WO2001071975A2 - Methods for identifying connections in a network - Google Patents

Methods for identifying connections in a network Download PDF

Info

Publication number
WO2001071975A2
WO2001071975A2 PCT/IB2001/000435 IB0100435W WO0171975A2 WO 2001071975 A2 WO2001071975 A2 WO 2001071975A2 IB 0100435 W IB0100435 W IB 0100435W WO 0171975 A2 WO0171975 A2 WO 0171975A2
Authority
WO
WIPO (PCT)
Prior art keywords
network
equipment
pieces
elements
piece
Prior art date
Application number
PCT/IB2001/000435
Other languages
French (fr)
Other versions
WO2001071975A9 (en
WO2001071975A3 (en
Inventor
Joshua Klipper
Aviv Prital
Original Assignee
Adc Telecommunications Israel Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Adc Telecommunications Israel Ltd. filed Critical Adc Telecommunications Israel Ltd.
Priority to IL15160601A priority Critical patent/IL151606A0/en
Priority to AU2001244430A priority patent/AU2001244430A1/en
Publication of WO2001071975A2 publication Critical patent/WO2001071975A2/en
Publication of WO2001071975A3 publication Critical patent/WO2001071975A3/en
Publication of WO2001071975A9 publication Critical patent/WO2001071975A9/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/12Discovery or management of network topologies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q11/00Selecting arrangements for multiplex systems
    • H04Q11/04Selecting arrangements for multiplex systems for time-division multiplexing
    • H04Q11/0428Integrated services digital network, i.e. systems for transmission of different types of digitised signals, e.g. speech, data, telecentral, television signals
    • H04Q11/0478Provisions for broadband connections
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04JMULTIPLEX COMMUNICATION
    • H04J2203/00Aspects of optical multiplex systems other than those covered by H04J14/05 and H04J14/07
    • H04J2203/0001Provisions for broadband connections in integrated services digital network using frames of the Optical Transport Network [OTN] or using synchronous transfer mode [STM], e.g. SONET, SDH
    • H04J2203/0057Operations, administration and maintenance [OAM]
    • H04J2203/0058Network management, e.g. Intelligent nets
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04JMULTIPLEX COMMUNICATION
    • H04J2203/00Aspects of optical multiplex systems other than those covered by H04J14/05 and H04J14/07
    • H04J2203/0001Provisions for broadband connections in integrated services digital network using frames of the Optical Transport Network [OTN] or using synchronous transfer mode [STM], e.g. SONET, SDH
    • H04J2203/0057Operations, administration and maintenance [OAM]
    • H04J2203/006Fault tolerance and recovery

Definitions

  • the technical field relates generally to networks. More particularly, it pertains to learning of undesired couplings between elements in networks.
  • This access network defines a star topology because the access network includes multiple elements (customers) connecting to a single switching office.
  • Modern access networks have grown beyond wires to include fiber optic cables to accommodate the transmission of video and other types of data. Whereas older networks coupled by wires are better suited for simpler topologies, such as point-to-point and star topologies, modern networks using fiber optic cables tend toward a ring topology since the ring topology offers many benefits, such as lower insertion loss associated with the addition of network taps.
  • it can be difficult for an installer to properly connect networks using fiber optic cables in a ring topology. The reason for the difficulty is because a ring topology may include multiple rings. A probability exists that an installer will couple a network element from one ring to a network element in another ring. Such an installation may render the access network inoperable, and would eventually lead to customers' frustration and expensive repairs.
  • An illustrative aspect includes a system to enhance network configuration.
  • the system comprises a network.
  • the network includes at least two pieces of equipment. One of the at least two pieces of equipment is coupled to the other of the at least two pieces of equipment.
  • the system further comprises a network manager to manage the network.
  • the network manager generates a report.
  • the report is indicative of physical interconnections of the at least two pieces of equipment. The report is available before the network is configured and can be used to identify improper physical interconnection.
  • the data structure comprises at least one data member interface to represent a coupling relationship between at least two pieces of equipment.
  • the data member interface includes a data member system to represent a system in a network, a data member cage to represent a cage in the system, and a data member slot to represent a slot in the cage.
  • Another illustrative aspect of the present invention includes a method for enhancing network configuration. The method includes an act for identifying a physical relationship between at least two elements in a network. The method also includes an act for presenting the relationship so as to allow for identification of an undesired relationship between the at least two elements in the network.
  • Figure 1 is a block diagram of a system according to one aspect of the present invention.
  • Figure 2 is a structure diagram of a data structure according to one aspect of the present invention.
  • Figure 3 is a process diagram of a method according to one aspect of the present invention.
  • FIGS 4A-4C illustrate tabular and pictorial diagrams of data according to one aspect of the present invention.
  • the embodiments of the present invention focus on enhancing network configuration by learning about the physical coupling between at least two elements on the network so as to ascertain whether undesired physical couplings exist.
  • modern networks have built-in capabilities to generate alarms if undesired conditions exist in various layers of the network, it is difficult to generate such alarms at the lowest layer of the network— the physical layer— because the network cannot distinguish between a desired physical connection and an undesired physical connection.
  • the trace byte is part of the overhead of a network to identify improper connections at the physical layer.
  • the trace byte can be used only after the network is configured.
  • the network may or may not generate alarms or may generate misleading alarms regarding improper connections upon powering- up of the entire network.
  • Some of the alarms that may not be generated include Loss of Frame (LOF) or Loss of Pointer (LOP).
  • the embodiments of the present invention attempt to learn about the physical coupling relationship between each element on the network prior to configuration. This information is then presented to the operator of the network to help the operator quickly identify any installation problems. The discussion of the embodiments of the present invention is now presented below.
  • FIG. 1 is a block diagram of a system according to one aspect of the present invention.
  • System 100 includes an access network 102.
  • the system 100 includes a switching office 110, and a number of premises, such as premises 104, 106, and 108. These premises include any premises that can house telecommunications equipment.
  • the switching office 110 and premises 104, 106, and 108 include a number of pieces of equipment, such as a piece of equipment HOo-
  • equipment means the inclusion of telecommunications equipment such as access multiplexers or data link controllers, or other devices. In the idiom of telecommunications, a piece of equipment can be called an "element" of the access network 102.
  • the access network 102 is arranged in a topology that includes a ring topology.
  • the access network 102 can be other topologies, such as point-to-point, star, or tree.
  • the ring topology of the access network 102 includes a number of rings.
  • One of the rings includes the piece of equipment 110o, a piece of equipment 104 0 , a fiber optic cable 102 0 that couples the piece of equipment 110 0 and the piece of equipment 104 0 ; a piece of equipment 106o, a fiber optic cable 102 ⁇ that couples the piece of equipment 104 0 and the piece of equipment 106 0 ; a piece of equipment 108 0 , a fiber optic cable 102 2 that couples the piece of equipment 106 0 and the piece of equipment 108 0 ; and a fiber optic cable 102 3 that couples the piece of equipment 108o and the piece of equipment 110 0 .
  • Another ring includes a piece of equipment 110 f , a piece of equipment 104] , a fiber optic cable 102 that couples the piece of equipment 110 1 and the piece of equipment 104 ⁇ ; a piece of equipment 106 ⁇ , a fiber optic cable 102 5 that couples the piece of equipment 104, and the piece of equipment 106] ; a piece of equipment 108 ⁇ , a fiber optic cable 102 6 that couples the piece of equipment 106
  • the switching office 110 may include a network manager that manages the access network 102.
  • the network manager may include a software application for managing the access network 102. Because a possibility exists that an installer may have installed the access network 102 improperly, it is beneficial to identify physical connection for the pieces of equipment in the access network 102. Once this information is obtained, whether the access network 102 is improperly installed can be inferred.
  • the network manager identifies physical connection of the pieces of equipment by sending a test packet down to one of the rings of the access network 102. For illustrative purposes only, suppose the network manager at the switching office 110 sends a test packet from the piece of equipment 110 0 . The test packet will travel along the fiber optic cable 102 0 to the piece of equipment 104 0 .
  • An identification of the piece of equipment 104 0 is recorded.
  • the identification is recorded in the test packet.
  • the test packet then travels along the fiber optic cable 102] to arrive at the piece of equipment 106 0 .
  • the piece of equipment 106o is also recorded. In one embodiment, this is recorded in the test packet.
  • the test packet then travels the fiber optic cable 102 2 to arrive at the piece of equipment 108 0 .
  • the piece of equipment 108 0 is also recorded. In one embodiment, this is recorded in the test packet.
  • the test packet travels along the fiber optic cable 102 3 to arrive back at the piece of equipment 110 0 .
  • Each of the pieces of equipment visited by the test packet is recorded and is analyzed by the network manager.
  • the recorded pieces of equipment define a route taken by the test packet. If the route is a route that would form a desired topology, then the route is a desired route describing desired couplings or relationships between the pieces of equipment or elements in the access network 102.
  • the system 100 includes a toll office 122 (or a tandem office).
  • the toll office 122 is coupled to the switch office 110 through a toll connecting trunk 122 0 .
  • the toll office 122 is also coupled to another switch office 120 through another toll connecting trunk 122] .
  • the switch office 120 is part of an access network 112.
  • the access network 112 includes a number of premises, such as premises 114, 116, and 118.
  • the access network 112 is arranged in a topology that includes a ring topology. However, the access network 112 includes a defective ring topology due to improper installation.
  • One of the rings includes the piece of equipment 120 0 , a piece of equipment 118 0 , a fiber optic cable 112 0 that couples the piece of equipment 120 0 and the piece of equipment 1 18 0 ; a piece of equipment 116 0 , a fiber optic cable 112
  • Another ring includes a piece of equipment 120 ⁇ , a piece of equipment 114
  • the switching office 120 may include a network manager that manages the access network 112.
  • the network manager at the switching office 120 sends a test packet from the piece of equipment 120 0 .
  • the test packet will travel along the fiber optic cable 112 0 to the piece of equipment 118 0 .
  • the piece of equipment 118 0 is recorded.
  • the test packet then travels along the fiber optic cable 112, to arrive at the piece of equipment 116Q. This is also recorded.
  • the test packet then travels the fiber optic cable 112 6 to arrive at the piece of equipment 118, . This is also recorded.
  • the test packet travels along the fiber optic cable 112 7 to arrive at the piece of equipment 110] .
  • the identify of each of pieces of equipment is recorded in the test packet.
  • the identity of each of the positions or pieces of equipment visited by the test packet is then sent to the network manager for analysis. Because the route of the test packet does not form a desired topology, there are undesired couplings or relationships between the pieces of equipment or elements in the access network 112. The precise locations of the undesired couplings may be obtained by studying the route of the test packet.
  • the access network 102 may be considered a fiber optic network because the access network 102 comprises pieces of equipment interconnected by the plurality of fiber optic cables 102 0 , 102, , 102 2 , 102 , 102 4 , 102 5 , 102 6 , and 102 7 .
  • the access network 102 includes an optical time division multiplexing network.
  • the optical time division multiplexing network includes a Synchronous Optical Network (SONET).
  • SONET Synchronous Optical Network
  • the optical time division multiplexing network includes a Synchronous Digital Hierarchy network (SDH). These rings may send information in one direction only (the direction of the arrow as shown).
  • the ring topology of the access network 102 includes a counter-rotating dual-ring topology.
  • Another equivalent term for the access network 102 includes "the local loop.”
  • Other equivalent terms for the switching office 110 include “end office” and "local central office.”
  • Figure 2 is a structure diagram of a data structure according to one aspect of the present invention.
  • the structure 200 includes a data member interface 202.
  • the data member interface 202 represents a coupling relationship between at least two pieces of equipment in a network.
  • the data member interface 202 includes a data member system 204.
  • the data member system 204 represents a piece of equipment or an element on a network.
  • the data member interface 202 includes a data member cage 206.
  • the data member cage 206 represents a particular hardware cage in the system as represented by the data member system 204.
  • the data member interface 202 includes a data member slot 208.
  • the data member slot 208 represents a particular slot in the hardware cage in the system.
  • each piece of equipment in a network includes a number of connections, such as an output connection and an input connection.
  • the structure 200 may be instantiated twice.
  • the first instantiation is to represent the output connection and the second instantiation is to represent the input connection.
  • the data members system, cage, and slot of the first instantiation contain information about another piece of equipment on the network to which a packet will be forwarded.
  • the data members system, cage, and slot of the second instantiation contain information about another piece of equipment on the network from which a packet will be received.
  • FIG. 3 is a process diagram of a method according to one aspect of the present invention.
  • the process 300 includes an act 302 for identifying a relationship between at least two elements in a network.
  • the act of identifying 302 includes an act of recording an identification of equipment or network element as a packet travels from one element to another element on the network.
  • the act of identifying 302 includes an act of forming a route from the result of the act of recording. In one embodiment the act of forming a route uses the information recorded in the packet.
  • the route defines a relationship between at least two elements on the network.
  • the act of identifying 302 includes an act of determining if the route is an undesired route. If the route is an undesired route, then the relationship between the at least two elements on the network includes an undesired relationship.
  • the act of identifying 302 includes an act 304 for storing an identification of an element in a packet that travels from one element to another element on a network.
  • the act of storing 304 may store a number of identifications as the packet travels. This set of identifications defines a route. If the route is an undesired route, then the relationship between the at least two elements on the network includes an undesired relationship.
  • the act of identifing 302 is executed through a software application running on a Data Communication Channel of a network.
  • the network is selected from a group consisting of a Synchronous Optical Network and a Synchronous Digital Hierarchy network.
  • the act of identifying 302 can be iterated.
  • the act of identifying 302 can be iterated until no new relationships among elements on the network is learned with a test packet.
  • the process 300 includes an act 306 for presenting the relationship so as to allow identification of an undesired relationship between at least two elements on the network.
  • the act of presenting 306 includes presenting the information in a tabular format or in a pictorial format.
  • Figures 4A-4C illustrate tabular and pictorial diagrams of data according to one aspect of the present invention.
  • Figure 4 A illustrates a tabular diagram 400 A.
  • the tabular diagram 400A can be formed and presented to a user after at least one relationship between two elements on a network is learned. The user can use the tabular diagram 400A to determine if an undesired coupling exists between at least two elements on the network.
  • the tabular diagram 400A includes row 402 A for representing the system.
  • the system includes an element on the network, such as a computer, a telephone, or other devices.
  • the tabular diagram 400A includes row 404 A for representing a cage in the system.
  • the tabular diagram 400A includes row 406A for representing a slot in the cage.
  • the tabular diagram 400A includes a number of columns, such as columns 408 A. Each of these columns represents an element on the network. Column 408 A represents an element 1. Column 408A includes a number of cells, such as cells 408A 0 , 408A
  • column 410A represents an element 2.
  • Column 410A includes a number of cells, such as cells 410A 0 , 410A
  • Column 412A represents an element 3.
  • Column 412A includes a number of cells, such as cells 412A 0 , 412A ⁇ , and 412A 2 .
  • Column 414A represents an element 4.
  • Column 414A includes a number of cells, such as cells 414A 0 , 414A, , and 414A 2 .
  • Figure 4B illustrates a network 400B in a ring topology that has a desired relationship between each element in the network 400B.
  • the network 400B includes a first ring.
  • the first ring includes an interface 408B 0 that is coupled to an interface 410B i .
  • the coupling relationship between the interface 408B 0 and the interface 410B ⁇ is represented by a line 402B 0 .
  • the line 402Bo has an arrowhead illustrating the direction in which packets flow in the first ring of the network 400B.
  • the first ring includes an interface 412B 0 that is coupled to the interface 410B
  • the first ring includes an interface 414B] that is coupled to the interface 412B 0 through the line 402B 2 .
  • the first ring includes a relationship between the interface 414B
  • the network 400B includes a second ring.
  • the second ring includes an interface
  • the second ring includes an interface 412B] that is coupled to the interface 414Bo through the line 402B 5 .
  • the second ring includes an interface 410B 0 that is coupled to the interface 412B ⁇ through the line 402B 6 .
  • the first ring includes a relationship between the interface 410B 0 and the interface 408B) through the line 402B 7 .
  • Figure 4C illustrates a network 400C in a ring topology that has at least one undesired relationship between two elements.
  • the network 400C includes elements similar to Figure 4B. For clarity purposes, the discussion of similar elements as presented above is incorporated here in full.
  • the first undesired relationship includes the coupling between the interface 4 IOC, and 408C ⁇ through the line 402C 7 .
  • the second undesired relationship includes the coupling between the interface 408C] and 4 IOC, through the line 402C 0 .
  • the third undesired relationship includes the coupling between the interface 408C 0 and 414C 0 through the line 402C 4 .
  • the user can use the tabular diagram 400A or the pictorial diagrams 400B and 400C to determine if an undesired coupling exists between at least two elements on the network.
  • the tabular diagram 400A and the pictorial diagrams 400B and 400C also allow the user to determine the location of the undesired coupling.
  • the embodiments of the present invention allow an installer in the field to determine whether there has been an incorrect coupling between two network elements.
  • the embodiments of the present invention pinpoint the position of the problem, and permit the installer to ameliorate the incorrect coupling.
  • the embodiments of the present invention allow such a problem to be corrected early in the installation of a network given that attempts to fix the network after installation may be expensive.
  • the hereinbefore discussion of the embodiments of the present invention focus on a ring topology, but a particular network topology does not limit the embodiments of the present invention, and other types of topology may benefit from the embodiments of the present invention.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Monitoring And Testing Of Transmission In General (AREA)

Abstract

Systems, structures, and methods are discussed that enhance network configuration. Because pieces of equipment on a network may reside over a large area in various premises or buried underground, it is difficult for an installer to determine during the process of installation whether there has been an undesired coupling between at least two elements on the network. The embodiments of the present invention allow an installer to verify in the field whether such an undesired coupling exists, and permit the installer to proceed to fix the problem. The embodiments of the present invention probe the network to form a route of the network and present the route to the installer. If the route is an undesired route, then the network includes at least one undesired coupling between at least two elements. The route can be further analyzed to determine undesired portions of the route. Each undesired portion of the route pinpoints the two elements that are improperly connected to each other.

Description

METHODS FOR IDENTIFYING CONNECTIONS IN A NETWORK
Technical Field The technical field relates generally to networks. More particularly, it pertains to learning of undesired couplings between elements in networks.
Copyright Notice - Permission A portion of the disclosure of this patent document contains material which is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure as it appears in the Patent and Trademark Office patent files or records, but otherwise reserves all copyright rights whatsoever. The following notice applies to the software and data as described below and in the drawings attached hereto: Copyright ® 1999, 2000, ADC Telecommunications Inc., All Rights Reserved.
Background
In 1876, telephones were introduced to the marketplace. They were sold in pairs to customers. To enable a pair of telephones to work, a customer would have to couple a wire between the pair of telephones. In the idiom of telecommunications, the pair of telephones that is coupled by the wire defines a network. And more particularly, that network defines a point-to-point topology because the network includes two interconnected elements, such as the two telephones. Because of the popularity of the telephone, within a year after 1876, cities were strung with wires over houses and trees in a jumble. It became clear that the point-to-point topology would become unfeasible. The opening of the first switching office in New Haven, Connecticut, in
1878 solved the problem. Customers would wire the telephone to the switching office. For one customer to communicate with another, the switching office would connect the two customers together. Thus, multiple customers would be interconnected through a single switching office. The network that is defined by this is known as an access network. More particularly, this access network defines a star topology because the access network includes multiple elements (customers) connecting to a single switching office.
Modern access networks have grown beyond wires to include fiber optic cables to accommodate the transmission of video and other types of data. Whereas older networks coupled by wires are better suited for simpler topologies, such as point-to-point and star topologies, modern networks using fiber optic cables tend toward a ring topology since the ring topology offers many benefits, such as lower insertion loss associated with the addition of network taps. However, it can be difficult for an installer to properly connect networks using fiber optic cables in a ring topology. The reason for the difficulty is because a ring topology may include multiple rings. A probability exists that an installer will couple a network element from one ring to a network element in another ring. Such an installation may render the access network inoperable, and would eventually lead to customers' frustration and expensive repairs.
Thus, what is needed are systems, methods, and structures for learning about network installations so as to inhibit undesired coupling between two network elements.
Summary Systems, methods, and structures that support learning about network installations are discussed. An illustrative aspect includes a system to enhance network configuration. The system comprises a network. The network includes at least two pieces of equipment. One of the at least two pieces of equipment is coupled to the other of the at least two pieces of equipment. The system further comprises a network manager to manage the network. The network manager generates a report. The report is indicative of physical interconnections of the at least two pieces of equipment. The report is available before the network is configured and can be used to identify improper physical interconnection.
Another illustrative aspect of the present invention includes a data strucmre to enhance network configuration. The data structure comprises at least one data member interface to represent a coupling relationship between at least two pieces of equipment. The data member interface includes a data member system to represent a system in a network, a data member cage to represent a cage in the system, and a data member slot to represent a slot in the cage. Another illustrative aspect of the present invention includes a method for enhancing network configuration. The method includes an act for identifying a physical relationship between at least two elements in a network. The method also includes an act for presenting the relationship so as to allow for identification of an undesired relationship between the at least two elements in the network.
Brief Description of the Drawings Figure 1 is a block diagram of a system according to one aspect of the present invention.
Figure 2 is a structure diagram of a data structure according to one aspect of the present invention.
Figure 3 is a process diagram of a method according to one aspect of the present invention.
Figures 4A-4C illustrate tabular and pictorial diagrams of data according to one aspect of the present invention.
Detailed Description In the following detailed description of exemplary embodiments of the invention, reference is made to the accompanying drawings that form a part hereof, and in which is shown, by way of illustration, specific exemplary embodiments in which the invention may be practiced. In the drawings, like numerals describe substantially similar components throughout the several views. These embodiments are described in sufficient detail to enable those skilled in the art to practice the invention. Other embodiments may be utilized and structural, logical, electrical, and other changes may be made without departing from the spirit or scope of the present invention. The following detailed description is, therefore, not to be taken in a limiting sense, and the scope of the present invention is defined only by the appended claims. The embodiments of the present invention focus on enhancing network configuration by learning about the physical coupling between at least two elements on the network so as to ascertain whether undesired physical couplings exist. Although modern networks have built-in capabilities to generate alarms if undesired conditions exist in various layers of the network, it is difficult to generate such alarms at the lowest layer of the network— the physical layer— because the network cannot distinguish between a desired physical connection and an undesired physical connection.
One technique that has been used to detect undesired physical connections is the use of a trace byte. The trace byte is part of the overhead of a network to identify improper connections at the physical layer. However, the trace byte can be used only after the network is configured. Thus, if the network is improperly connected prior to configuration, the network may or may not generate alarms or may generate misleading alarms regarding improper connections upon powering- up of the entire network. Some of the alarms that may not be generated include Loss of Frame (LOF) or Loss of Pointer (LOP).
The embodiments of the present invention attempt to learn about the physical coupling relationship between each element on the network prior to configuration. This information is then presented to the operator of the network to help the operator quickly identify any installation problems. The discussion of the embodiments of the present invention is now presented below.
Figure 1 is a block diagram of a system according to one aspect of the present invention. System 100 includes an access network 102. The system 100 includes a switching office 110, and a number of premises, such as premises 104, 106, and 108. These premises include any premises that can house telecommunications equipment. The switching office 110 and premises 104, 106, and 108 include a number of pieces of equipment, such as a piece of equipment HOo- The term "equipment" means the inclusion of telecommunications equipment such as access multiplexers or data link controllers, or other devices. In the idiom of telecommunications, a piece of equipment can be called an "element" of the access network 102.
The access network 102 is arranged in a topology that includes a ring topology. In various embodiments, the access network 102 can be other topologies, such as point-to-point, star, or tree. The ring topology of the access network 102 includes a number of rings. One of the rings includes the piece of equipment 110o, a piece of equipment 1040, a fiber optic cable 1020 that couples the piece of equipment 1100 and the piece of equipment 1040; a piece of equipment 106o, a fiber optic cable 102ι that couples the piece of equipment 1040 and the piece of equipment 1060; a piece of equipment 1080, a fiber optic cable 1022 that couples the piece of equipment 1060 and the piece of equipment 1080; and a fiber optic cable 1023 that couples the piece of equipment 108o and the piece of equipment 1100. Another ring includes a piece of equipment 110f , a piece of equipment 104] , a fiber optic cable 102 that couples the piece of equipment 1101 and the piece of equipment 104ι; a piece of equipment 106ι, a fiber optic cable 1025 that couples the piece of equipment 104, and the piece of equipment 106] ; a piece of equipment 108ι, a fiber optic cable 1026 that couples the piece of equipment 106| and the piece of equipment 108ι; and a fiber optic cable 1027 that couples the piece of equipment 108ι. and the piece of equipment 110i .
The switching office 110 may include a network manager that manages the access network 102. The network manager may include a software application for managing the access network 102. Because a possibility exists that an installer may have installed the access network 102 improperly, it is beneficial to identify physical connection for the pieces of equipment in the access network 102. Once this information is obtained, whether the access network 102 is improperly installed can be inferred. In one embodiment, the network manager identifies physical connection of the pieces of equipment by sending a test packet down to one of the rings of the access network 102. For illustrative purposes only, suppose the network manager at the switching office 110 sends a test packet from the piece of equipment 1100. The test packet will travel along the fiber optic cable 1020 to the piece of equipment 1040. An identification of the piece of equipment 1040 is recorded. In one embodiment, the identification is recorded in the test packet. The test packet then travels along the fiber optic cable 102] to arrive at the piece of equipment 1060. The piece of equipment 106o is also recorded. In one embodiment, this is recorded in the test packet. The test packet then travels the fiber optic cable 1022 to arrive at the piece of equipment 1080. The piece of equipment 1080 is also recorded. In one embodiment, this is recorded in the test packet. And finally, the test packet travels along the fiber optic cable 1023 to arrive back at the piece of equipment 1100. Each of the pieces of equipment visited by the test packet is recorded and is analyzed by the network manager. The recorded pieces of equipment define a route taken by the test packet. If the route is a route that would form a desired topology, then the route is a desired route describing desired couplings or relationships between the pieces of equipment or elements in the access network 102. The system 100 includes a toll office 122 (or a tandem office). The toll office 122 is coupled to the switch office 110 through a toll connecting trunk 1220. The toll office 122 is also coupled to another switch office 120 through another toll connecting trunk 122] . The switch office 120 is part of an access network 112. The access network 112 includes a number of premises, such as premises 114, 116, and 118. The access network 112 is arranged in a topology that includes a ring topology. However, the access network 112 includes a defective ring topology due to improper installation.
One of the rings includes the piece of equipment 1200, a piece of equipment 1180, a fiber optic cable 1120 that couples the piece of equipment 1200 and the piece of equipment 1 180; a piece of equipment 1160, a fiber optic cable 112| that couples the piece of equipment 1180 and the piece of equipment 1160; a piece of equipment 1140, a fiber optic cable 1122 that incorrectly couples the piece of equipment 116ι and the piece of equipment 1140; and a fiber optic cable 1123 that couples the piece of equipment 1140 and the piece of equipment 1200.
Another ring includes a piece of equipment 120ι, a piece of equipment 114|, a fiber optic cable 1124 that couples the piece of equipment 120, and the piece of equipment 114ι; a piece of equipment 116ι, a fiber optic cable 1125 that couples the piece of equipment 114| and the piece of equipment 116ι ; a piece of equipment 118], a fiber optic cable 1026 that incorrectly couples the piece of equipment 1060 and the piece of equipment 108(; and a fiber optic cable 1127 that couples the piece of equipment 118ι and the piece of equipment 120) .
The switching office 120 may include a network manager that manages the access network 112. For illustrative purposes only, suppose the network manager at the switching office 120 sends a test packet from the piece of equipment 1200. The test packet will travel along the fiber optic cable 1120 to the piece of equipment 1180. The piece of equipment 1180 is recorded. The test packet then travels along the fiber optic cable 112, to arrive at the piece of equipment 116Q. This is also recorded. Because of the improper installation, the test packet then travels the fiber optic cable 1126 to arrive at the piece of equipment 118, . This is also recorded. And finally, the test packet travels along the fiber optic cable 1127 to arrive at the piece of equipment 110] . In one embodiment, the identify of each of pieces of equipment is recorded in the test packet. The identity of each of the positions or pieces of equipment visited by the test packet is then sent to the network manager for analysis. Because the route of the test packet does not form a desired topology, there are undesired couplings or relationships between the pieces of equipment or elements in the access network 112. The precise locations of the undesired couplings may be obtained by studying the route of the test packet.
The access network 102 may be considered a fiber optic network because the access network 102 comprises pieces of equipment interconnected by the plurality of fiber optic cables 1020, 102, , 1022, 102 , 1024, 1025, 1026, and 1027. In one embodiment, the access network 102 includes an optical time division multiplexing network. In another embodiment, the optical time division multiplexing network includes a Synchronous Optical Network (SONET). In another embodiment, the optical time division multiplexing network includes a Synchronous Digital Hierarchy network (SDH). These rings may send information in one direction only (the direction of the arrow as shown). In one embodiment, the ring topology of the access network 102 includes a counter-rotating dual-ring topology. Another equivalent term for the access network 102 includes "the local loop." Other equivalent terms for the switching office 110 include "end office" and "local central office." Figure 2 is a structure diagram of a data structure according to one aspect of the present invention. The structure 200 includes a data member interface 202. The data member interface 202 represents a coupling relationship between at least two pieces of equipment in a network. The data member interface 202 includes a data member system 204. The data member system 204 represents a piece of equipment or an element on a network. The data member interface 202 includes a data member cage 206. The data member cage 206 represents a particular hardware cage in the system as represented by the data member system 204. The data member interface 202 includes a data member slot 208. The data member slot 208 represents a particular slot in the hardware cage in the system.
Typically, each piece of equipment in a network includes a number of connections, such as an output connection and an input connection. Thus, the structure 200 may be instantiated twice. The first instantiation is to represent the output connection and the second instantiation is to represent the input connection. The data members system, cage, and slot of the first instantiation contain information about another piece of equipment on the network to which a packet will be forwarded. The data members system, cage, and slot of the second instantiation contain information about another piece of equipment on the network from which a packet will be received.
The structure 200 can be instantiated iteratively to contain all the couplings or relationships between pieces of equipment or elements in a network. Such information stored in the structure 200 can then be presented in various formats, such as tabular formats or pictorial formats. Figure 3 is a process diagram of a method according to one aspect of the present invention. The process 300 includes an act 302 for identifying a relationship between at least two elements in a network. The act of identifying 302 includes an act of recording an identification of equipment or network element as a packet travels from one element to another element on the network. The act of identifying 302 includes an act of forming a route from the result of the act of recording. In one embodiment the act of forming a route uses the information recorded in the packet. In one embodiment, the route defines a relationship between at least two elements on the network. The act of identifying 302 includes an act of determining if the route is an undesired route. If the route is an undesired route, then the relationship between the at least two elements on the network includes an undesired relationship.
In another embodiment, the act of identifying 302 includes an act 304 for storing an identification of an element in a packet that travels from one element to another element on a network. The act of storing 304 may store a number of identifications as the packet travels. This set of identifications defines a route. If the route is an undesired route, then the relationship between the at least two elements on the network includes an undesired relationship. In one embodiment, the act of identifing 302 is executed through a software application running on a Data Communication Channel of a network. The network is selected from a group consisting of a Synchronous Optical Network and a Synchronous Digital Hierarchy network. In another embodiment, the act of identifying 302 can be iterated. In another embodiment, the act of identifying 302 can be iterated until no new relationships among elements on the network is learned with a test packet.
The process 300 includes an act 306 for presenting the relationship so as to allow identification of an undesired relationship between at least two elements on the network. The act of presenting 306 includes presenting the information in a tabular format or in a pictorial format.
Figures 4A-4C illustrate tabular and pictorial diagrams of data according to one aspect of the present invention. Figure 4 A illustrates a tabular diagram 400 A. The tabular diagram 400A can be formed and presented to a user after at least one relationship between two elements on a network is learned. The user can use the tabular diagram 400A to determine if an undesired coupling exists between at least two elements on the network. The tabular diagram 400A includes row 402 A for representing the system. The system includes an element on the network, such as a computer, a telephone, or other devices. The tabular diagram 400A includes row 404 A for representing a cage in the system. The tabular diagram 400A includes row 406A for representing a slot in the cage. The tabular diagram 400A includes a number of columns, such as columns 408 A. Each of these columns represents an element on the network. Column 408 A represents an element 1. Column 408A includes a number of cells, such as cells 408A0, 408A| , and 408A . These cells 408 A0, 408A), and 408 A2 contain information about another element with which element 1 has a coupling relationship.
Similarly, column 410A represents an element 2. Column 410A includes a number of cells, such as cells 410A0, 410A| , and 410A2. Column 412A represents an element 3. Column 412A includes a number of cells, such as cells 412A0, 412Aι , and 412A2. Column 414A represents an element 4. Column 414A includes a number of cells, such as cells 414A0, 414A, , and 414A2.
Optionally, the information that is used to form the tabular diagram 400 can be used to form a pictorial diagram as shown in Figures 4B and 4C . Figure 4B illustrates a network 400B in a ring topology that has a desired relationship between each element in the network 400B. The network 400B includes a first ring. The first ring includes an interface 408B0 that is coupled to an interface 410B i . The coupling relationship between the interface 408B0 and the interface 410Bι is represented by a line 402B0. The line 402Bo has an arrowhead illustrating the direction in which packets flow in the first ring of the network 400B. The first ring includes an interface 412B0 that is coupled to the interface 410B| through the line 402B| . The first ring includes an interface 414B] that is coupled to the interface 412B0 through the line 402B2. The first ring includes a relationship between the interface 414B| and the interface 408B0 through the line 402B3. The network 400B includes a second ring. The second ring includes an interface
408B, that is coupled to an interface 414B0 through a line 402B . The second ring includes an interface 412B] that is coupled to the interface 414Bo through the line 402B5. The second ring includes an interface 410B0 that is coupled to the interface 412Bι through the line 402B6. The first ring includes a relationship between the interface 410B0 and the interface 408B) through the line 402B7.
Figure 4C illustrates a network 400C in a ring topology that has at least one undesired relationship between two elements. The network 400C includes elements similar to Figure 4B. For clarity purposes, the discussion of similar elements as presented above is incorporated here in full. There are at least three undesired relationships as shown in the network 400C. The first undesired relationship includes the coupling between the interface 4 IOC, and 408Cι through the line 402C7. The second undesired relationship includes the coupling between the interface 408C] and 4 IOC, through the line 402C0. The third undesired relationship includes the coupling between the interface 408C0 and 414C0 through the line 402C4.
The user can use the tabular diagram 400A or the pictorial diagrams 400B and 400C to determine if an undesired coupling exists between at least two elements on the network. The tabular diagram 400A and the pictorial diagrams 400B and 400C also allow the user to determine the location of the undesired coupling.
Conclusion The embodiments of the present invention allow an installer in the field to determine whether there has been an incorrect coupling between two network elements. The embodiments of the present invention pinpoint the position of the problem, and permit the installer to ameliorate the incorrect coupling. The embodiments of the present invention allow such a problem to be corrected early in the installation of a network given that attempts to fix the network after installation may be expensive. The hereinbefore discussion of the embodiments of the present invention focus on a ring topology, but a particular network topology does not limit the embodiments of the present invention, and other types of topology may benefit from the embodiments of the present invention.
Although the specific embodiments have been illustrated and described herein, it will be appreciated by those of ordinary skill in the art that any arrangement which is calculated to achieve the same purpose may be substituted for the specific embodiments shown. This application is intended to cover any adaptations or variations of the present invention. It is to be understood that the above description is intended to be illustrative, and not restrictive. Combinations of the above embodiments and other embodiments will be apparent to those of skill in the art upon reviewing the above description. The scope of the invention includes any other applications in which the above structures and fabrication methods are used. Accordingly, the scope of the invention should only be determined with reference to the appended claims, along with the full scope of equivalents to which such claims are entitled. For example, other tabular and graphical depictions can be used to present the physical interconnections detected. Further data of the physical interconnections can be gathered using other mechanisms prior to configuration of the system.

Claims

We claim:
1. A system to enhance network configuration, the system comprising: a network that includes at least two pieces of equipment, wherein one of the at least two pieces of equipment is coupled to an other of the at least two pieces of equipment; and a network manager that is adapted to identify and report physical connections between the at least two pieces of equipment before the network is configured.
2. The system of claim 1, wherein the network includes a fiber optic network.
3. The system of claim 2, wherein the fiber optic network includes an optical time division multiplexing network.
4. The system of claim 3, wherein the optical time division multiplexing network includes a Synchronous Optical Network.
5. The system of claim 3, wherein the optical time division multiplexing network includes a Synchronous Digital Hierarchy network.
6. The system of claim 1, wherein the at least two pieces of equipment is coupled in a ring topology.
7. The system of claim 1, wherein the network manager includes an application program that sends out packets that traverse the network and gather data of the physical connections.
8. A data structure to enhance network configuration, the data structure comprising: at least one data member interface to represent a coupling relationship between at least two pieces of equipment, the data member interface includes a data member system to represent a system in a network, a data member cage to represent a cage in the system, and a data member slot to represent a slot in the cage.
9. The data structure of claim 8, wherein the at least one data member interface is adapted to be instantiated to form a first and a second connection.
10. The data structure of claim 9, wherein the first connection represents one of the at least two pieces of equipment, and wherein the second connection represents the other of the at least two pieces of equipment.
11. The data structure of claim 8, wherein the network is selected from a group consisting of a Synchronous Optical Network and a Synchronous Digital Hierarchy network.
12. The data structure of claim 11, wherein the data structure is presented in a tabular format so as to allow a determination of a desired configuration of the network.
13. A method for enhancing network configuration, the method comprising: identifying a physical relationship between at least two elements in a network; and presenting the relationship so as to allow identification of an undesired relationship between the at least two elements on the network.
14. The method of claim 13, wherein identifying includes recording an identification of each network element that receives a packet as the packet travels from one of the at least two elements to the other of the at least two elements in the network.
15. The method of claim 14, and further comprising identifying a route from the stored identification values such that the route defines the relationship between the at least two elements in the network.
16. The method of claim 13, wherein identifying includes identifying the relationship using a Data Communication Channel protocol of a network selected from a group consisting of a Synchronous Optical Network and a Synchronous Digital Hierarchy network.
17. The method of claim 13, wherein the act of identifying is iterated.
18. The method of claim 20, wherein the act of identifying is iterated until no additional relationships among the elements on the network are identified on a given pass.
19. The method of claim 13, wherein presenting includes presenting information in a tabular form.
20. The method of claim 13, wherein presenting includes presenting information in a pictorial form.
PCT/IB2001/000435 2000-03-23 2001-03-21 Methods for identifying connections in a network WO2001071975A2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
IL15160601A IL151606A0 (en) 2000-03-23 2001-03-21 Methods for identifying connections in a network
AU2001244430A AU2001244430A1 (en) 2000-03-23 2001-03-21 Methods for identifying connections in a network

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US53353300A 2000-03-23 2000-03-23
US09/533,533 2000-03-23

Publications (3)

Publication Number Publication Date
WO2001071975A2 true WO2001071975A2 (en) 2001-09-27
WO2001071975A3 WO2001071975A3 (en) 2002-04-18
WO2001071975A9 WO2001071975A9 (en) 2003-09-12

Family

ID=24126373

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2001/000435 WO2001071975A2 (en) 2000-03-23 2001-03-21 Methods for identifying connections in a network

Country Status (3)

Country Link
AU (1) AU2001244430A1 (en)
IL (1) IL151606A0 (en)
WO (1) WO2001071975A2 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5481674A (en) * 1994-06-20 1996-01-02 Mahavadi; Manohar R. Method and apparatus mapping the physical topology of EDDI networks
EP0739110A2 (en) * 1995-04-19 1996-10-23 Hewlett-Packard Company Method for determining topology of a network
GB2314723A (en) * 1996-06-24 1998-01-07 Nemesys Research Limited ATM network
US5826038A (en) * 1994-09-01 1998-10-20 Fujitsu Limited Communication network configuration detecting method using frame transmission
WO1999057853A1 (en) * 1998-05-02 1999-11-11 Giganet Networks, Inc. Distributed switch and connection control arrangement and method for digital communications network

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5481674A (en) * 1994-06-20 1996-01-02 Mahavadi; Manohar R. Method and apparatus mapping the physical topology of EDDI networks
US5826038A (en) * 1994-09-01 1998-10-20 Fujitsu Limited Communication network configuration detecting method using frame transmission
EP0739110A2 (en) * 1995-04-19 1996-10-23 Hewlett-Packard Company Method for determining topology of a network
GB2314723A (en) * 1996-06-24 1998-01-07 Nemesys Research Limited ATM network
WO1999057853A1 (en) * 1998-05-02 1999-11-11 Giganet Networks, Inc. Distributed switch and connection control arrangement and method for digital communications network

Also Published As

Publication number Publication date
AU2001244430A1 (en) 2001-10-03
WO2001071975A9 (en) 2003-09-12
IL151606A0 (en) 2003-04-10
WO2001071975A3 (en) 2002-04-18

Similar Documents

Publication Publication Date Title
US6075766A (en) Method and apparatus for identifying restoral routes in a network
US5881048A (en) Method and apparatus for determining maximum network failure spans forrestoration
US5513171A (en) Arrangement for dynamically deriving a telephone network management database from telephone network data
EP1654609B1 (en) Management of large scale cabling systems
US6718384B2 (en) System and method for monitoring and maintaining a communication network
US5771274A (en) Topology-based fault analysis in telecommunications networks
JP4091845B2 (en) Network documentation system with electronic modules
US5995485A (en) Method and apparatus for isolating network failures by correlating paths issuing alarms with failure spans
US5867689A (en) Method and apparatus for emulating a digital cross-connect switch network using a flexible topology to test MCS network management
US5991264A (en) Method and apparatus for isolating network failures by applying alarms to failure spans
US6907549B2 (en) Error detection in communication systems
US7058024B1 (en) Automatic telecommunications link identification system
MX2011008506A (en) Managed connectivity devices, systems, and methods.
WO1998024220A9 (en) Method and apparatus for isolating network failures by correlating paths issuing alarms with failure spans
McNamara Local area networks: an introduction to the technology
US6802044B2 (en) System and method for designing diverse communications circuits
WO2001071975A2 (en) Methods for identifying connections in a network
US20220116268A1 (en) Railroad fault detection method, system therefor, and network control system
US7580998B2 (en) Method for describing problems in a telecommunications network
CN211184162U (en) Building optical access network protection system based on double routes
Kheradpir et al. Real-time management of telephone operating company networks: Issues and approaches
CN101355386B (en) Method for automatically discovering error connection of multiplex segment protective optical fiber
US20030014698A1 (en) Event correlation in a communication network
KR100424617B1 (en) Network management apparatus and method
KR100301293B1 (en) A searching method of transmitting data for optical communication system

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
AK Designated states

Kind code of ref document: A3

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A3

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

WWE Wipo information: entry into national phase

Ref document number: 151606

Country of ref document: IL

122 Ep: pct application non-entry in european phase
COP Corrected version of pamphlet

Free format text: PAGES 5/6 AND 6/6, DRAWINGS, ADDED; PAGES 1/4-4/4 RENUMBERED AS 1/6-4/6

NENP Non-entry into the national phase

Ref country code: JP