1 Why Optical Layer Protection? Optical layer provides lightpath services to its client layers (e.g., SONET, IP, ATM) Protection mechanisms exist in the.

Slides:



Advertisements
Similar presentations
New Timing Distribution Mechanism TICTOC WG, IETF 71th Philadelphia, USA draft-ji-tictoc-new-timing-distribution-mechanism-00.txt Kuiwen Ji
Advertisements

Network Protection and Restoration Session 5 - Optical/IP Network OAM & Protection and Restoration Presented by: Malcolm Betts Date:
Slide 111 May 2008 Point-to-Multipoint in 802.1Qay Nurit Sprecher, Nokia Siemens Networks Hayim Porat, Ethos Networks.
Generalized Multiprotocol Label Switching: An Overview of Signaling Enhancements and Recovery Techniques IEEE Communications Magazine July 2001.
Protection and Restoration in Optical Network
TX- 1 Faculty ALTTC, Ghaziabad Survivability Of SDH Network By: TX-I Faculty ALTTC, Ghaziabad.
Eighth Edition by William Stallings
Wavelength Routed Networks Wavelength Assignment Wavelength Conversion Cost Implications Network Modeling.
SMUCSE 8344 Optical Networks Introduction. SMUCSE 8344 Why Optical? Bandwidth Low cost ($0.30/yard) Extremely low error rate ( vs for copper.
Lecture: 4 WDM Networks Design & Operation
1 EL736 Communications Networks II: Design and Algorithms Class3: Network Design Modeling Yong Liu 09/19/2007.
1 Wide-Sense Nonblocking Multicast in a Class of Regular Optical Networks From: C. Zhou and Y. Yang, IEEE Transactions on communications, vol. 50, No.
Optical communications & networking - an Overview
Optical Networks Topics Optical Links –Light Sources, Detectors and Receivers –Optical Fiber Channel –Optical Amplifiers Digital Optical Communications.
9/22/2003Kevin Su Traffic Grooming in WDM Networks Kevin Su University of Texas at San Antonio.
Chapter 4 Circuit-Switching Networks
TxRx W P SplitterSwitch (Working Fiber) (Protection Fiber) Traffic flow Linear Protection APS Fast protection; Switching is initiated and executed.
Study of the Restoration Path Blocking Problem in Optical Networks Fang Yu EECS Berkeley Joint work with AT&T Research Labs.
Reliability and Resilience in Data Communication Networks
2015/6/291 Fault Management in IP- Over-WDM Networks: WDM Protection Versus IP Restoration Adviser: Ho-Ting Wu Presenter: Ze-Yang Guo.
Finding Protection Cycles in DWDM Networks 2002 IEEE ICC on Volume 5, 28 April-2 May Page(s): Reporter: Jyun-Yong Du.
Control and Traffic Management Paper: Banerjee et al.: ” Generalized multiprotocol label switching: an overview of signaling enhancements and recovery.
Network Topologies.
1 Introduction to Optical Networks. 2 Telecommunications Network Architecture.
1 EL736 Communications Networks II: Design and Algorithms Class10: Restoration and Protection Design of Resilient Networks Yong Liu 11/28/2007.
NTNU Protection switching TTM1: Optical transport and access networks By Steinar Bjørnstad 2014.
1 Protection Mechanisms for Optical WDM Networks based on Wavelength Converter Multiplexing and Backup Path Relocation Techniques Sunil Gowda and Krishna.
TTM1 – 2013: Core networks and Optical Circuit Switching (OCS)
Lecture Note on Dense Wave Division Multiplexing (DWDM)
Fiber-Optic Network Architectures. OSI & Layer Model This Course.
November 18, Traffic Grooming in Optical WDM Networks Presented by : Md. Shamsul Wazed University of Windsor.
SONET Survivability Mechanisms CSC/ECE 772: Survivable Networks Spring, 2009, Rudra Dutta.
1 Optical Burst Switching (OBS). 2 Optical Internet IP runs over an all-optical WDM layer –OXCs interconnected by fiber links –IP routers attached to.
SMUCSE 8344 Protection & Restoration of Optical Networks.
William Stallings Data and Computer Communications 7 th Edition Chapter 1 Data Communications and Networks Overview.
Lightpath Restoration in WDM Optical Networks A Survey in IEEE Network Magazine Nov/Dec 2000.
Lecture: 6 Network Survivability and Robustness Ajmal Muhammad, Robert Forchheimer Information Coding Group ISY Department.
1 CHAPTER 8 TELECOMMUNICATIONSANDNETWORKS. 2 TELECOMMUNICATIONS Telecommunications: Communication of all types of information, including digital data,
1 Traffic Engineering in Multi-Granularity, Heterogeneous, WDM Optical Mesh Networks Through Dynamic Traffic Grooming Keyao Zhu, Hongyue Zhu, and Biswanath.
Logical Topology Design
What is Bandwidth on Demand ? Bandwidth on Demand (BoD) is based on a technology that employs a new way of managing and controlling SONET-based equipment.
Slide 1 MPLS-TP Linear Protection / Author / RTP IE Fixed CET I insert classification level © Nokia Siemens Networks MPLS-TP Linear Protection.
1 Dynamic Service Provisioning in Converged Network Infrastructure Muckai Girish Atoga Systems.
CSC Survivability Anuj Dewangan Parinda Gandhi.
Communication Networks - Overview CSE 3213 – Fall November 2015.
SONET is used as a WAN. ANSI standard – SONET ITU-T standard – SDH Both are fundamentally similar and compatible.
Impact of Photonic Integration on Optical Services Serge Melle VP Technical Marketing, Infinera.
Two-layer Restoration Scheme for IP over Optical Networks with MPLS Jia Ke, L. Mason, Q. Yang ICIS, School of EEE, Nanyang Technological University
Survivable Traffic Grooming with Differentiated End-to-End Availability Guarantees in WDM Mesh Networks Proceedings of the 13th IEEE Workshop on Local.
10/6/2003Kevin Su Traffic Grooming for Survivable WDM Networks – Shared Protection Kevin Su University of Texas at San Antonio.
(Slide set by Norvald Stol/Steinar Bjørnstad
Unit III Bandwidth Utilization: Multiplexing and Spectrum Spreading In practical life the bandwidth available of links is limited. The proper utilization.
Data Communications and Networks Chapter 1 - Classification of network topologies Data Communications and Network.
1 Simple provisioning, complex consolidation – An approach to improve the efficiency of provisioning oriented optical networks Tamás Kárász Budapest University.
1 Dynamic RWA Connection requests arrive sequentially. Setup a lightpath when a connection request arrives and teardown the lightpath when a connection.
1 Protection in SONET Path layer protection scheme: operate on individual connections Line layer protection scheme: operate on the entire set of connections.
Optimal Design of Survivable Mesh Networks Based on Line Switched WDM Self-Healing Rings IEEE/ACM Transactions on Networking, Vol 11, NO.3, June,2003 Andrea.
Introduction to Communication Lecture (07) 1. Bandwidth utilization Bandwidth utilization is the wise use of available bandwidth to achieve specific goals.
This teaching material is a part of e-Photon/ONe Master study in Optical Communications and Networks Course and module: Author(s):
Redundancy. Single point of failure Hierarchical design produces many single points of failure Redundancy provides alternate paths, but may undermine.
Improving OBS Efficiency Li, Shuo, Meiqian Wang. Eric W. M. Wong, Moshe Zukerman City University of Hong Kong 1.
Network Survivability
The University of Adelaide, School of Computer Science
Optical Layer Protection Schemes
Fiber Optic Communication By
The University of Adelaide, School of Computer Science
The University of Adelaide, School of Computer Science
SURVIVABILITY IN IP-OVER-WDM NETWORKS (2)
Optical communications & networking - an Overview
Ethernet and Token Ring LAN Networks
Presentation transcript:

1 Why Optical Layer Protection? Optical layer provides lightpath services to its client layers (e.g., SONET, IP, ATM) Protection mechanisms exist in the client layers, so why need protection in optical layer? –IP and ATM networks don’t have extensive protection functions as SONET –Capacity efficient due to protection capacity sharing across multiple pairs of client layer equipments –Significant savings in equipment cost

2 Why Optical Layer Protection? –Handle fiber cuts more efficiently than the client layers –Provide an additional degree of resilience (e.g., protect against multiple failures) –Can use mesh-based protection schemes that require significantly less protection capacity than ring-based schemes

3 Limitations of Optical Layer Protection Can’t handle all failures: client equipment failures must be dealt with by the client layer Protect traffic in units of lightpaths: can’t protect only part of the traffic within a lightpath Need pay careful attention to interworking of protection schemes between different layers

4 Service Classes Based on Protection Optical layer can provide multiple classes of service based on the type of protection provided –The classes differ in the level of connection availability provided and the connection restoration time –Different classes are supported using different protection schemes Possible service classes –Platinum: provide the highest level of availability and the fastest restoration times (comparable to SONET protection schemes) Can use dedicated 1+1 protection scheme

5 Service Classes Based on Protection –Gold: provide high availability and fast restoration times (hundreds of ms) Can use shared mesh protection scheme –Silver: below gold in terms of availability and restoration time Best-effort restoration –Bronze: provide unprotected lightpaths –Lead: supported using protection bandwidth reserved for other classes of service; connections are preempted when the bandwidth is needed to protect other high- priority traffic

6 Optical Layer Protection Schemes Optical channel (OCh) layer (or path layer) protection schemes –Restore one lightpath at a time –Need demultiplex all wavelengths Optical multiplex section (OMS) layer (or line layer) protection schemes –Restore the entire group of lightpaths on a link –Require less equipment

7 Optical Layer Protection Schemes OLTs and OADMs can provide both OCh and OMS layer protection in linear or ring configurations OXCs can provide OCh layer protection in linear, ring, and mesh configurations Backbone networks: use unprotected WDM point- to-point systems and rely on OXCs to perform the protection functions Metropolitan networks: use WDM line terminals and OADMs to perform protection functions

8 Optical Layer Protection Schemes OMS layer protection schemes –1+1 –1:1 –OMS-DPRing –OMS-SPRing OCh layer protection schemes –1+1 –OCh-SPRing –OCh-Mesh

9 1+1 OMS Protection Dedicated protection in point-to-point links At one end, the composite WDM signal is bridged onto both the working fiber and the protection fiber using an optical splitter At the other end, an optical switch selects the better among the two signals

10 1:1 OMS Protection Shared protection in point-to-point links The composite WDM signal is transmitted over only the working fiber –Use a switch at the transmitter, instead of a splitter If the working fiber is cut, both ends switch over to the protection fiber –Need an APS protocol Support low priority traffic on the protection fiber Allow N working systems to share a single protection system

11 OMS-DPRing Dedicated protection ring Two fibers operate in opposite directions Each node transmits on both directions of the ring –Different nodes must transmit at different wavelengths Normal operation: the ring functions as a bus, with one pair of amplifiers turned off and all the others turned on When a link fails: an amplifier pair next to the failed link are turned off and the ones that were originally inactive are turned on

12 OMS-SPRing Shared protection ring Four fibers, analogous to a SONET BLSR/4 The two protection fibers do not have attached WDM equipment Use either span switch or ring switch Two-fiber version –Dedicate half the wavelengths on each fiber for protection purposes –Make the protection wavelengths on one fiber correspond to the working wavelengths on the other fiber  signals can be rerouted w/o requiring wavelength conversion

OCh Dedicated Protection Works in point-to-point, ring (OCh-DPRing), and mesh configurations Two lightpaths on disjoint routes are setup for each client connection The client signal is split at the input, the destination selects the better of the two lightpaths No signaling required  fast restoration No protection bandwidth sharing  bandwidth inefficient

14 OCh-SPRing Shared protection ring Similar to SONET BLSR/4, but operate at the optical channel layer Working lightpaths are set up on the shortest path along the ring When a working lightpath fails, it’s restored using span switch or ring switch Non-overlapping lightpaths in the ring can share a single wavelength around the ring for protection  more efficient than OCh-DPRing

15 OCh-Mesh Protection Backbone networks are meshed For mesh networks, OCh-mesh protection schemes are more bandwidth-efficient than rings –Efficiency improvements range from 20% to 60%

16 Path-Based v.s Link-Based Protection Path-based: the connection is rerouted end to end on an alternate path –Need notify the source node upon a failure Link-based: the connection is rerouted on an alternate path around the failed link –Need not notify the source node upon a failure –Enable faster restoration than path-based schemes

17 Offline v.s Online Protection Offline protection –Protection path and wavelengths are reserved at the time of connection setup In path-based scheme, a link-disjoint protection path is reserved In link-based scheme, protection paths are reserved around each link of the working lightpath –Fast and guaranteed restoration Online protection –Search for protection paths using the spare capacity in the network upon a failure –Capacity efficient –Slow and no guarantee of restoration

18 Dedicated v.s Shared Protection An offline scheme can use either dedicated protection or shared protection Dedicated protection: each working lightpath is assigned its own dedicated protection bandwidth Shared protection: if two working lightpaths are link-disjoint, they can share protection bandwidth –More capacity efficient than dedicated protection –Protection lightpaths are set up after a failure occurs

19 Classification of OCh-Mesh Protection Schemes OCh-mesh protection schemes offline online Path-basedLink-basedSharedDedicated Link-based Path-based

20 Internetworking between Layers Need coordination between protection mechanisms in different layers Bottom-up sequential approach: start at the layer where the failure occurs, let the layer try to restore service first, then let the higher layer try –Option 1: have the restoration in the lower layer happen so quickly that the upper layer doesn’t detect the failure –Option 2: impose an additional hold-off time in the higher layer before it attempts restoration