Protection in SONET Path layer protection scheme operate

  • Slides: 13
Download presentation
Protection in SONET • Path layer protection scheme: operate on individual connections • Line

Protection in SONET • Path layer protection scheme: operate on individual connections • Line layer protection scheme: operate on the entire set of connections at once 1

Protection in SONET • Point-to-Point Links – 1+1 protection – 1: N protection •

Protection in SONET • Point-to-Point Links – 1+1 protection – 1: N protection • Self-healing rings – Unidirectional path-switched rings (UPSR) – Four-fiber bidirectional line-switched rings (BLSR/4) – Two-fiber bidirectional line-switched rings (BLSR/2) • Ring interconnection – Dual homing 2

Point-to-Point Links • 1+1 protection – Traffic transmitted simultaneously on two separate fibers from

Point-to-Point Links • 1+1 protection – Traffic transmitted simultaneously on two separate fibers from the source to the destination – Destination simply selects one of the two fibers for reception – Fast protection – Require no signaling protocol between the two ends 3

Point-to-Point Links • 1: 1 protection – Traffic transmitted over only the working fiber

Point-to-Point Links • 1: 1 protection – Traffic transmitted over only the working fiber – If the working fiber is cut, the source and destination both switch over to the protection fiber – An APS protocol is required – Not as fast as 1+1 protection • Advantages over 1+1 protection – Under normal operation, the protection fiber can be used to transmit lower-priority traffic – Can extend to 1: N protection where N working fibers share a single protection fiber 4

Self-Healing Rings • A ring is the simplest topology that is 2 connected resilient

Self-Healing Rings • A ring is the simplest topology that is 2 connected resilient to failures • Much of the carrier infrastructure today uses SONET rings called self-healing rings – Can automatically detect failures and reroute traffic away from the failed links/nodes rapidly (within 60 ms) • Three ring architectures: UPSR, BLSR/4, BLSR/2 – Unidirectional ring: carry working traffic in only one direction of the ring – Bidirectional ring: carry working traffic in both directions 5

Unidirectional Path-Switched Rings (UPSR) • Two fibers: one working and one protection • Traffic

Unidirectional Path-Switched Rings (UPSR) • Two fibers: one working and one protection • Traffic transmitted simultaneously on the working fiber in the clockwise direction and on the protection fiber in the counter clockwise direction • For each connection, destination node monitors both the working path and the protection path and selects the better signal • Traffic switch-over done on a connection-byconnection basis • Essentially path layer 1+1 protection 6

Unidirectional Path-Switched Rings (UPSR) • • Simple to implement Require no communication between the

Unidirectional Path-Switched Rings (UPSR) • • Simple to implement Require no communication between the nodes Protection capacity = working capacity No sharing of the protection bandwidth between connections – Each bidirectional connection uses up capacity on every link in the ring and has dedicated protection bandwidth • Popular in access networks 7

Bidirectional Line-Switched Rings (BLSR) • Working traffic carried on both directions • Four-fiber BLSR

Bidirectional Line-Switched Rings (BLSR) • Working traffic carried on both directions • Four-fiber BLSR (BLSR/4) – Two working fibers and two protection fibers – Employ both span switching and ring switching • Span switching: when a transmitter or receiver on a working fiber fails, the traffic is routed onto the protection fiber between the two nodes on the same link • Ring switching: in case of a fiber cut, the traffic is rerouted around the ring on the protection fibers • Two-fiber BLSR (BLSR/2) – Two fibers, both carry working traffic, half the capacity on each fiber reserved for protection purposes 8 – Employ ring switching, not span switching

Bidirectional Line-Switched Rings (BLSR) • Operate at the line layer • Protection bandwidth can

Bidirectional Line-Switched Rings (BLSR) • Operate at the line layer • Protection bandwidth can be used to carry lowpriority traffic during normal operation • Allow protection bandwidth to be shared between non-overlapping connections • Widely deployed in long-haul and interoffice networks – Most metro carriers have deployed BLSR/2 s – Many long-haul carriers have deployed BLSR/4 s 9

Bidirectional Line-Switched Rings (BLSR) • Handling node failures – The failure of a node

Bidirectional Line-Switched Rings (BLSR) • Handling node failures – The failure of a node is seen by all its adjacent nodes as link failures – Errors can occur if each of the adjacent nodes performs restoration assuming single link failure – Solution: • Nodes adjacent to the failed node exchange messages to determine if they have both recorded link failures • If so, don’t restore any traffic that originates or terminates at the failed node (squelching) • Slower restoration time 10

Ring Interconnection • Simple way: connect the drop sides of two ADMs on different

Ring Interconnection • Simple way: connect the drop sides of two ADMs on different rings back to back – The interconnection is broken if one of the ADMs fails or the link between the two ADMs fails • Solution: dual homing – Use two hub nodes to perform interconnection – Connections are setup between the originating node and both the hub nodes using the drop-and-continue feature in the ADMs 11

Protection in IP Networks • Slow failure detection – Adjacent routers send hello packets

Protection in IP Networks • Slow failure detection – Adjacent routers send hello packets every 10 sec and declare the link down if miss 3 successive hello packets • Slow failure restoration – IP uses dynamic, hop-by-hop routing of packets based on the routing table maintained by the routers – When a failure occurs, the routing protocol updates the routing table at each router in a distributed manner • Routing table convergence time: several seconds • During convergence, packets could be lost or loop within the network 12

Protection in IP Networks • Use Multi-protocol label switching (MPLS) to achieve faster restoration

Protection in IP Networks • Use Multi-protocol label switching (MPLS) to achieve faster restoration • MPLS allows label-switched paths (LSPs) to be set up between nodes – Packets can be sent along the LSPs • Protection schemes can be implemented within the MPLS layer – E. g. , precompute a backup LSP for each working LSP, reroute packets onto the backup LSP when a working LSP fails 13