Presentation is loading. Please wait.

Presentation is loading. Please wait.

© 2005 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION1 1 Carrier Ethernet Technologies and Test Applications Reza Vaez-Ghaemi, Ph.D.

Similar presentations


Presentation on theme: "© 2005 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION1 1 Carrier Ethernet Technologies and Test Applications Reza Vaez-Ghaemi, Ph.D."— Presentation transcript:

1 © 2005 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION1 1 Carrier Ethernet Technologies and Test Applications Reza Vaez-Ghaemi, Ph.D. November 2008

2 © 2008 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION2 2 Drivers for Transport Network Evolution Triple Play services Business services Mobile backhauling Carrier-class performance (SLA guarantees) Flexible, cost-effective BB Access, Ethernet and Photonics technologies

3 © 2008 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION3 3 Carrier Ethernet Requirements Carrier Ethernet TDM Support QoS Protection Scalability OAM Native Ethernet lacks key capabilities needed for a robust metro core network technology Ethernet is continuously being enhanced with key features for carrier grade performance such as: QoS: service differentiation and prioritization Scalability: granularity and number of services OAM: Monitoring, loopback Protection: 50ms path protection TDM support

4 © 2008 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION4 4 LAN CE PE PB LAN CE Basic structure of Ethernet Network AccessBackbone, Core WAN, Metro Network Access Provider Edge Equipment Transmission technique Switching technique Customer Edge Equipment Customer Provider Packet oriented Ethernet

5 © 2008 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION5 5 Connect networks– Direct, multiple and virtual VPN realized with native Ethernet VLAN (802.1p/q); Q-in-Q (802.1ad); MAC-in-MAC (802.1ah) –Switching in the BB by Ethernet transparent switching –VLAN tag serves as filter, not as switching information. –VPN separation only in the access switch VPN realized with an IP Network VPLS (Virtual Private LAN Service); MPLS (Multiprotocol Label Switching) –Switching in the BB by MPLS label –VPN separation in the whole BB by LSP (Label Switched Path) LAN CE PE LAN CE Eth PE Backbone VPN PE

6 © 2008 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION6 6 VLAN tagging - why VLAN is a filter function – logical separation of MAC frames MAC frames are only valid for dedicated egresses Necessary to block frame distribution to everybody in case of Broadcast function Used for layer 2 switch based networks Necessary if customer also uses VLAN tags Inner tag = Customer tag, Outer tag = Service tag Q in Q VLAN Reduces the adress table of provider backbone switches Only MAC adresses of all provider edge equipment are to be learned MAC in MAC Provider Backbone Bridges PBB

7 © 2008 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION7 7 Virtual Local Area Network (VLAN) – idea The idea of VLAN is to segment networks into logical groups rather than physical conditions. Physical segmentation provider device different offices management controlling development Logical segmentation VLAN #1 VLAN #2 VLAN #3

8 © 2008 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION8 8 Customer C-LAN Customer C-LAN Provider S-LAN CEPE CE Customer: With VLANs VLAN configuration and operation – Q-in-Q VIDMACIPSVLANMACCVLANIPVIDMACIP Switching in the provider net: SVLAN tag has no switching function. The SVLAN only hides the CVLAN. The MAC addresses of the customer devices remains visible and are needed for switching. Still transparent switching and flooding based on the customer Ethernet addresses. This is a big disadvantage in large networks! Solution: A totally separate (addressing, switching, management) backbone transport network. PBBN – Provider Backbone Bridge Network (IEEE 802.1ah) 802.1ad: Q-in-Q (VLAN-Stacking): –Is necessary, when also the customer is using VLAN in his network.

9 © 2005 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION9 9 MPLS VPLS T-MPLS MPLS-TP

10 © 2008 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION10 What is MPLS ? G.8112/Y.1371: Interfaces for the Transport MPLS (T- MPLS) hierarchy Conceived to be flexibly client of all the relevant transport technologies: –PDH –SDH (POS) –OTN G.709 (GFP) –Ethernet and RPR Provides service to all types of client traffic: –IP –Ethernet –ATM and Frame Relay –PDH and SDH (circuit emulation)

11 © 2008 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION11 MPLS-VPN C C CE PE P P CE C C P P LSR C - Customer RouterCE - Customer Edge Router PE – Provider Edge RouterP - Provider Router LSR – Label Switch Router Equipment and Terminology

12 © 2008 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION12 Architecture: The MPLS label... TTL bits L3 headerL2 header Label 1 Label 2Label 3Label n IPLL2 IP MPLS label L2 header L3 header Label S ExpLabel Label stack ATM VPI/VCIFrame Relay DLCI to IP VPI/VCIDLCI

13 © 2008 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION13 LSR Architecture: Ingress LSR Located at the edge of an MPLS domain LSR The domain needs a way in... IP Ingress Edge IP Represents the ingress to an MPLS domain Assigns packets to an FEC Inserts the first label

14 © 2008 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION14 LSR Architecture: Egress LSR LSR … and a way out. IP Egress Edge IP Edge Located at the edge of an MPLS domain Represents the egress to an MPLS domain Removes the last label and re-creates the original packet

15 © 2008 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION15 The need for VPLS Switched Ethernet network architectures have proven to be successful in delivering high-performance, low-cost L2 VPN multipoint services. However, as the size of these switched Ethernet networks has continued to grow, the limitations on the scalability of this architecture has become increasingly apparent. These limitations include: –Limited VLAN address space per switched Ethernet domain –Scalability of spanning tree protocols (IEEE 802.1d) for network redundancy and traffic engineering –Ethernet MAC address learning rate, which is important to minimize broadcast traffic resulting from unknown MAC addresses. To address the limitations of both MPLS L3 VPNs and Ethernet switching, innovations in network technology for delivering multipoint connectivity services have led to the development of a new technology, which is known as Virtual Private LAN Service or VPLS.

16 © 2008 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION16 What is VPLS ? Virtual private LAN service (VPLS) is an MPLS application and is used to provide multipoint to multipoint L2 VPN services. It allows geographically dispersed sites to share an Ethernet broadcast domain by connecting each site to an MPLS-based network. In contrast to Layer-2 MPLS VPNs, which allow only point-to-point layer 2 MPLS tunnels, VPLS allows a full mesh of sites, allowing any-to-any (multipoint) connectivity. Assuming our VPLS is MPLS-based, we can use Label distribution protocol (LDP) to create LSPs (mentioned in the previous chapter). VPLS can also support VLANs on the customer side of a PE, in that case, we must encapsulate a VLAN ID in each packet that is sent

17 © 2008 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION17 VPLS Reference Model The customer sites are connected through a service provider network, which appears as a Layer 2 switch. Customer sites are connected to the service provider network at the Provider Edge (PE). All PEs in the network are connected together with each tunnel carrying multiple pseudo-wires. Pseudo-wires are point-to-point connections setup for each offered service between a pair of PEs.

18 © 2008 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION18 MPLS and VPLS – The small difference VPLS - Virtual Private LAN Service –The customer sees his own Layer 2 Ethernet network. –The complete Ethernet packets of the customer are transferred. –PE device emulates to the CE a virtual L2 Ethernet LAN –CE can be a router or an Ethernet switch. MPLS - Multiprotocol Label Switching –The customer sees his own Layer 3 IP network. –Only the IP part of the packet is transmitted. Ethernet is terminated at the PE. –PE device emulates to the CE a virtual router. –CE must be a router. PE CE L2 Eth L3/IP +MPLS L2 Eth PE CE L3 IP L3/IP +MPLS L3 IP

19 © 2008 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION19 T-MPLS - why Makes MPLS a Carrier Class Network: Combines the advantages of a reliable packet-based technology (MPLS) with circuit based transport networking. Based on IP/MPLS technology but simpler implementation: - removes features not relevant for connection oriented applications + addresses critical transport functionality gaps Connection oriented only Standardized by ITU-T Key enhancements: + point-to-point bi-directional LSP + end to end LSP protection (50ms) + advanced OAM support (optimal control of network resources) lower OPEX T-MPLS

20 © 2008 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION20 Differences MPLS and T-MPLS MPLS uses uni-directional LSPs T-MPLS uses bi-directional LSPs (it pairs forward and backward LSPs) MPLS uses PHP (Penultimate Hop Popping): removes the MPLS label one node before the egress - to minimize router processing) T-MPLS doesnt use PHP MPLS uses LSP Merge: all traffic forwarded along the same path to same destination may use the same MPLS label – make OAM and perf.monitoring difficult – its not connection oriented T-MPLS doesnt use LSP Merge MPLS uses ECMP (Equal Cost Multiple Path): it allows traffcic within one LSP to be routed along multiple NW paths – requires additional IP header and MPLS label processing and makes OAM complex T-MPLS doesnt use ECMP

21 © 2008 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION21 T-MPLS - Positioning T-MPLS shifts itself under the packet based networks, in order to organize the classical transport networks. Packet based transport networks: IP Netze MPLS (= IP-MPLS according IETF) Data (L2 & L3 VPN) Voice (VoIP) Internet (WEB, ) Video (IPTV, VoD) Optical transport networks: OTN, WDM, fiber TDM based transport networks: (PDH), SDH Packet based transportnetworks: Ethernet, RPR T-MPLS (= GMPLS without MPLS according ITU-T)

22 © 2008 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION22 Gain of T-MPLS? Network operator –Carrier Class packet switched system for Carrier Grade MPLS Connection oriented Management, control and quality is based on proven technologies (e.g. SDH APS) Convergence of layer 2 (Ethernet) and layer 3 (IP) client signals over one packet based transport technique With GMPLS one control plane for all network layers (packet, TDM, lambda, fiber) OPEX and CAPEX lower as with IP MPLS The question remains: OPEX and CAPEX still lower as with PBB-TE? Possible responds: Depends on which infrastructure (SDH) is already available and how the further network development is planned.

23 © 2008 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION23 Why MPLS-TP? Statically configure LSP/PWE via management plane Deliver OAM for LSP/PWE Consistent OAM for multi-layer networks which enables interworking of services such as LSP, PWE, and L2 Offer MPLS LSP and PWE as a transport service Manage LSP/PWE at nested levels (path, segment) Additional protection switching Congruent OAM and Traffic including LAG/ECMP

24 © 2008 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION24 What is MPLS-TP? Definition of an MPLS Transport Profile (TP) within IETF MPLS standards –Based on PWE3 and LSP forwarding architecture –IETF MPLS architecture concepts Major concept is LSP. PW is a client.

25 © 2008 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION25 LSP and OAM A segment is between MEPs OAM is end to end or per segment In SDH/OTN and Ethernet segment OAM is implemented using Tandem Connection Monitoring (TCM) The OAM in each segment is independent of any other segment Recovery actions (Protection or restoration) are always between MEPs i.e. per segment or end to end

26 © 2008 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION26 Associated Channel Level (ACH) Generalised mechanism for carrying management / OAM information –OAM capabilities : Connectivity Checks (CC) and Connectivity Verification (CV) –Management information: Embedded Control Channel (ECC) –Data Communications Network (DCN) –Signalling Communication Network (SCN) –APS information

27 © 2008 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION27 How does it work? Processed by the pseudo-wire function on the end-points End point or Pseudo-wire stitch point –Verifies the operational status of the pseudo-wire –Working with the native attachment circuit technology An inter-working function with the native attachment circuit OAM. Transport and act upon native attachment circuit OAM technology

28 © 2005 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION28 PBB PBT/PBB-TE

29 © 2008 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION29 Why PBB? Eliminates address space scalability issue Solves MAC table size issue Works in conjunction with 802.1ad (Q in Q)

30 © 2008 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION30 What is PBB? MAC(A,B,C) MAC(H,I) MAC(J,K,L) –A PBBN is its own virtual bridged local area network, which is completely under the administrative control of the backbone provider. –Switching: Transparent switching and flooding based on the PE MAC addresses. MAC(S,T,U) Address cache Port 1: W Port 2: X Port 3: Y,Z (W) (Y) (X) (Z) PE PB BackboneBB-AccessAccess BUBUBWY BU I MAC Addresses of PE switches –By introduction of a further MAC layer (MiM) a clear separation between customers and provider results to addresses, switching and management. –For data separation, PBB adds an I-tag and a B-tag. –Customer data (MAC addresses, VLAN tags) are transparently transported. –Multiple spanning tree enables to distribute the backbone load to several even parallel paths. Normally a MST per VLAN.

31 © 2008 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION31 PBB – 802.1ah detailed frame format B-DA, B-SA: Backbone Destination und Source Address TPID: Tag Protocol Identifier (Indication, which TCI follows. C-, S-, B, or I-TCI) B-PCP: Backbone VLAN Priority Code Point (Shows the CoS for prioritized transport.) B-DEI: Backbone VLAN Drop Eligible Indicator (Shows whether the frame can be preferred B-VID: Backbone VLAN ID dropped in overload situations.) B-TCI: Backbone TAC Control Information I-PCP: Service Instance Priority Code Point I-DEI: Service Instance Drop Eligible Indicator I-SID: Service Instance Identifier RES1/RES2: Reserved for future applications B-TCI I-TCI FCS B-SAB-DA TPID B-VID B-DEI B-PCP TPID I-SID I-DEI I-PCP RES1RES2 Payload (120) B-TAG I-TAG

32 © 2008 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION32 PBB/PBB-TE Test Terminating PBB trunks, testers T1 and T2 perform an end-to-end layer 2 test configured with B-Tag fields in Mac in Mac format. Testers only filter on B-MAC/B-VID/(I-SID) and handle everything else in the frame as part of the payload. Customer 1 Site A Customer 2 Site A Customer 2 Site B Customer 1 Site B CB PB BEB BCB T2 T1 BCB-BEB Interface

33 © 2005 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION33 Ethernet OAM

34 © 2008 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION34 Ethernet OAM Layers Services Connectivity Transport/Link IEEE 802.1ag, ITU and MEF ITU Y.1731 and MEF EoSDH (ITU) EFM (IEEE802.3ah) EoTDM (ITU)

35 © 2008 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION35 Ethernet OAM Standards Activities UNI Media Convrtr Carrier Edge Media Convrtr IEEE 802.3ah MEF & ITU Y.1731 Access Link OAM IEEE 802.1ag, MEF & ITU Y.1731 Connectivity Layer OAM Service Layer OAM (UNI to UNI) 100FX Carrier NW 802.1aj demarcation device

36 © 2008 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION36 Ethernet OAM Standards Services and Performance (ITU Y.1731/MEF) Basic Connectivity (IEEE 802.1ag,ITU) Transport/Link (802.3ah EFM) Discovery Continuity check (keep alive) Continuity checkRemote failure indication: Dying gasp, link fault & critical event Loopback (non-intrusive and intrusive) LoopbackRemote, local loopback AIS/RDI/TestAISFault isolation Link Trace Performance monitoring with threshold alarms Performance managementStatus monitoring

37 © 2008 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION37 Management Layer Comparison SONET –Line/Section/Path Line –Loopback –RDI –Signal/line quality (BER) Section –Loopback –RDI Path –Loopback –RDI Ethernet –Link/Domains Link –Loopback –RDI –Event Monitoring –Signal/line quality (frames/symbols) Domains –CFM Loopback (ping) –CFM Linktrace (traceroute) –CFM Connectivity Check

38 © 2008 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION38 Ethernet First Mile OAM Why not just use IP-based management (SNMP, Telnet, etc.)? IP infrastructure must be operational and properly configured Some networks dont use IP Security vulnerability IEEE 802.3ah OAM Provides low level Ethernet OAM functionality at FM Isolated to First Mile segment Complements SNMP and other IP-based NMS NMS can be secure and away from the user Media independent: Fiber (Active P2P or PON), Copper Uses standard Ethernet frames – slow – 10 frames/sec Backward compatible with non-802.3ah Ethernet Requires minimal configuration (almost plug and play)

39 © 2008 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION39 Ethernet First Mile OAM Defines: EDD – Ethernet Demarcation Device (NID) Functions: Monitor Link performance Fault detection and notification (signaling) Loopback testing NMS Carrier Network 802.3ah First Mile (Access Link) First Mile (Access Link)

40 © 2008 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION40 Ethernet 802.3ah Protocol Discovery – Exchange of capabilities and i.d. info Periodic state update / monitoring Link event notifications (performance threshold alarms) Remote failure notification – Link faults (Network side port) including Unidirectional Dying Gasp – catastrophic / non-recoverable failures Critical events – vendor specified events Remote Loopback Read MIB info / stats Vendor extensions NMS Carrier Network 802.3ah First Mile (Access Link) First Mile (Access Link)

41 © 2008 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION41 Management of Network Edge Multiple standards provide building blocks for managing the access 802.3ah OAM addresses how to manage physical from the PE to the MAC layer of the remote device MEF ELMI addresses how to manage the UNI of the remote device 802.1aj Two-Port MAC Relay addresses how to manage a potential customer demarcation device Each protocol adds some unique functionality, and (unfortunately) adds some overlap functionality with the other standards UNI PE Service Provider 802.3ah OAM MEF ELMI 802.1aj TPMR MAC Device

42 © 2008 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION42 IEEE 802.1aj TPMR IEEE 802.1aj Two-Port MAC Relay –Defines protocols for interactions carrier bridge and remote 2-port relay device that might be used for demarcation –Uses SNMP natively over Ethernet (no IP!)*** Configuration of remote parameters*** –VLAN behavior –CoS and QoS characteristics of interfaces –Forwarding behavior (data and L2 protocols) Status information between carrier and customer*** –Utilizing IEEE 802.1ag Covers configuration and status of all aspects of remote device IF the device is a simple two-port relay forwarder –Does not apply to bridges, routers, etc. which may also implement UNI or forwarding functionality –Mostly intended for CARRIER owned demarcation device ***Tentatively

43 © 2008 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION43 Ethernet Service OAM Being standardized by Metro Ethernet Forum and ITU (Y.1731) Builds upon IEEE 802.1ag functions by utilizing timestamps and other fields to monitor SLA metrics for Ethernet services Measures latency, jitter, loss, etc. end-to-end across any domain Used to validate SLA performance of Ethernet service across any kind of underlying network

44 © 2008 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION44 Ethernet OAM Implementation Focus on end-to-end OAM (IEEE802.1ag, ITU Y.1731) –incorporating last segment OAM (IEEE802.3 ah) End-to-end service OAM: –Continuity Check –Loopback –Performance Monitoring Frame Delay, Frame Delay Variation, Frame Loss, Availability Operator BOperator A 802.1ag/ Y.1731 (UNI-N to UNI-N ME) 802.3ah (Access Link)

45 © 2008 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION45 IEEE 802.1ag CFM CFM = Connectivity Fault Management (in progress) Partitions network into hierarchical administrative domains Basic connectivity checking and troubleshooting across any domain, and across multiple domains at the same time Partitions big problem into pieces & controls visibility Service Provider Operator Customer End-to-End Metrics Provider End-to-End Metrics Operator Metrics

46 © 2008 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION46 IEEE 802.1ag CFM Providing ping and traceroute equivalents for bridged (rather than routed) networks –Loopback (= Ping): Given MAC address and VLAN tag, verify connectivity –LinkTrace (= Traceroute): Given MAC address and VLAN tag, find the path between the local source and that destination Also provides continual connectivity checking (a.k.a. heartbeat) to proactively monitor end-to-end availability and packet loss

47 © 2008 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION47 Continuity Check (CC) OAM CC OAM Defined per EVC, one-way connectivity monitoring Loss of Continuity (LOC) is declared (only at the sink side) upon 3.5 seconds without receiving CC OAM frame Loss of Continuity (LOC) is cleared upon sink receiving 2 CC OAM frames within a window of several seconds Upon CC failure –Send trap –Update active alarm log –Update statistics –Optional uplink switch-over Operator BOperator A CC SinkCC Source CC OAM Frames

48 © 2008 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION48 Loopback (LB) OAM Per Link/Port: Remote loopback minimizes a false repair calls Non-intrusive loopback: Defined per EVC/service monitoring –one VLAN is looped back while others continue to provide their services LB Failure is declared upon 2 sec without receiving OAM frame Upon LB failure –Send trap; Update active alarm log; Update statistics –Optional uplink switch-over Operator BOperator A MEP LB OAM Request LB OAM Reply MEP

49 © 2008 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION49 Performance Monitoring (PM) OAM Defined per service (EVC+CoS), allows for in-service, end-to-end SLA monitoring Measured parameters –Frame Delay, Frame Delay Variation, Frame Loss, Availability Performance Measurements traps –Traps sent upon: {# Frames} crossing {Objective} within {Sampling Time} –The above applies for both Rising and Falling thresholds definition Statistics are collected per 15 minutes intervals; Cyclic 96 intervals kept (24 hours)

50 © 2008 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION50 Test Application Field Analyze/Generate OAM errors/alarms Performance Measurements Loopback tests UNI Media Convrtr Media Convrtr Carrier Edge Carrier Edge Media Convrtr Media Convrtr IEEE 802.3ah MEF & ITU Y.1731 Access Link OAM IEEE 802.1ag, MEF & ITU Y.1731 Connectivity Layer OAM Service Layer OAM (UNI to UNI) 100FX... Carrier NW 802.1aj demarcation device


Download ppt "© 2005 JDSU. All rights reserved.JDSU CONFIDENTIAL & PROPRIETARY INFORMATION1 1 Carrier Ethernet Technologies and Test Applications Reza Vaez-Ghaemi, Ph.D."

Similar presentations


Ads by Google