SONET Survivability Mechanisms CSC/ECE 772: Survivable Networks Spring, 2009, Rudra Dutta.

Slides:



Advertisements
Similar presentations
Igor Umansky Huub van Helvoort
Advertisements

New Timing Distribution Mechanism TICTOC WG, IETF 71th Philadelphia, USA draft-ji-tictoc-new-timing-distribution-mechanism-00.txt Kuiwen Ji
MPLS-TP - 74th IETF (SanFran)1 Linear Protection for MPLS-TP draft-weingarten-mpls-tp-linear-protection-01.txt Stewart Bryant Yaacov Weingarten Nurit Sprecher.
1 Introducing the Specifications of the Metro Ethernet Forum.
Network Protection and Restoration Session 5 - Optical/IP Network OAM & Protection and Restoration Presented by: Malcolm Betts Date:
Data Communications and Networking
Generalized Multiprotocol Label Switching: An Overview of Signaling Enhancements and Recovery Techniques IEEE Communications Magazine July 2001.
Protection and Restoration in Optical Network
Synchronous Optical Networks SONET
4/11/40 page 1 Department of Computer Engineering, Kasetsart University Introduction to Computer Communications and Networks CONSYL Digital Carrier.
EECC694 - Shaaban #1 lec # 10 Spring Asynchronous Transfer Mode (ATM) ATM is a specific asynchronous packet-oriented information, multiplexing.
File Name Increasing IP Network Survivability: An Introduction to Protection Mechanisms Jonathan Sadler Lead Engineer - ONG SE October 22,
TX- 1 Faculty ALTTC, Ghaziabad Survivability Of SDH Network By: TX-I Faculty ALTTC, Ghaziabad.
Eighth Edition by William Stallings
On Job Training July 2006 PT Indonesia Comnets Plus
SONET. Telephone Networks {Brief History} Digital carrier systems –The hierarchy of digital signals that the telephone network uses. –Trunks and access.
1 Chapter 6 Client Layers of the Optical Layer A. In the backbone networks a. Synchronous Optical Network (SONET)/ Synchronous Digital Hierachy (SDH) b.
SONET / SDH Nirmala Shenoy Information Technology Department
Chapter 4 Circuit-Switching Networks
Sonet. Definition Short for Synchronous Optical Network, a standard for connecting fiber-optic transmission systems. SONET defines interface standards.
TxRx W P SplitterSwitch (Working Fiber) (Protection Fiber) Traffic flow Linear Protection APS Fast protection; Switching is initiated and executed.
1 EE 400 Asynchronous Transfer Mode (ATM) Abdullah AL-Harthi.
Spatial Reuse Ring Networks Chun-Hung Chen Department of Computer Science and Information Engineering National Taipei University of Technology
SONET Synchronous Optical Network. ECSA – Exchange Carrier Standards Association ANSI – American National Standards Institute SONET was formulated by.
EE 4272Spring, 2003 Chapter 9: Circuit Switching Switching Networks Circuit-Switching Networks Circuit-Switching Concept  Space-Division Switching  Time-Division.
EE 4272Spring, 2003 Protocols & Architecture A Protocol Architecture is the layered structure of hardware & software that supports the exchange of data.
CS335 Networking & Network Administration Wednesday, April 14, 2010.
Synchronous Optical Networks SONET
EE 4272Spring, 2003 Chapter 11. ATM and Frame Relay Overview of ATM Protocol Architecture ATM Logical Connections ATM Cells ATM Service Categories ATM.
1 Multipoint Ethernet Connection Protection
SDH.
1 Introduction to Optical Networks. 2 Telecommunications Network Architecture.
Technique for assuring that a transmitting entity does not overwhelm a receiving entity with data Necessary when data is being sent faster than it.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
Network Access and Transmission Methods Chapter 10.
Chapter 7 WANs and Remote Connectivity. WAN Essentials A WAN traverses a large geographic area A WAN link is a connection from one site to another and.
Chapter 4. After completion of this chapter, you should be able to: Explain “what is the Internet? And how we connect to the Internet using an ISP. Explain.
Lecture Note on Survivability. Impact of Outages Service Outage Impact 50msec0200msec2sec10sec 5min 30min "Hit" TriggerChange- over of CCS Links FCCReportable.
Chapter 2 – X.25, Frame Relay & ATM. Switched Network Stations are not connected together necessarily by a single link Stations are typically far apart.
Internetworking and ATM Lecture 8, April 30, 2003 Data Communications and Networks Mr. Greg Vogl Uganda Martyrs University.
Chapter 6 Wide Area Networking Concepts, Architectures, & Services.
Fiber-Optic Network Architectures. OSI & Layer Model This Course.
Network Technologies Chapter 2. Approaches to Network Communication Connection-Oriented –Circuit-switched –A dedicated connection (circuit) is formed.
Chapter 6 Wide Area Networking Concepts, Architectures, & Services.
17.1 Chapter 17 SONET/SDH Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
TELE202 Lecture 5 Packet switching in WAN 1 Lecturer Dr Z. Huang Overview ¥Last Lectures »C programming »Source: ¥This Lecture »Packet switching in Wide.
SMUCSE 8344 Protection & Restoration of Optical Networks.
William Stallings Data and Computer Communications 7 th Edition Chapter 1 Data Communications and Networks Overview.
Data Communications, Kwangwoon University
1 CHAPTER 8 TELECOMMUNICATIONSANDNETWORKS. 2 TELECOMMUNICATIONS Telecommunications: Communication of all types of information, including digital data,
Computer Networks with Internet Technology William Stallings
Slide 1 MPLS-TP Linear Protection / Author / RTP IE Fixed CET I insert classification level © Nokia Siemens Networks MPLS-TP Linear Protection.
Chapter 17 SONET/SDH Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 14 Other Wired Networks 14.# 1
SONET is used as a WAN. ANSI standard – SONET ITU-T standard – SDH Both are fundamentally similar and compatible.
(Slide set by Norvald Stol/Steinar Bjørnstad
1 Why Optical Layer Protection? Optical layer provides lightpath services to its client layers (e.g., SONET, IP, ATM) Protection mechanisms exist in the.
Issues of the Synchronous Digital Hierarchy
Free Powerpoint Templates Page 1 Free Powerpoint Templates Network topology.
1 Protection in SONET Path layer protection scheme: operate on individual connections Line layer protection scheme: operate on the entire set of connections.
Mr. Sathish Kumar. M Department of Electronics and Communication Engineering I’ve learned that people will forget what you said, people will forget what.
Network Access and Transmission Methods
Presented by Radha Gummuluri ECE-E 641 Fiber Optic Communications
Network Survivability
Optical Layer Protection Schemes
Fiber Optic Communication By
Introduction to Survivable Rings
SURVIVABILITY IN IP-OVER-WDM NETWORKS (2)
Communication Networks: Technology & Protocols
Ethernet and Token Ring LAN Networks
Presentation transcript:

SONET Survivability Mechanisms CSC/ECE 772: Survivable Networks Spring, 2009, Rudra Dutta

Copyright Rudra Dutta, NCSU, Spring, SONET APS Automated Protection Switching – Switches traffic from working to protection resource upon failure – No manual intervention - first such mechanism – Manual intervention necessary for repairs – Revertive or non-revertive operation – Two-fiber and four-fiber variants OAM protocols expected to detect abnormal conditions Similar techniques later used for ATM

Copyright Rudra Dutta, NCSU, Spring, SONET Operation Plesiochronous to Synchronous – Original T-carrier for voice adopted “base rate” (single voice digitized) – Successive higher rates formed by multiplexing – Synchronized (within limits), but not synchronous Synchronous - input/output clocks synchronized – Jitter, wander, phase difference limited to ingress to network, synchronized inside – Multiplexing and interleaving considered functions of network Early native optical transport Ring or non-ring operation

Copyright Rudra Dutta, NCSU, Spring, SONET Layers

Copyright Rudra Dutta, NCSU, Spring, STS-1 Frame (SOH + LOH) (POH) K1 K2

Copyright Rudra Dutta, NCSU, Spring, Automatic Protection Switching APS takes place at the SONET line level Very complex task ANSI APS document (T ) 100 pages long! Only basic operation explained here Emphasis on role of K1, K2 bytes of LOH ATM APS protocol similar, K1, K2 bytes in APS ATM cells

Copyright Rudra Dutta, NCSU, Spring, APS Objective Whether traffic is received over the working or protection fiber is determined by: – The status of the bridge at source node – The status of the selector at destination node Objective: establish agreement between source and destination regarding the status of bridge/selector K1, K2 LOH bytes used by APS protocol for this purpose

Copyright Rudra Dutta, NCSU, Spring, APS Events Protection switching: a change in the current position of the bridge/selector Initiated due to certain events: – Externally initiated commands, e.g., forced switch, manual switch, lockout of protection, etc. – Automatically initiated command, e.g., loss of signal (LOS), loss of frame (LOF), signal degrade (due to parity errors), etc.

Copyright Rudra Dutta, NCSU, Spring, APS Protocol: K1, K2 bytes K1 byte: – Switch request (protection switching event) – 4 bits – Destination node – 4 bits (max 16 SONET nodes) K2 byte: – Source node – 4 bits – Long/short bit – Status (of bridge/selector) – 3 bits Source/destination use K1, K2 bytes to coordinate protection switching actions

Copyright Rudra Dutta, NCSU, Spring, APS Protocol Operation Each node: – Uses local priority logic to rank (possibly many) local events – Encodes highest priority event E1 into K1 byte to be sent – Extracts event E2 last received by remote entity – Uses global priority logic to rank events E1, E2 – Let E be the highest priority event among E1, E2: Sets the status of local bridge/selector based on E Encodes status in the K2 byte to be sent – If status != status of last K2 byte received, mismatch alarm

Copyright Rudra Dutta, NCSU, Spring, Underlying concepts From non-ring APS – 1+1 switching – 1:1 switching – 1:n switching – Further generalizations – Physical diversity

Copyright Rudra Dutta, NCSU, Spring, Switching

Copyright Rudra Dutta, NCSU, Spring, :1 Switching

Copyright Rudra Dutta, NCSU, Spring, :n Switching

Copyright Rudra Dutta, NCSU, Spring, Access Protection

Copyright Rudra Dutta, NCSU, Spring, SONET Rings Self-healing rings: – Services automatically restored following a failure or signal degradation – Restoration times less than 60 ms Deploy fiber for loop diversity: – Separate fiber sheath – Separate conduits – Route diversity: take different physical routes from source to destination

Copyright Rudra Dutta, NCSU, Spring, SONET Ring Types Choices for various attributes – Number of fibers per link: 2 or 4 – Direction of signal: unidirectional or bidirectional – Level of switching: line or path All 8 ring types are possible – But three have become common in practice – UPSR (2 fiber) – BLSR/2 – BLSR/4

Copyright Rudra Dutta, NCSU, Spring, Direction Unidirectional – Only one direction around the ring used for two-way communication Asymmetric delays – All working traffic travels in clockwise direction – Opposite direction used for protection Bidirectional – Physically indistinguishable from unidirectional rings; difference is in direction of traffic flow – Under normal routing, both directions of a connection: Travel along ring through same ring nodes Travel in two opposite directions - Symmetric delays – Working traffic in both clockwise and counter-clockwise direction – If links between NE1-NE2 fail, protection switching uses spans between NE2-NE3, NE3-NE4, and NE4-NE1 ADM

Copyright Rudra Dutta, NCSU, Spring, Number of Fibers 2 or 4 fibers between each pair of SONET nodes in the ring – 2-fiber rings robust enough for small geographical area (within city), may survive single failure, will partition with two or more – 4-fiber rings used for regional, national backbones, may survive multiple failures 2-fiber ring – Each fiber span carries both working-traffic channels and protection channels – At most half the channels on each fiber can carry working traffic 4-fiber ring – Working and protection pairs carried over different fibers – Twice as much fiber cable, but each fiber can be used to capacity

Copyright Rudra Dutta, NCSU, Spring, Switching Level Concepts valid in general mesh networks (not just rings) Path switching: – Restoration of traffic handled by source/destination of each affected traffic stream – Source/destination reroute traffic in the event of a failure somewhere in the route – Affected traffic streams may take different protection routes – Also called path protection – Implemented in a 1+1 or 1:n arrangements Line switching: – Restoration of traffic is handled by the nodes at the ends of failed link, not the sources/destinations – Two ways to implement: Span protection: if a fiber is cut between two nodes, traffic is switched to another fiber between same two nodes Line protection: traffic is switched to another route through the network between the same two nodes – All affected traffic streams take same protection route

Copyright Rudra Dutta, NCSU, Spring, UPSR 1+1 protection: traffic from A to B sent simultaneously on working/protection fibers B monitors both fibers, selects the better signal Fast restoration: – Action required only at receivers – No need for complicated signaling (APS) protocol But: asymmetric delays – Not a problem for voice traffic – Potentially problem for TCP window flow control Line switching not a natural choice with unidirectional ring No spatial reuse: – A bidirectional connection uses capacity on each link of ring – Max traffic on ring equal to link speed No limit on number of nodes, length of ring Simple, easy to implement, low cost Popular in lower-speed local exchange and access networks

Copyright Rudra Dutta, NCSU, Spring, UPSR

Copyright Rudra Dutta, NCSU, Spring, BLSR/4 Two fibers for working traffic, two fibers for protection Working traffic carried on both directions along the ring Traffic routed on shortest path between end nodes Spatial reuse: – Each connection uses capacity only on shortest path – Aggregate traffic can significantly exceed link speed – Shortest path routing maximizes spatial reuse Extra traffic capability (1:1 protection) Span protection: traffic switched to protection ber between two nodes where failure occurred – Transmitter/receiver failures on a working fiber – Working fiber cuts Line protection: traffic rerouted around the ring on protection fibers – Cuts of both protection and working bers along a link – Node failures

Copyright Rudra Dutta, NCSU, Spring, BLSR/4

Copyright Rudra Dutta, NCSU, Spring, BLSR/2 Protection fibers embedded within working bers – Both fibers used to carry working traffic – Half the capacity on each fiber reserved for protection Span protection not possible Line protection similar to BLSR/4: – Upon link failure, traffic rerouted along other part of ring using protection capacity on two fibers – Traffic mapping a tricky problem – Extra traffic capability (1:1 protection) Not discussing details