Shared risk group handling within a media gateway

ABSTRACT

A media gateway controller (MGC) is described herein that implements a shared risk group package to control and prevent a media gateway (MG) from establishing redundant links like a primary link and a secondary link that use resources that share the same risk of failure. Essentially, the MGC uses the shared risk group package to control which resources like ephemeral terminations are used by the MG to establish the primary link and the secondary link such that if any of the resources associated with the primary link fail then the secondary link remains operational within the MG and if any of the resources associated with the secondary link fail then the primary link remains operational within the MG.

CROSS-REFERENCE TO RELATED APPLICATIONS

This patent application is a continuation of U.S. patent applicationSer. No. 10/770,948 filed on Feb. 3, 2004 now U.S. Pat. No. 7,457,237and entitled “Shared Risk Group Handling Within a Media Gateway” whichis incorporated by reference herein.

This application also claims the benefit of U.S. Provisional ApplicationSer. No. 60/444,525 filed on Feb. 3, 2003 and entitled “Shared RiskGroup Handling within a Data Packet Communications Network” which isincorporated by reference herein.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates in general to the telecommunications fieldand, in particular, to a media gateway that implements a shared riskgroup package to indicate to a media gateway whether or not the mediagateway should use resources which share the same risk of failure toestablish multiple connections.

2. Description of Related Art

In the telecommunications field it is an established and common conceptthat to improve the error resilience of a connection that one should useredundant links like a primary link and a secondary link. Theestablishment of a secondary link effectively means that a separategroup of resources are used to establish a connection so that if theresources of the primary link fail then the resources of the secondarylink maintains the connection. Today there is ongoing work in theInternet Engineering Task Force (IETF) of using diverse resources in arouter and network.

There are methods of using diverse resources to maintain a connectionwithin a router and network but there is no method today that enablesthe use of diverse resources for a connection in a media gateway (MG).Instead, today in a typical packet based network the MG is requested toprovide a Termination ID for a primary link using an ADD.req commandwith a Termination ID=CHOOSE (?). The MG is then requested to provideanother Termination ID for a secondary link using another ADD.reqcommand with a Termination ID=CHOOSE (?). It is likely that theterminations used by the primary link and the second link use relatedresources in the MG such that in the case of a failure of any of thoseresources then both the primary link and secondary link would beadversely affected. This is clearly undesirable behavior because asecondary link has been established in the first place to minimize thepossibility of failure to a connection. Thus, a mechanism is needed toinform the MG that it should use resources to establish a secondary linkthat are not related to the resources used to establish the primarylink. This need is satisfied by the shared risk group package of thepresent invention.

BRIEF DESCRIPTION OF THE INVENTION

The present invention includes a media gateway controller (MGC) thatimplements a shared risk group package to control and prevent a mediagateway (MG) from establishing redundant links like a primary link and asecondary link that use resources that share the same risk of failure.Essentially, the MGC uses the shared risk group package to control whichresources like ephemeral terminations are used by the MG to establishthe primary link and the secondary link such that if any of theresources associated with the primary link fail then the secondary linkremains operational within the MG and if any of the resources associatedwith the secondary link fail then the primary link remains operationalwithin the MG. The present invention described herein also includes: (1)a method for implementing the shared risk group package; (2) a mediagateway; and (3) a network.

BRIEF DESCRIPTION OF THE DRAWINGS

A more complete understanding of the present invention may be obtainedby reference to the following detailed description when taken inconjunction with the accompanying drawings wherein:

FIG. 1 is a block diagram showing the basic components of a MGC and a MGthat implement a shared risk group package of the present invention;

FIG. 2 is a flowchart illustrating the steps of a preferred method forenabling the MGC to control the resources used in the MG to preventredundant links from being established which use resources that sharethe same risk of failure by implementing the shared risk group packagein accordance with the present invention;

FIG. 3 is a signal sequence chart illustrating the steps of establishingtwo redundant links in the MG using the shared risk group package inaccordance with the present invention;

FIG. 4 is a block diagram showing the basic components of an exemplarynetwork which includes a MGC and two MGs that implement the shared riskgroup package in accordance with the present invention;

FIGS. 5A and 5B are signal sequence charts illustrating the steps ofestablishing two redundant links in the two MGs of the network shown inFIG. 4 using the shared risk group package in accordance with thepresent invention; and

FIG. 6 is a signal sequence chart illustrating an alternative way ofestablishing two redundant links in a MG without implementing the sharedrisk group package in accordance with the present invention.

DETAILED DESCRIPTION

Referring to FIGS. 1 and 2, there are shown preferred embodiments of aMGC 100 and MG 110 that implement the shared risk group package 120 ofthe present invention and a method 200 for implementing the shared riskgroup package 120 of the present invention. For clarity, a detaileddiscussion about the shared risk group package 120 is provided after abrief discussion about the basic components and functions of the MGC 100and the MG 110. It should also be appreciated that for clarity thedescription provided below in relation to the MGC 100 and MG 110 omitsthose details and components that are well known in industry and are notnecessary to understand the present invention.

The MG 110 basically functions to convert media provided in one type ofnetwork to the format required in another type of network (see FIG. 4).For example, the MG 110 could terminate switch circuit network (SCN)bearer channels from a switched circuit network 115 (e.g., DSOs) andmedia streams from a packet network 121 (e.g., Real-time Transport (RTP)streams in an Internet Protocol (IP) network 121). The MG 110 is capableof full duplex media translations and also capable of processing audio,video and T.120 alone or in any combination. The MG 110 may also: (1)play audio/video messages; (2) perform Interactive Voice Response (IVR)functions; (3) perform media conferencing; (4) support AsynchronousTransfer Mode (ATM) services; (5) support frame relay services; and (6)support IP/Multi Protocol Label Switching (MPLS) services. And, the MGC100 basically functions to control the parts of a call state thatpertains to the control of the connection for media channels in the MG110.

The exemplary MG 110 shown in FIG. 1 has twelve terminations T1-T12 thatcan source or sink media and/or control streams. Terminations T1-T6 areephemeral terminations and are created by an Add command from the MGC100 and destroyed by Subtract command from the MGC 100 (see FIGS. 3, 5Aand 5B). In contrast, terminations T7-T12 are pre-provisioned physicalterminations that represent physical entities that have a semi-permanentexistence. For example, a physical termination representing a TDMchannel might exist for as long as it is provisioned in the MG 110.Whereas, an ephemeral termination representing a RTP flow wouldtypically exist only for the duration of their use. And, a context C1-C6is simply an association between a collection of 1 or 2 terminations.

In accordance with the present invention, the MGC 100 uses the sharedrisk group package 120 to control which resources are used by ephemeralterminations T1, T2 . . . T6 in the MG 110 to prevent redundantconnections like a primary link 125 and a secondary link 130 from beingestablished which use related resources such as T1 and T2 (for example)because they share the same risk of failure by being associated with asingle digital signal processor DSP 1 (for example). A detaildescription about the shared risk group package 120 is provided belowwhich has been standardized in International Telecommunication Unit'sITU-T H.248.22.

H.248.22 “GCP: Shared Risk Group Package”

1. SCOPE

-   -   When network connections are associated with ephemeral        terminations in the MG 110 certain resources are used. A failure        in the MG 110 may result in the loss of certain groups of        resources, whilst other groups of resources remain unaffected.        The resources that share a risk of failure are called a shared        risk group SRGI. A shared risk group SRGI is a grouping of the        network resources (e.g. IP interfaces) that share the same risk        of failure. For example, shared risk group SRGI1 contains a        number of IP interfaces T3-T4 located on the same piece of        hardware DSP2. And, if DSP2 fails then only terminations T3-T4        in the shared risk group SRGI1 corresponding to the failed        resource are affected while other terminations T1-T2 and T5-T6        associated with DSP1 and DSP3 are not affected.    -   The MGC 100 may select different shared risk groups SRGI when        the redundancy of network resources has to be controlled or when        the MGC 100 wishes to specify which group of resources are to be        used. With this functionality the MGC 100 is given control of        the resources used by ephemeral terminations in the MG 110. The        MGC 100 may order MG 110 to use resources from a selected Shared        Risk Group SRGI or not use resources from a Shared Risk Group        SRGI. This gives an advantage over using traditional Termination        ID schemes to link resource groups, in that the MGC 100 can        specify certain resources to avoid in which is not possible in        the aforementioned CHOOSE ($?) Termination ID scenario.    -   The capability to order the MG 110 to use diverse resources for        different connections is particularly useful when a pair of        connections is used for a primary link 125 and a secondary link        130 (e.g., for signaling transport).    -   FIG. 1 shows an example of a scenario where two shared risk        groups SRGI1 and SRGI2 have been defined and are used by        ephemeral terminations T3-T4 and T5-T6, respectively. In this        example, context 3 represents a primary link 125 and context 5        is the secondary link 130. The shared risk group package 120 may        be used whenever the behavior described below in the procedures        section is required.

2. DEFINITIONS

-   -   The Recommendation defines the following term:

2.1 Shared Risk Group

-   -   A Shared Risk Group consists of resources or groups of resources        that share the same risk of failure. It is the relationship        between resources in a MG 110 that defines a shared risk group        (see step 202 in FIG. 2).

3. SHARED RISK GROUP PACKAGE 120

-   -   PackageID: shrisk, 0x006b    -   Description: This package defines properties and procedures that        are used to distinguish between different shared risk groups        SRGIs in the MG 110 (see step 204 in FIG. 2).    -   Designed to be extended only: No    -   Extends: None

3.1 Properties

3.1.1 Property Name: Include Shared Risk Group (See Step 202 in FIG. 2)

-   -   PropertyID: incl, 0x0001    -   Description: The value of this property indicates if the shared        risk group specified is requested to be used or to not be used.    -   Type: Sub-list of type Boolean    -   Possible Values:        -   “on” (TRUE) Use resources from the specified SRGI only            [Default].        -   “off” (FALSE) Use resources from any SRGI but the specified            SRGI.    -   Defined in: Termination State Descriptor    -   Characteristics: Write Only

3.1.2 Property Name: Shared Risk Group Identity Request

-   -   PropertyID: srgir, 0x0002    -   Description: The value of this property specifies the shared        risk group identity.    -   Type: Sub-list of type Integer    -   Possible Values: The values specify the SRGI according to a        scheme understood by both MGC 100 and MG 110 (see section        3.2.1.3 for further details).    -   Defined in: Termination State Descriptor    -   Characteristics: Write Only

3.1.3 Property Name: Assigned Shared Risk Group Identity

-   -   PropertyID: asrgi, 0x0003    -   Description: The value of this property specifies the Shared        Risk Group Identity that has been allocated by the MG 110. This        value cannot be directly modified by the MGC 100.    -   Type: Integer    -   Possible Values The values specify the SRGI according to a        scheme understood by both MGC and MG (see section 3.2.1.2 for        further details).    -   Defined in: Termination State Descriptor    -   Characteristics: Read Only

3.2 Procedures

3.2.1 Establishment/Modification of Terminations when Using Shared RiskGroup Package

-   -   When a MGC 100 determines that an ephemeral termination must use        resources belonging to (or different to) a specific shared risk        group, an Add/Modify/Move command will be sent to the MG 110        specifying the “Include shared risk group” property and the        “Shared risk group identity Request” property.

3.2.1.1 Usage of the “Include Shared Risk Group” Property

-   -   The “Include shared risk group” property is used to indicate to        the MG 110 if resources from the specified shared risk group        identity (shrisk/srgir) must be used for the termination        (shrisk/incl=yes) or if resources from the specified risk group        identity must not be used for the termination (shrisk/incl=no).        If the MGC 100 is not concerned with which shared risk groups        are used then it should not include the shrisk/incl and        shrisk/srgir properties. The shrisk/incl and shrisk/srgir        properties are valid only for the command that they are        contained in. They should not be read/audited after the        execution of the command. Wildcarding values with CHOOSE ($) or        ALL (*) should not be used with shrisk/incl and/or shrisk/srgir.        For example, in the case of a semi-permanent connection and a        protective secondary link, by specifying (shrisk/incl=on,        shrisk/srgi=1) for the primary link 125 (see Add command 302 and        Reply command 304 in FIG. 3) and by specifying (shrisk/incl=off,        shrisk/srgi=1) for the secondary link 130 (see Add command 306        and Reply command 308 in FIG. 3), the MGC 100 is assured that        the primary link 125 and the secondary link 130 do not share the        same groups of resources (see FIGS. 1 and 3).    -   The MGC may provide a sub-list of shrisk/incl and shirsk/srgir        to the MG 110 to enable the MGC 100 to request that certain        shared risk groups be used and other shared risk groups should        not be used. The first value of shrisk/incl in the sub-list        corresponds to the first value of shrisk/srgir sub-list. For        instance, the MGC 100 may send an ADD command such as        “C${Add${TerminationStateDescriptor{shrisk/incl=off, on, on, off        shrisk/srgir=1, 2, 3, 4}}}. This Add command would indicate that        the MG 110 shall use resources from Shared Risk Groups 2 and 3        but not from 1 and 4.

3.2.1.2 Usage of the “Assigned Shared Risk Group Identity” Property

-   -   The “Assigned Shared Risk Group Identity (shrisk/asrgi)”        contains the accumulated shared risk identities of the resources        used by the termination. This value cannot be directly written        by the MGC 100 however it can indirectly be influenced by        adding, modifying or subtracting resources from the termination.        The MGC 100 can audit this property to determine the shared risk        groups used by a termination.

3.2.1.3 Usage of the “Shared Risk Group Identity” Property

-   -   It should be appreciated that the different resources used by a        termination may have different “Shared Risk Group Identity”        ranges. However it is assumed that this will be operator        configurable and provisioned on both the MGC 100 and MG 110 so        that they have a mutual understanding of the Specified Risk        Group identity scheme. For example, a binary structure of the        property can be used i.e. the shrisk/srgi decimal integer could        be treated as a four byte binary number within the MGC 100 and        MG 110. This way different bytes or groups of bits may be used        to address different types of resources in the MG 110. For        example, the first two bytes could be used to identify DSP        resources while the last two bytes could identify interface        boards on the MG 110. When sent over the GCP link 135, the        binary number is however expressed as a decimal number integer.

4. SUMMARY

-   -   The Shared Risk Package 120 enables the MGC 100 to indicate to        the MG 110 to use or to not use network resources associated        with a shared risk group when setting up connections 125 and        130. When network connections are associated with ephemeral        terminations in the MG 110 certain resources are used. A failure        in the MG 110 may result in the loss of certain groups of        resources, whilst other groups of resources remain unaffected.        The resources that share a risk of failure are called a shared        risk group. A shared risk group is simply a grouping of the        network resources (e.g. IP interfaces) sharing the same risk of        failure. Each shared risk group could for example contain a        number of IP interfaces located on the same piece of hardware.        If a resource failure occurs only terminations in the shared        risk group corresponding to the failed resource are affected        while other terminations are not.

Referring to FIG. 4, there is a block diagram showing the basiccomponents of an exemplary network 400 that can incorporate a MGC 100and two MGs 110 a and 110 b that implement the shared risk group package120 in accordance with the present invention. It should be appreciatedthat network 400 (e.g., Ericsson's ENGINE Integral 3.0 Network) isexemplary and that other types and configurations of networks can alsoimplement the shared risk group package 120 in accordance with thepresent invention.

As shown, the network 400 includes the MGC 100 (shown including an AXE)and an IP/ATM packet network 121. The MGC 100 is also shown to includethe share risk group package 120. Further, the network 400 includes twoMGs 110 a and 110 b that interface with the IP/ATM packet network 121.MG 110 a also interfaces with a switched circuit network 115 a thatincludes the following components: (1) a Private Branch Exchange (PBX)404; (2) an Access Node 406; (3) a Local Exchange (LE) 408; (4) a Router410; and (5) an Asynchronous Transfer Mode (ATM) switch 412 (forexample). Likewise, MG 110 b also interfaces with a switched circuitnetwork 115 b that includes the following components: (1) a PBX 414; (2)an ENGINE Access ramp 416; (3) a LE 418; and (4) a Remote SubscriberStage 420 (for example). Lastly, the network 400 also includes amanagement system 422.

In operation, the MGC 100 uses the shared risk group package 120 tocontrol which resources are used by ephemeral terminations in MGs 110 aand 110 b to prevent redundant connections from being established ineither MG 110 a or 110 b which use related resources that share the samerisk of failure. A detail description about how the MGC 100 can use theshared risk group package 120 to establish a primary path (path #1) anda second patch (path #2) in MGs 110 a and 110 b is provided below withrespect to the sequence charts in FIGS. 5A and 5B.

Referring to FIGS. 5A and 5B, there are shown two signal sequence charts500 a and 500 b that illustrate the steps of establishing two redundantlinks in the MGs 110 a and 110 b of network 400 using the shared riskgroup package 120 in accordance with the present invention. The signalsequence chart 500 a illustrates the messaging required for theestablishment of a primary path (path #1) including two primary links125 a and 125 b in MGs 110 a and 110 b. And, the signal sequence chart500 b illustrates the messaging required for the establishment of asecondary path (path #2) including two secondary links 130 a and 130 bin MGs 110 a and 110 b.

As shown in FIG. 5A, the signal sequence chart 500 a indicates howprimary links 125 a and 125 b can be established in MGs 110 a and 110 b.First, the MGC 100 sends an ADD command 502 a (which includes bearertype and codec information (BT & Cl)) to MG 110 a which then chooses aUser Datagram Protocol (UDP) Port # on an interface corresponding to thespecified SRGI1 (for example). MG 110 a then reserves an IP ephemeraltermination T3 a (for example) on the appropriate DSP2 and establishes across connection between the appropriate physical termination T9 a andthe reserved IP ephemeral termination T3 a (e.g., see T3 and T9 in FIG.1). MG 110 a then sends an ADD REPLY command 504 a to the MGC 100 with achosen ContextId, termination Ids, BackBone Network Connection (BNC) ID,IP address of the interface and the UDP Port #. Thereafter, the MGC 100sends an ADD command 506 a to MG 110 b which then chooses a UserDatagram Protocol (UDP) Port # on an interface corresponding to thespecified SRGI1 (for example). MG 110 b then reserves an IP ephemeraltermination T3 b (for example) on the appropriate DSP2 and establishes across connection between the appropriate physical termination T9 b andthe reserved IP ephemeral termination T3 b (e.g., see T3 and T9 in FIG.1). MG 110 b then sends an ADD REPLY command 508 a to the MGC 100 with achosen ContextId, termination Ids, BackBone Network Connection (BNC) ID,IP address of the interface and the UDP Port #. The MGC 100 then sends aMODIFY command 510 a to MG 110 a which includes the reserved UPD portand IP address information associated with MG 110 b. MG 110 a then sendsa MODIFY REPLY command 512 a to the MGC 100. Thereafter, MGC 100completes the establishment of the primary link 125 a in MG 110 a andthe primary link 125 b in MG 110 b. It should be appreciated that MGs110 a and 110 b have the same configuration as the exemplary MG 100shown in FIG. 1.

As shown in FIG. 5B, the signal sequence chart 500 b indicates howsecondary links 130 a and 130 b can be established in MGs 110 a and 110b. First, the MGC 100 sends an ADD command 502 b (including bearer typeand codec information (BT & Cl)) to MG 110 a which then chooses a UserDatagram Protocol (UDP) Port # on an interface corresponding to thespecified SRGI2 (for example). MG 110 a then reserves an IP ephemeraltermination T5 a (for example) on the appropriate DSP3 and establishes across connection between the appropriate physical termination T11 a andthe reserved IP ephemeral termination T5 a (e.g., see T5 and T11 in FIG.1). The MG 110 a then sends an ADD REPLY command 504 b to the MGC 100with a chosen ContextId, termination Ids, BackBone Network Connection(BNC) ID, IP address of the interface and the UDP Port #. Thereafter,the MGC 100 sends an ADD command 506 b to MG 110 b which then chooses aUser Datagram Protocol (UDP) Port # on an interface corresponding to thespecified SRGI2 (for example). MG 110 b then reserves an IP ephemeraltermination T5 b (for example) on the appropriate DSP3 and establishes across connection between the appropriate physical termination T11 b andthe reserved IP ephemeral termination T5 b (e.g., see T5 and T11 FIG.1). MG 110 b then sends an ADD REPLY command 508 b to the MGC 100 with achosen ContextId, termination Ids, BackBone Network Connection (BNC) ID,IP address of the interface and the UDP Port #. The MGC 100 then sends aMODIFY command 510 b to MG 110 a which includes the reserved UDP portand IP address information associated with MG 110 b. MG 110 b then sendsa MODIFY REPLY command 512 b to the MGC 100. Thereafter, MGC 100completes the establishment of the secondary link 130 a in MG 110 a andthe secondary link 130 b in MG 110 b. It should be appreciated that theprimary links 125 a and 125 b do not share related resources with thesecondary links 130 a and 130 b in MGs 110 a and 110 b.

Referring to FIG. 6, there is a signal sequence chart 600 thatillustrates an alternative way of establishing two redundant links inthe MG 110 without implementing the shared risk group package 120 inaccordance with the present invention. In this embodiment, the sharedrisk group package 120 is not used so as shown in block 602 of thesignal sequence chart 600 there needs to be some management actions toconfigure terminations T2 and T4 (for example) to use specific resourcesthat do not share the same risk of failure. The terminations T1 and T2are already pre-provisioned physical terminations. Then, the MGC 100sends an Add command 604 to MG 110 specifying that two semi-permanentconnections T1 and T2 are to be used to establish a primary link 125.The MG 110 then sends a Reply command 606 back to the MGC 100 containingthe ContextId and termination Ids T1 and T2. Thereafter, the MGC 100sends another Add command 608 to MG 110 specifying that twosemi-permanent connections T3 and T4 are to be used to establish asecondary link 130. The MG 110 then sends a Reply command 610 back tothe MGC 100 containing the ContextId and termination Ids T3 and T4. Atthis point, the primary link 625 and secondary link 630 which do notshare related resources are established in MG 110. It should beappreciated that less manual work is expected when the shared risk grouppackage 120 as shown in FIGS. 1-5 is used than if the terminations needto be individually configured as shown in FIG. 6. It should also beappreciated that the numbers associated with the terminations T1, T2, T3and T4 in the signal sequence chart 600 do not correspond with thetermination numbers T1-T12 in the MGs 110 shown in FIGS. 1 and 4.

From the foregoing, it can be readily appreciated by those skilled inthe art that the present invention provides a shared risk group packagethat enables the MGC to indicate to the MG to use or to not use networkresources that share the same risk of failure when setting-upconnections. As such, the MGC can use the shared risk group package toprevent redundant links like a primary link and a secondary link frombeing established in a MG that use related resources which share thesame risk of failure by controlling which resources are used toestablish the ephemeral terminations that are associated with theprimary link and the secondary link.

Although several embodiments of the present invention have beenillustrated in the accompanying Drawings and described in the foregoingDetailed Description, it should be understood that the invention is notlimited to the embodiments disclosed, but is capable of numerousrearrangements, modifications and substitutions without departing fromthe spirit of the invention as set forth and defined by the followingclaims.

1. A media gateway controller, comprising: means within a media gatewaycontroller for implementing a shared risk group package, wherein saidshared risk group package defines the following properties: an includeshared risk group property that specifies if one of the shared riskgroups is to be used to establish one of the connections within a mediagateway; a shared risk group identity request property that specifies anidentity of one of the shared risk groups; and an assigned shared riskgroup identity property that specifies an identity of one of the sharedrisk groups that has been allocated by said media gateway controller,wherein said media gateway controller sends to said media gateway, whensaid multiple connections include a primary link and a secondary link, acommand that the shared risk group property is “on” and shared riskgroup identity request property is “x” wherein “x” specifies aparticular shared risk group that is to be used when said media gatewayestablishes the primary link; and said media gateway controller sends tosaid media gateway a command that the shared risk group property is“off” and the shared risk group identity request property is “x” whichspecifies that the media gateway is to establish the secondary link byusing a shared risk group other than the shared risk group “x” that isbeing used by the primary link.
 2. A media gateway controller,comprising: means within a media gateway controller for implementing ashared risk group package, wherein said shared risk group packagedefines the following properties: an include shared risk group propertythat specifies if one of the shared risk groups is to be used toestablish one of the connections within a media gateway; a shared riskgroup identity request property that specifies an identity of one of theshared risk groups; and an assigned shared risk group identity propertythat specifies an identity of one of the shared risk groups that hasbeen allocated by said media gateway, wherein said media gatewaycontroller requests that said media gateway use a selected set of sharedrisk groups and not use a different set of shared risk groups by sendinga command including a sub-list of the shared risk group property andshared risk group identity request property to said media gateway.
 3. Amethod for enabling a media gateway controller to control a mediagateway, said method comprising the steps of: identifying thetermination resources that share the same risk of failure and definingthose termination resources as a shared risk group; and enabling themedia gateway controller to use a shared risk package to distinguishbetween different shared risk groups when establishing a primary linkand a secondary link within said media gateway, wherein said shared riskgroup package defines properties used by said media gateway controllerto distinguish between the different shared risk groups whenestablishing the multiple connections within said media gateway, saidshared risk group package defining the properties of: an include sharedrisk group property that specifies if one of the shared risk groups isto be used or not to be used to establish one of the connections withinsaid media gateway; a shared risk group identity request property thatspecifies an identity of one of the shared risk groups; and an assignedshared risk group identity property that specifies an identity of one ofthe shared risk groups that has been allocated by said media gateway;sending, to said media gateway, a command which specifies a particularshared risk group that is to be used when said media gateway establishesthe primary link; and sending, to said media gateway, a command whichspecifies that the media gateway is to establish the secondary link byusing another shared risk group besides the shared risk group that isbeing used by the primary link.
 4. A method for enabling a media gatewaycontroller to control a media gateway, said method comprising the stepsof: identifying the termination resources that share the same risk offailure and defining those termination resources as a shared risk group;and enabling the media gateway controller to use a shared risk packageto distinguish between different shared risk groups when establishing aprimary link and a secondary link within a media gateway, wherein saidshared risk group package defines properties used by said media gatewaycontroller to distinguish between the different shared risk groups whenestablishing the multiple connections within said media gateway, saidshared risk group package defining the properties of: an include sharedrisk group property that specifies if one of the shared risk groups isto be used or not to be used to establish one of the connections withinsaid media gateway; a shared risk group identity request property thatspecifies an identity of one of the shared risk groups; and an assignedshared risk group identity property that specifies an identity of one ofthe shared risk groups that has been allocated by said media gateway,further comprising the step of enabling said media gateway controller torequest that said media gateway use a selected set of shared risk groupsand not use a different set of shared risk groups by sending a commandto said media gateway.