lines. The network bonding engine receives such data and reassembles the data to form the original data stream received and divided by the CP bonding engine.
[0035] In a network facility, such as the central office, subscriber lines are terminated by circuitry residing on a "line card" typically a printed circuit board as part of a rack mounted module. There can be as many as several thousand line cards at one facility. These line cards are typically held in slots of several chassis. Each line card is also typically interfaced with a chassis backplane that enables the line card to communicate with various network devices and other equipment. An example chassis includes a SAP from ADTRAN, INC., e.g., a TA5000.
[0036] FIG. 4 is a non-limiting example of a communications system 100 that can use the Inverted FCS or scrambling as described above. The system 100 includes a network 102, such as the Public Switched Telephone Network (PSTN) or Internet, that routes data. A network facility, such as a central office (CO) 104, receives from the network 102 data destined for equipment or other devices at customer premises (CP) 110 (including bonding engine 110a) and transmits data to the customer premises via a plurality of communication links, such as the illustrated subscriber line pairs 112.
Further, data from the customer premise 110 are received by the central office 104, which interfaces such data with the network for routing. Different protocols may be used for communication between the central office 104 and the customer premises 110, for example, various digital subscriber line (DSL) protocols, such as Asymmetric Digital Subscriber Line (ADSL), ADSL2, VDSL2, High-Bit-rate Digital Subscriber Line (HDSL), HDSL2, HDSL4, Very-high-data-rate Digital Subscriber Line (VDSL), etc. In other embodiments, other types of protocols may be used to communicate data between the central office 104 and the customer premises 110.
[0037] As shown in FIG. 4, the central office 104 includes at least one
telecommunications access module 120, which includes at least one bonding engine 122. This access module includes a transceiver 124 and a processor module 126. The transceiver 124 and processor module 126 could be separate from or integral with the bonding engine 122. The access module could include other components as will be explained in greater detail below, including ports, memory, interfaces and buses.
[0038] The access module 120 typically can be formed as a Physical Medium Entity (P E) with each length terminated at one end via a network PME and the other end via a remote PME at the customer premises. The customer premises would also include a transceiver and typical processors using data processing logic with various customer premises equipment. The customer premises can include different types of processors, various ports, registers, databases, memory and control logic, including various registers and backplane interfaces. The bonding engine could be formed using different configurations, including an ASIC, a processor or a Field Programmable Gate Array.
[0039]As illustrated, a network interface 127 communicates with the network 102. The network bonding engine 122 includes various subcomponents as optional
embodiments, including an FCS inversion/pocket modifier 122a; the fragmenter and defragmenter 122b; and the fragment modifier/scrambler 122c. A transmission convergence (TC) sublayer 128 is located between the network bonding engine and the transceiver 124. A plurality of SCR 124a are shown in dashed lines at the transceiver to indicate that they are optional and attached to the transceiver.
[0040] The transceiver 124 is connected to the various customer premises 110. Only one customer premises is illustrated in detail and the customer premises includes similar components as in the central office, including a processor module 110b and customer premises (CP) bonding engine 110a referred to above. Transmission control sublayer 110c is illustrated. The transceiver connects to optional SCR 110e. Multiple subscriber lines are illustrated and connected to the customer premises. For purposes of illustration, only three subscriber lines are illustrated. It should be understood that a number of customer premises can connect to the transceiver 124. it should be understood that the CP bonding engine 110a and TC sublayer 110c at the customer premises can include subcomponents similar to that of the central office.
[0041] The TC sublayer 128 is the layer in which Ethernet frames or EFM fragments are adapted to transparent data channels such as xDSL In the specific case of EFM (also called "PTM") TC, there is a 65 byte frame with one byte allocated as overhead to assist in declaring whether the link is idle or carrying packets. Another example of a TC is the ATM TC, which uses the 5* byte of the ATM ceil to align the data into ATM ceils at the receiver.
[0042] FIG. 5 is an example of the bonding system components located, for example, at a central office 104. The central office has a plurality of access modules 120a-c that are coupled to and terminate subscriber lines 112a-c. In particular, the access modules have ports 130a-c that are respectively coupled to and interfaced with subscriber lines 112a-c. Each port has a unique address that identifies the port from the other ports of the other access modules. The port addresses may be used to switch data among the modules as will be described in more detail below.
[0043] As shown in FIG. 5, each access module 120a-c has at least one bonding engine 122a-c and at least one processor module 126a-c, which in one example, could be formed as a microprocessor or other controller. The processor module includes registers and associated circuitry, for example, any memory and control logic, which could be separate or part of the processor module. Each access module is coupled to a switch module 133, which switches data between the access modules and the network 102. A provision module 140 is illustrated. In this example, the switch module 133 receives from the network 102 data packets that are destined for equipment at the customer premise. Each data packet includes a header and a data portion. Control and routing information is included in the header, and payload data is included in the data portion. As an example, the header of the data packet may include a destination address identifying a communication device at the customer premises 110 to which the data packet is to be routed, in one non-limiting example, the header includes a Virtual Local Area Network (VLAN) tag. Other types of information may be included in the header, as is known in the art. In an example, the data packets are formed in accordance with Ethernet protocol, but other types of packet protocols may be used in other embodiments.
[0044] For each packet received from the network 102, in this non-limiting example, the switch module 133 transmits the packet to the appropriate access module based on information in the packet's header, such as the destination address or VLAN tag included in the header. In one example embodiment, all of the packets to be carried by the same bonding group (e.g., having the same destination address or VLAN tag) are routed to the same access module, but this is not necessary and routing could be to other access modules. When an original data packet is received by an access module, the bonding engine is configured to fragment the original data packet into a plurality of fragments. Each of the fragments is to be transmitted by a respective one of the subscriber lines of the bonding group. For each packet, control and routing information is included in the header, and payload data is included in the data portion. As an example, the header may identify the port address of the port 130a-c that is coupled to the subscriber line 112a-c that is to carry the packet fragment.
[0045] One or more of the subscriber lines 112a-c of a bonding group may be coupled to and terminated by the same access module on which the group's bonding engine resides. In that example, it is unnecessary for the fragments carried by such subscriber line to be transmitted through the switch module 133. When a bonding engine such as at 122a provides a fragment to be carried by its respective subscriber line 112a, the fragment is transmitted directly to the port 130a coupled directly to such subscriber line without being communicated through the switch module 133. However, fragments provided by the bonding engine 122a to be earned by subscriber lines 112b-c terminated by other modules 120b-c are transmitted to the switch module 133. For each such fragment, the switch module 133 analyzes the fragment's header, and based on the port address of such fragment, transmits the fragment to the access module 120b-c on which the identified port 130b-c resides. Thus, any of the bonding engines can bond any of the subscriber lines 112 regardless of whether a given subscriber line is terminated by the same access module on which the bonding engine resides.
[0046] For example, if provisioning, the provision module 140 operates together with the various access modules and switch module 133 to provision certain ports to form a bonding group by assessing the number of available subscriber line pairs that can be used and then adapting the maximum fragmentation size based on the line pairs. This fragmentation size is maintained as long as a line pair does not go out of service. If a line pair, such as perhaps on bonding engine 122b goes out of service, the
fragmentation size is adjusted and the switch module operates to switch packets among the different ports. It is possible after provisioning to adapt dynamically the fragment size of a packet-by-packet basis. Thus, the provision module 140 is configured to provision the access modules together with the operation of the switch module and control the bonding process performed by access modules in a desired manner.
[0047] Each access module 120a-c includes different hardware components configured to terminate and drive the subscriber lines 112a-c terminated by the access modules. These access modules may include, however, software, firmware, and/or other hardware for performing other functions. FIG. 6 is an example embodiment of an access module 120, which includes control logic 152 implemented in software and stored in a memory 155. The control logic 152, when implemented in software, can be stored and transported on any computer-readable medium for use by or in connection with an instruction execution apparatus that can fetch and execute instructions.
[0048] This example embodiment of the access module 120 includes the processing module 126 as noted before, for example, a digital signal processor (DSP) or a central processing unit (CPU), that communicates to and drives the other elements within the module 120 via a local interface 166, which can include at least one bus. For example, when the control logic 152 is implemented in software, the processing module 126 retrieves and executes instructions of the control logic 152. The processing module includes appropriate registers 127 in this example.
[0049] Furthermore, the access module 120 in one example includes a Field
Programmable Gate Array (FPGA) 168 for implementing hardware portions of the module, such as the module's bonding engine 122 if such engine is implemented in hardware. The access module 120 also has registers as part of the processor module 126 configured to store various configuration settings. A backplane interface 175 includes a connector configured to interface the access module 120 with a backplane of a chassis (not shown) as will be described in more detail below. A fragmentation buffer 172 holds packet fragments.
[0050] The registers 127 as part of the processor module 126 store various
configuration settings, which preferably specify how various data packets and/or fragments are to be processed. For example, the configuration settings may indicate which of the bonding engines 122a-c receive a fragment from a particular subscriber line 112a-c terminated by an access module 122a-c. Further, the configuration settings may indicate how fragments received from a bonding group or link on another access module are to be processed.
[0051] For example, the configuration settings may correlate the destination addresses or VLAN tags of data packets from the network 102 with port addresses. A bonding engine 122 residing on the module 120 may use the configuration settings to allocate fragments across the subscriber lines 112 of a bonding group. For example, the bonding engine 122 uses port addresses when fragmenting a data packet having the foregoing VLAN tag as described. The bonding engine 22 selects from the correlated port addresses for insertion into the fragment headers. Thus, the fragments from the data packet are transmitted to and earned by the subscriber lines of the bonding group.
[0052] The port addresses inserted into the fragment headers are used by the switch module 133 to switch the fragments. As described above, a group's bonding engine 122, based on the configuration settings in the registers of the processor module 126 and inserts a respective port address into the header of each fragment. Some of the fragments may be carried by "local" subscriber lines, and some of the fragments may be carried by "external" subscriber lines. A subscriber line is typically "local" relative to a particular access module 122 if it is coupled to a port on the access module such that the subscriber line is terminated by circuitry on that access module. On the other hand, a subscriber line is "external" relative to a particular access module if it is not terminated by that particular access module. [0053] The switch module 133 as illustrated in FIG. 5 includes various components, including a local interface 200 and processing module 202, memory 204, control logic 206, a Field Programmable Gate Array (FPGA) 208, network interface 210, registers 203 as part of the processing module 202 and backplane interface 212 connected by various buses or local interface. The registers 203 could be separate from the processing module. The control logic 206 can be implemented in software and stored in memory and stored and transported on a computer-readable medium similar to the access module components, the processing module could be formed as a Digital Signal Processor (DSP) or a Central Processing Unit (CPU) that communicates to and drives other elements within the switch module 33 using the local interface such as at least one bus. The processing module 202 can retrieve and execute instructions of the control logic 206. The associated registers 203 are used in one example for storing various configuration settings. The backplane interface 212 includes a connector for interfacing the module with the backplane of a chassis (not shown). The FPGA 208 performs switching operations in one non-limiting example. It is possible that this switch module 133 could have a network interface coupled to a network connection such as a fiber optic cable. Configuration settings in the various registers 203 would indicate how data from a network would be switched. For example, a fragment could be received from an access module 120 and the FPGA would consult registers using the port address in the fragment's header and based on that information determine which of the modules is to receive the packet.
[0054] The provision module 140 is similarly configured with an appropriate processor module 230, registers 231, memory 232, control logic 234, line data 236 and a local interface 238 through a backplane interface 240. Provisioning requests are received into the provision module, which operates with the various access modules 120 and switch module 133, for example, at the central office 104. Any data packets received from the network 102 could have VLAN tags in their headers. Any registers could indicate where the packets are to be transmitted based on their VLAN tags.
[0055] In one non-limiting example shown in FIG. 7, the switch module 133, three access modules 122a-c, and the provision module 140 are respectively inserted into slots of a chassis 252, but any number of such modules can be inserted. Each of the subscriber lines 112a-c is coupled to a subscriber line interface 256 mounted on the chassis 252. In this embodiment, the subscriber line interface 256 interfaces the subscriber lines with a chassis backplane, which couples the subscriber lines to the access modules. The chassis backplane also couples each access module and provision module to the switch module 133. In this regard, the backplane comprises a plurality of conductive connections (e.g., copper traces) for conductively coupling the subscriber lines 112a-c and the access modules 120a-c, and provision module 140 to the switch module 133. The chassis backplane is conductively coupled to the backplane interface 175 of each access module (FIG. 5), the backplane interface 212 of the switch module 133, and the backplane interface 240 of the provision module 140.
[0056] A network connection 263, such as a fiber optic cable, for example, carrying a high-speed data stream is coupled to the switch module 133. If the network connection 263 is indeed fiber optic, the switch module 133 may include a fiberoptic transceiver (not shown) to convert optical signals from the connection 263 into electrical signals and for converting electrical signals from the switch module 133 into optical signals.
[0057] The network connection 263 in another example may be coupled to the switch module 133 through the chassis backplane 264, and/or the subscriber lines and may be coupled directly to the access modules similar to how the network connection 263 is coupled directly to the switch module 133 (FIG. 8).
[0058] The provision module 140 is configured to provision the configuration settings of the different registers of the access modules 120 and any registers of the switch module 133. In this regard, the control logic of the provision module receives a provision request indicative of a bonding group to be added. For example, the provision request may include the port address of each port that is to be coupled to a subscriber line of a particular bonding group.
[0059]Although the description relative to the components shown in FIGS. 4-8 are non- limiting embodiments of a communications system that includes various access modules and components that can be used to implement FCS inversion or scrambling as described above, it should be understood that any different types of bonding systems can be used as non-limiting examples and as suggested by those skilled in the art. Only high-level components are illustrated because numerous and different variations of network systems and arrangements of components can be used to implement any necessary algorithms.
[0060] Many modifications and other embodiments of the invention will come to the mind of one skilled in the art having the benefit of the teachings presented in the foregoing descriptions and the associated drawings. Therefore, it is understood that the invention is not to be limited to the specific embodiments disclosed, and that
modifications and embodiments are intended to be included within the scope of the appended claims.

Claims

THAT WHICH IS CLAIMED IS:
1. A method of transmitting data, comprising:
receiving data packets within a bonding engine;
fragmenting the data packets into a plurality of packet fragments for
communication across a bonded group of subscriber lines; and
inverting a frame check sequence (FCS) in the data packet on one direction of the bonding group to prevent any data packets from propagating towards the network during a loopback condition.
2. The method according to Claim 1 , wherein any data packets fed back inadvertently will fail an FCS check within a defragmenter at the bonding engine.
3. The method according to Claim 1 , and further comprising disabling an offending subscriber line in the bonded group after determining the offending subscriber line using a bonding aggregation control protocol (BACP) loopback detection.
4. The method according to Claim 3, and further comprising transmitting a BACP protocol data unit (PDU) having at least one additional bit indicating the ability to send and receive an inverted FCS.
5. The method according to Claim 3, and further comprising transmitting at least one additional bit in the BACP PDU indicating the status of whether packets transmitted by a front end bonding engine were sent with inverted FCS.
6. The method according to Claim 1 , and further comprising detecting the ability of a far-end bonding engine to send and receive packets with an inverted FCS and negotiate which near-end or far-end bonding engine will transmit packets with an inverted FCS.
7. The method according to Claim 1 , and further comprising transmitting packets having an inverted FCS from a link having a lower MAC address when the links on both ends of the bonding group support FCS inversion.
8. A method of transmitting data, comprising:
receiving data packets within a bonding engine;
fragmenting the data packets into a plurality of packet fragments for
communication across a bonded group of subscriber lines; and
scrambling each fragment on a per-link basis to prevent any data packets from propagating towards the network during a loopback condition.
9. The method according to Claim 8, and further comprising negotiating any scrambling settings across a link group with overhead.
10. The method according to Claim 8, and further comprising scrambling at a link interface.
11. A communications system, comprising:
a bonding engine that receives packet data and bonds subscriber line pairs together to form a bonded group over which packet fragments are transmitted and further comprising a packet fragmenter configured to fragment the data packets into a plurality of packet fragments for communication across the bonded group of subscriber lines and invert a frame check sequence (FCS) within a data packet of the bonding group to prevent any data packets from propagating towards the network; and
a transceiver configured to receive the packet fragments from the bonding engine and transmit the packet fragments over the communications subscriber line pairs that form the bonding group during a loopback condition.
12. The communications system according to Claim 11 , and further comprising a defragmenter at the bonding engine wherein any data packets fed back inadvertently will fail an FCS check within the defragmenter.
13. The communications system according to Claim 11 , wherein said bonding engine is configured to disable an offending subscriber line in the bonded group after the offending subscriber line has been determined using a bonding aggregation control protocol (BACP) loopback detection.
14. The communications system according to Claim 13, wherein said bonding engine is configured to add at least one additional bit into a BACP protocol data unit (PDU) indicating the ability to send and receive an inverted FCS.
15. The communications system according to Claim 13, wherein said bonding engine is configured to add at least one additional bit in the BACP PDU indicating the status of whether packets transmitted by a front end bonding engine were sent with inverted FCS.
16. The communications system according to Claim 11 , and further comprising a processor operative with the network bonding engine and transceiver and configured to detect the ability of a far-end bonding engine to send and receive packets with an inverted FCS and negotiate which near-end or far-end bonding engine will transmit packets with an inverted FCS.
17. The communications system according to Claim 11 , and further comprising a near-end link and far-end link and wherein said processor is configured to select a link having a lower MAC address when the both the far-end and near-end links of the bonding group support FCS inversion.
18. A communications system, comprising: a bonding engine that receives packet data and bonds subscriber line pairs together to form a bonded group over which packet fragments are transmitted and further comprising a packet fragmenter configured to fragment the data packets into a plurality of packet fragments for communication across the bonded group of subscriber lines;
a scrambler configured to receive and scramble each fragment on a per-link basis to prevent any data packets from propagating towards the network; and
a transceiver configured to receive the packet fragments from the bonding engine and transmit the packet fragments over the communications subscriber line pairs that form the bonding group during a loopback condition.
19. The communications system according to Claim 18, wherein said scrambler is configured to negotiate any scrambling setting across a link group with overhead.
20. The communications system according to Claim 18, and further comprising a link interface and said scrambler is located at said link interface.
PCT/US2012/027096 2011-03-01 2012-02-29 Bonding engine configured to prevent data packet feedback during a loopback condition WO2012118885A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US13/037,477 US9094174B2 (en) 2011-03-01 2011-03-01 Bonding engine configured to prevent data packet feedback during a loopback condition
US13/037,477 2011-03-01

Publications (1)

Publication Number Publication Date
WO2012118885A1 true WO2012118885A1 (en) 2012-09-07

Family

ID=45815998

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2012/027096 WO2012118885A1 (en) 2011-03-01 2012-02-29 Bonding engine configured to prevent data packet feedback during a loopback condition

Country Status (2)

Country Link
US (1) US9094174B2 (en)
WO (1) WO2012118885A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH1117661A (en) * 1997-06-26 1999-01-22 Toshiba Corp Data transmitter
US6717941B1 (en) * 1999-12-07 2004-04-06 Advanced Micro Devices, Inc. Method and apparatus for early termination of frame data
WO2009022272A2 (en) * 2007-08-16 2009-02-19 Nxp B.V. System and method providing fault detection capability
US20100027557A1 (en) * 2008-07-30 2010-02-04 Mcgarry Michael P Systems and Methods for Allocating Bonding Engines in Network Communications

Family Cites Families (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5901205A (en) 1996-12-23 1999-05-04 Paradyne Corporation Adaptive voice and data bandwidth management system for multiple-line digital subscriber loop data communications
US6563821B1 (en) 1997-11-14 2003-05-13 Multi-Tech Systems, Inc. Channel bonding in a remote communications server system
US7035323B1 (en) 1999-08-02 2006-04-25 Globespan, Inc. System and method for combining multiple digital subscriber line transceivers
US6507608B1 (en) 2000-02-23 2003-01-14 2Wire, Inc. Multi-line ADSL modulation
JP3480444B2 (en) * 2000-12-26 2003-12-22 日本電気株式会社 GFP frame transfer device and GFP frame transfer method
US7349401B2 (en) 2001-09-05 2008-03-25 Symmetricom, Inc. Bonded G.shdsl links for ATM backhaul applications
WO2003032555A2 (en) 2001-10-05 2003-04-17 Aware, Inc. Systems and methods for multi-pair atm over dsl
US7535929B2 (en) 2001-10-25 2009-05-19 Sandeep Singhai System and method for token-based PPP fragment scheduling
US7310310B1 (en) * 2001-11-07 2007-12-18 Symmetricom, Inc. Multi-link SAR for bonding ATM cell-streams
US7106760B1 (en) 2002-03-29 2006-09-12 Centillium Communications, Inc. Channel bonding in SHDSL systems
WO2003105352A2 (en) 2002-06-07 2003-12-18 Tokyo Electron Limited A method and system for providing window shaping for multiline transmission in a communications system
US7099426B1 (en) 2002-09-03 2006-08-29 Xilinx, Inc. Flexible channel bonding and clock correction operations on a multi-block data path
US7289434B2 (en) * 2002-12-05 2007-10-30 Cisco Technology, Inc. Method for verifying function of redundant standby packet forwarder
US20040109546A1 (en) 2002-12-05 2004-06-10 Fishman Ilya M. Method and system for transmitting spectrally bonded signals via telephone cables
US7298705B2 (en) * 2003-02-05 2007-11-20 Broadcom Corporation Fast-path implementation for a double tagging loopback engine
US7295639B1 (en) 2003-07-18 2007-11-13 Xilinx, Inc. Distributed adaptive channel bonding control for improved tolerance of inter-channel skew
US7421014B2 (en) 2003-09-11 2008-09-02 Xilinx, Inc. Channel bonding of a plurality of multi-gigabit transceivers
US7639596B2 (en) 2003-12-07 2009-12-29 Adaptive Spectrum And Signal Alignment, Inc. High speed multiple loop DSL system
US7570662B2 (en) 2004-09-21 2009-08-04 Cisco Technology, Inc. System and method for multiplexing, fragmenting, and interleaving in a communications environment
US7970010B2 (en) 2004-12-10 2011-06-28 Broadcom Corporation Upstream channel bonding in a cable communications system
US7609642B2 (en) 2005-09-12 2009-10-27 Computer Associates Think, Inc, Detecting network interfaces capable of channel bonding
US7983295B2 (en) 2005-10-28 2011-07-19 Broadcom Corporation Optimizing packet queues for channel bonding over a plurality of downstream channels of a communications management system
US20070129065A1 (en) * 2005-12-05 2007-06-07 Justin Divis System and method for providing advertising using a communication network for mobile phones
KR100782844B1 (en) 2006-01-12 2007-12-06 삼성전자주식회사 Method and apparatus for transmitting data frame using channel bonding in wireless LAN
US20070183415A1 (en) * 2006-02-03 2007-08-09 Utstarcom Incorporated Method and system for internal data loop back in a high data rate switch
JP4651555B2 (en) * 2006-02-13 2011-03-16 富士通株式会社 Frame buffer monitoring method and apparatus
US7573834B2 (en) 2006-05-31 2009-08-11 Alcatel Lucent Method and system for allocating a group bit rate among multiple bonded pairs in a communications network
KR100942131B1 (en) 2007-11-27 2010-02-16 한국전자통신연구원 Method and apparatus of transmitting resource-request for using efficiently service-identifiersid resource in cable modem system supporting upstream channel-bonding
US8446817B2 (en) * 2010-01-19 2013-05-21 Cisco Technology, Inc. Distributed virtual fibre channel over Ethernet forwarder

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH1117661A (en) * 1997-06-26 1999-01-22 Toshiba Corp Data transmitter
US6717941B1 (en) * 1999-12-07 2004-04-06 Advanced Micro Devices, Inc. Method and apparatus for early termination of frame data
WO2009022272A2 (en) * 2007-08-16 2009-02-19 Nxp B.V. System and method providing fault detection capability
US20100027557A1 (en) * 2008-07-30 2010-02-04 Mcgarry Michael P Systems and Methods for Allocating Bonding Engines in Network Communications

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"Ethernet-based multi-pair bonding; G.998.2 (2005) Amendment 2 (12/07)", ITU-T STANDARD, INTERNATIONAL TELECOMMUNICATION UNION, GENEVA ; CH, no. G.998.2 (2005) Amendment 2 (12/07), 7 December 2007 (2007-12-07), pages 1 - 26, XP017466684 *

Also Published As

Publication number Publication date
US9094174B2 (en) 2015-07-28
US20120224573A1 (en) 2012-09-06

Similar Documents

Publication Publication Date Title
US6072803A (en) Automatic communication protocol detection system and method for network systems
EP2457357B1 (en) Connection device authentication
US20100290461A1 (en) Mac to phy interface apparatus and methods for transmission of packets through a communications network
KR101355062B1 (en) Method and system for low-latency networking
US20050169311A1 (en) Supplementary header for multifabric and high port count switch support in a fibre channel network
US8837508B2 (en) Systems and methods for allocating bonding engines in network communications
EP0685951A2 (en) Line interface devices for fast-packet networks
US7602724B2 (en) Method and apparatus for transmitting circuitry that transmit data at different rates
WO2007107066A1 (en) A method and a communication device of the loopbacked detection based on ethernet
KR20060042394A (en) Subscriber unit redundant system and subscriber unit redundant method
EP1499066B1 (en) Method for setting up a connection
US9118500B1 (en) Communications system with bonding engine configured for maximum packet fragment size as adapted to communications line pairs and related method
US6690670B1 (en) System and method for transmission between ATM layer devices and PHY layer devices over a serial bus
US9094174B2 (en) Bonding engine configured to prevent data packet feedback during a loopback condition
US7088722B1 (en) Method and system for controlling flow of multiplexed data
JP4970543B2 (en) Interface with multi-level packet preemption based on balancing start and end indicators
Cisco Release Notes for Cisco IOS Release 11.2(1)P through 11.2(7)P
Cisco Release Notes for Cisco IOS Release 11.2 P
Cisco Release Notes for Cisco IOS Release 11.2 P
Cisco Release Notes for Cisco IOS Release 11.2 P
Cisco Release Notes for Cisco IOS Release 11.2 P
US10122641B1 (en) Systems and methods for bonding multiple data links with differential delay
US8908500B1 (en) Systems and methods for protecting bonding engines in network communications
JP2004289744A (en) Multiport switch
US9451338B2 (en) Line card with network processing device and data pump device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12708471

Country of ref document: EP

Kind code of ref document: A1

DPE1 Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101)
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 12708471

Country of ref document: EP

Kind code of ref document: A1