G.8032 Ethernet Ring Protection Overview March, 2008 ITU-T Q9 – SG 15

Slides:



Advertisements
Similar presentations
Computer Networks TCP/IP Protocol Suite.
Advertisements

1 UNIT I (Contd..) High-Speed LANs. 2 Introduction Fast Ethernet and Gigabit Ethernet Fast Ethernet and Gigabit Ethernet Fibre Channel Fibre Channel High-speed.
1 Concurrency: Deadlock and Starvation Chapter 6.
Zhongxing Telecom Pakistan (Pvt.) Ltd
Virtual Trunk Protocol
OSPF 1.
PHY OAM Baseline Proposal June
1 IEEE Media Independent Handoff Overview of services and scenarios for 3GPP2 Stefano M. Faccin Liaison officer to 3GPP2.
G.8032 for Ethernet Networks Ethernet Ring Protection
ag Discussion May 18, 2004 Ali Sajassi Paul Bottorf
DRNI – Intra-DAS Link Version 01 Stephen Haddock July 20,
Doc.: IEEE xxx Submission May 10-14, 2004 Alan Carlton, Interdigital CommunicationsSlide 1 Defining Layer 2.5 Alan Carlton Interdigital Communications.
Geneva, 27 May 2010 Types and Characteristics of Packet Transport Network (PTN) Equipment (Draft Recommendation - G.ptneq) Jia He and Hilmar Hofmann G.ptneq.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 MPLS –TP Fault OAM draft-sfv-mpls-tp-fault-00 George Swallow
Igor Umansky Huub van Helvoort
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 MPLS –TP Fault OAM draft-ietf-mpls-tp-fault-01 George Swallow
1 Introducing the Specifications of the Metro Ethernet Forum.
1 Introducing the Specifications of the Metro Ethernet Forum MEF 32 Requirements for Service Protection Across External Interfaces.
1 Introducing the Specifications of the Metro Ethernet Forum MEF 19 Abstract Test Suite for UNI Type 1 February 2008.
Network Protection and Restoration Session 5 - Optical/IP Network OAM & Protection and Restoration Presented by: Malcolm Betts Date:
Satoshi NARIKAWA NTT (G.8032 Acting Co-editor)
Slide title minimum 48 pt Slide subtitle minimum 30 pt Service Resiliency - ITU-T SG15 Q9 Activities Ghani Abbas Ericsson 25 th.,June, 2012 Geneva Workshop.
Marc Holness, Product Line Architect, Ciena
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 14 Introduction to Computer Networks.
Chapter 1: Introduction to Scaling Networks
Networks: Introduction 1 CS4514 Computer Networks Term B06 Professor Bob Kinicki.
Local Area Networks - Internetworking
User Friendly Price Book Maintenance A Family of Enhancements For iSeries 400 DMAS from Copyright I/O International, 2006, 2007, 2008, 2010 Skip Intro.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Distance Vector Routing Protocols Routing Protocols and Concepts –
IP Multicast Information management 2 Groep T Leuven – Information department 2/14 Agenda •Why IP Multicast ? •Multicast fundamentals •Intradomain.
1 DRNI Examples and DAS position Maarten Vissers Version 01.
Data Link Layer B. Konkoth. PDU  Protocol Data Unit  A unit of data which is specified in a protocol of a given layer  Layer 5, 6, 7 – Data  Layer.
BUDAPEST UNIVERSITY OF TECHNOLOGY AND ECONOMICS Budapest University of Technology and Economics Verification of RSTP Convergence and Scalability by Measurements.
1 Introduction to Network Layer Lesson 09 NETS2150/2850 School of Information Technologies.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-1 Extending Switched Networks with Virtual LANs Introducing VLAN Operations.
Chapter 9: Subnetting IP Networks
1 12/18/ :21 Chapter 12Bridges1 Rivier College CS575: Advanced LANs Chapter 12: Bridges.
Connecting LANs, Backbone Networks, and Virtual LANs
Network Operations & administration CS 4592 Lecture 15 Instructor: Ibrahim Tariq.
TCP/IP Protocol Suite 1 Chapter 18 Upon completion you will be able to: Remote Login: Telnet Understand how TELNET works Understand the role of NVT in.
Part 2: Preventing Loops in the Network
Ethernet Automatic Protection Switching (EAPS)
Switching & Operations. Address learning Forward/filter decision Loop avoidance Three Switch Functions.
CS335 Networking & Network Administration Tuesday, April 13, 2010.
1 Multipoint Ethernet Connection Protection
Ethernet Ring Protection Switching (ERPS)
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: LAN Redundancy Scaling Networks.
VLAN Trunking Protocol (VTP) W.lilakiatsakun. VLAN Management Challenge (1) It is not difficult to add new VLAN for a small network.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: LAN Redundancy Scaling Networks.
Multiple Links Failover Mechanism for RPR Interconnected Rings IEEE WG Orlando, Florida USA March 11~16, 2007.
Example STP runs on bridges and switches that are 802.1D-compliant. There are different flavors of STP, but 802.1D is the most popular and widely implemented.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 LAN Switching and Wireless Implement Spanning Tree Protocols (STP) Chapter.
LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.
Framework & Requirements for an Access Node Control Mechanism in Broadband Multi-Service Networks ANCP WG IETF 71 – Philadelphia draft-ietf-ancp-framework-05.txt.
Slide 1 MPLS-TP Linear Protection / Author / RTP IE Fixed CET I insert classification level © Nokia Siemens Networks MPLS-TP Linear Protection.
Switching Topic 3 VTP. Agenda VTP basics Components Frames and advertisements Domains and revision numbers VTP operations VTP pruning VTP issues.
Topic 5 Spanning tree protocol
Yan Wang Proposed amendments of control frames for c Yan Wang Huawei technologies.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implement Spanning Tree Protocols (STP) LAN Switching and Wireless – Chapter.
+ Lecture#2: Ethernet Asma ALOsaimi. + Objectives In this chapter, you will learn to: Describe the operation of the Ethernet sublayers. Identify the major.
802.17c Protected Inter-Ring Connection Rafi Ram - Corrigent Systems March 2008.
Chapter-5 STP. Introduction Examine a redundant design In a hierarchical design, redundancy is achieved at the distribution and core layers through additional.
Technology Brief: D-Link Unidirectional Link Detection (DULD)
Marc Holness, Product Line Architect, Ciena
Instructor Materials Chapter 6: VLANs
Some aspects to be determined in PIRC July
Lecture#10: LAN Redundancy
Routing and Switching Essentials v6.0
Network Survivability
NT2640 Unit 9 Activity 1 Handout
Presentation transcript:

G.8032 Ethernet Ring Protection Overview March, 2008 ITU-T Q9 – SG 15

Agenda G.8032 Recommendation Introduction G.8032 Objectives and Principles G.8032 Concepts G.8032 Protection Switching G.8032 R-APS Messages G.8032 Items Under Study

ITU-T SG15/Q9 G.8032 Recommendation G.8032 Recommendation consented February 2008 This Recommendation defines the APS protocol and protection switching mechanisms for ETH layer ring topologies. Included are details pertaining to bridged ring protection characteristics, architectures and the ring APS protocol. G.8032 Proposals and Contributions G.8032 Recommendation Consent G.8032 Objective, Principles, and Requirements Setting G.8032 Converged Proposals G.8032 ERP Work Item Approved in ITU-T JAN FEB MAR APR MAY JUN JUL AUG SEP OCT NOV DEC 2006 2007 2008

G.8032 Objectives and Principles Use of standard 802 MAC and OAM frames around the ring. Uses standard 802.1Q (and amended Q bridges), but with xSTP disabled. Ring nodes supports standard FDB MAC learning, forwarding, flush behaviour and port blocking/unblocking mechanisms. Prevents loops within the ring by blocking one of the links (either a pre-determined link or a failed link). Monitoring of the ETH layer for discovery and identification of Signal Failure (SF) conditions. Protection and recovery switching within 50 ms for typical rings. Total communication for the protection mechanism should consume a very small percentage of total available bandwidth.

G.8032 Terms and Concepts Ring Protection Link (RPL) – Link designated by mechanism that is blocked during Idle state to prevent loop on Bridged ring RPL Owner – Node connected to RPL that blocks traffic on RPL during Idle state and unblocks during Protected state Link Monitoring – Links of ring are monitored using standard ETH CC OAM messages (CFM) Signal Fail (SF) – Signal Fail is declared when ETH trail signal fail condition is detected No Request (NR) – No Request is declared when there are no outstanding conditions (e.g., SF, etc.) on the node Ring APS (R-APS) Messages – Protocol messages defined in Y.1731 and G.8032 Automatic Protection Switching (APS) Channel - Ring-wide VLAN used exclusively for transmission of OAM messages including R-APS messages

G.8032 Timers G.8032 specifies the use of different timers to avoid race conditions and unnecessary switching operations WTR (Wait to Restore) Timer – Used by the RPL Owner to verify that the ring has stabilized before blocking the RPL after SF Recovery Hold-off Timers – Used by underlying ETH layer to filter out intermittent link faults Faults will only be reported to the ring protection mechanism if this timer expires

Controlling the Protection Mechanism Protection switching triggered by Detection/clearing of Signal Failure (SF) by ETH CC OAM Remote requests over R-APS channel (Y.1731) Expiration of G.8032 timers R-APS requests control the communication and states of the ring nodes Two basic R-APS messages specified - R-APS(SF) and R-APS(NR) RPL Owner may modify the R-APS(NR) indicating the RPL is blocked: R-APS(NR,RB) Ring nodes may be in one of two states Idle – normal operation, no link/node faults detected in ring Protecting – Protection switching in effect after identifying a signal fault

Ring Idle State Physical topology has all nodes connected in a ring ERP guarantees lack of loop by blocking the RPL (link between 6 & 1 in figure) Logical topology has all nodes connected without a loop. Each link is monitored by its two adjacent nodes using ETH CC OAM messages Signal Failure as defined in Y.1731, is trigger to ring protection Loss of Continuity Server layer failure (e.g. Phy Link Down) ETH-CC ETH-CC RPL Owner RPL ETH-CC ETH-CC ETH-CC ETH-CC ETH-CC ETH-CC ETH-CC 1 2 6 4 3 5 RPL Physical topology 1 2 6 4 3 5 Logical topology

Protection Switching  Link Failure Link/node failure is detected by the nodes adjacent to the failure. The nodes adjacent to the failure, block the failed link and report this failure to the ring using R-APS (SF) message R-APS (SF) message triggers RPL Owner unblocks the RPL All nodes perform FDB flushing Ring is in protection state All nodes remain connected in the logical topology. RPL Owner RPL R-APS(SF) R-APS(SF) 1 2 6 4 3 5 RPL 1 2 6 4 3 5 RPL Physical topology 1 2 6 4 3 5 1 2 6 4 3 5 Logical topology

Protection Switching  Failure Recovery When the failed link recovers, the traffic is kept blocked on the nodes adjacent to the recovered link The nodes adjacent to the recovered link transmit R-APS(NR) message indicating they have no local request present When the RPL Owner receives R-APS(NR) message it Starts WTR timer Once WTR timer expires, RPL Owner blocks RPL and transmits R-APS (NR, RB) message Nodes receiving the message – perform a FDB Flush and unblock their previously blocked ports Ring is now returned to Idle state R-APS(NR, RB) RPL Owner R-APS(NR) RPL R-APS(NR) 1 2 6 4 3 5 RPL 1 2 6 4 3 5 RPL Physical topology 2 1 6 1 2 6 4 3 5 3 4 5 Logical topology

Signaling Channel Information ERP uses R-APS messages to manage and coordinate the protection switching R-APS defined in Y.1731 - OAM common fields are defined in Y.1731. Version – ‘00000’ – for this version of Recommendation OpCode – defined to be 40 in Y.1731 Flags – ‘00000000’ – should be ignored by ERP 1 2 3 4 8 7 6 5 MEL Version (0) OpCode (R-APS = 40) Flags (0) TLV Offset (32) R-APS Specific Information (32 octets) .. … 37 [optional TLV starts here; otherwise End TLV] last End TLV (0) Defined by Y.1731 Defined by G.8032 Non-specified content

R-APS Specific Information Specific information (32octets) defined by G.8032 Request/Status(4bits) – ‘1011’ = SF | ’0000’ = NR | Other = Future Status – RB (1bit) – Set when RPL is blocked (used by RPL Owner in NR) Status – DNF (1bit) – Set when FDB Flush is not necessary (Future) NodeID (6octets) – MAC address of message source node (Informational) Reserved1(4bits), Status Reserved(6bits), Reserved2(24octets) - Future development  1 2 3 4 8 7 6 5 1 Request /State Reserved 1 Status Node ID (6 octets)   RB DNF Status Reserved (Node ID) Reserved 2 (24 octets)

Items Under Study G.8032 is currently an initial recommendation that will continue to be enhanced. The following topics are under study for future versions of the recommendation: Interconnected rings scenarios: shared node, shared links RPL blocked at both ends – configuration of the ring where both nodes connected to the RPL control the protection mechanism Support for Manual Switch – administrative decision to close down a link and force a “recovery” situation are necessary for network maintenance Support for Signal Degrade scenarios – SD situations need special consideration for any protection mechanism Non-revertive mode– Allows the network to remain in “recovery” configuration either until a new signal failure or administrative switching RPL Displacement – Displacement of the role of the RPL to another ring link flexibly in the normal (idle) condition In-depth analysis of different optimizations (e.g., FDB flushing) Etc.

Thank You

Backup

G.8032 Basic Functions Robustness: Source Steering Protection Failure Robustness: Source Steering Protection 50ms Switch Times Connectivity: Unicast, MC and BC Data Transfers Multicast Flow Unicast

ERP Functionality Decomposition Inputs – Local node requests, ETH signals, R-APS messages, WTR Timer. Filters – Local Priority Logic, Validity Check, Guard Timer, Priority Logic – guarantee that highest priority message arrives for processing. ERP Processing – R-APS Request Processing – processes filtered message according to State Machine with knowledge of current state and RPL-Owner indication Outputs – Node functions (FDB Flushing, Block/Unblock port), sending (or stopping) R-APS messages

State Machine * Three node states – Inputs Outputs Node State High Priority request Row# Actions Next node state * Initialization Stop guard timer Stop WTR timer If RPL Owner: Block RPL port Unblock non-RPL port Tx R-APS (NR, RB) Else: Block both ports Stop Tx R-APS B A (Idle) Local SF 1 Block failed port; Unblock non Failed port; Tx R-APS(SF); Flush FDB; Local Clear SF 2 No action A R-APS(SF) 3 Unblock non Failed port; If not “DNF” Flush FDB; WTR Expires 4 WTR Running 5 R-APS(NR, RB) 6 R-APS(NR) 7 Three node states – Initialization – when first defining the ring A (Idle) – the ‘normal’ state of the ring nodes with RPL blocked and all nodes/ports working B (Protecting) – when protection switching is in effect, RPL unblocked, other (usually fault) link is blocked. Different input messages assigned priority as appears in the State Machine description. Priority mechanism to allow proper reaction to faults State Machine describes the actions to be taken by the node dependent on current state and input message. Only message with highest priority will pass through the filtering. Different actions include – transmission of R-APS message, blocking/unblocking a port, flushing the FDB, switching current state of node, and starting/stopping timers.

State Machine FDB flushing will clear all of the learned filtering rules within the node. Current Recommendation includes basic optimization – only flushing once on fault discovery and once on recovery. DNF status flag is for future definition Inputs Outputs Node State High Priority request Row# Actions Next node state B (Protecting) Local SF 8 Block failed port; Unblock non Failed port; Stop WTR; Tx R-APS(SF); Local Clear SF 9 Start guard timer, Tx R-APS(NR), R-APS(SF) 10 Stop WTR, Unblock non Failed port, Stop Tx R-APS WTR Expires 11 Block RPL port, Unblock non-RPL port Tx R-APS (NR,RB) Flush FDB, A WTR Running 12 No action R-APS(NR, RB) 13 If not RPL Owner: Unblock both ports, Stop Tx R-APS, If not “DNF” Flush FDB R-APS(NR) 14 If RPL Owner: Start WTR

Switching Triggers Detection/Clearing of SF (Signal Fail): SF: Loss of CCM, SF signal passed up from underlying (sub)layer Switching is performed when hold-off timer expires after detection of SF. Operator’s request: Lockout, Forced switch, Manual switch, Clear (for future specification) Remote request: Switching request indicated in received R-APS information from the other node. Protection switching algorithm is based on priorities assigned to all triggers

Ethernet Rings and the RPL Ethernet nodes connected in a ring topology. Each node connected to two neighbors via links (E & W ports) Deterministic network topology Avoid loops within ring by blocking a designated link (RPL) Node responsible to control the blocking state of RPL is RPL owner RPL is unblocked during protection state and may revert to blocked during recovery RPL

Scenario A - Normal to Protection B C D E F RPL G RPL Owner Normal A B failure C Protection state D Flush SF SF 50 ms SF SF SF Flush Flush Flush Flush Flush E Flush F SF SF SF SF SF G SF Normal State Failure Occurs Nodes C and D detect local Signal Failure condition and after respecting hold-off time and Block failed port [row 1] Node C and D periodically send SF message, on both ring ports, while SF condition persists. Each node performs a FDB Flush when receiving the SF message RPL Owner receives SF message and unblocks its end of RPL link [row 3] Stable State – SF messages on the ring Further SF messages trigger no further action [row10] Message source R-APS ch block Client ch block

Scenario B recovery A B C D E F G A B C D E F G H RPL G RPL Owner Protection state failure A SF SF SF SF SF SF B recovery C NR Confirmation time NR NR NR NR NR D E F NR, RPL Blocked NR, RPL Blocked 50 ms NR, RPL Blocked Flush Normal G Flush Flush Flush Flush H Flush Flush NR, RPL Blocked NR NR, RPL Blocked NR, RPL Blocked Stable SF condition Nodes C and D continue to send SF message every 5 secs. Recovery of Link failure Nodes C and D detect clearing of SF condition , start guard timer and initiate periodical transmission of NR message on both ring ports. ( Guard timer prevents reception of R-APS messages) [row 9] When the RPL Owner receives NR message, it starts the WTR timer [row 14] When node C and D expire the guard timer, they may accept the new R-APS messages that they receive. [in guard timer] At expiration of WTR timer, RPL owner blocks its end of the RPL, sends, NR RB message [row 11] Each node that receives the NR,RB message it flushes its FDB. When Nodes C and D receive NR RB message , they remove block on their blocked ports. [row 13] Stable normal condition all nodes in Idle state