Professional Documents
Culture Documents
Sonet PDF
Sonet PDF
George N. Rouskas
Department of Computer Science North Carolina State University
Outline
1. Protection Switching Architectures 2. SONET Ring Types 3. Two-Fiber Protection 4. Four-Fiber Protection 5. Automatic Switching Protocol (APS)
Protection Switching
Network must continue to provide reliable services even in the presence of failures errors poor signal quality Protection techniques: ensure survivability involve the provision of redundant capacity reroute trafc when failures occur
APS Protocol
OAM protocol detects abnormal conditions Automatic protection switching (APS) protocol: switches trafc from working to protection entity upon failure no manual intervention Manual intervention necessary for repairing failed entity Revertive or non-revertive operation ATM protection techniques and APS protocol very similar
Non-Ring APS
Four architectures: 1. 1+1 switching 2. 1:1 switching 3. 1:n switching 4. m:n switching T-carrier employed protection switching
1+1 Switching
Protection path
Bridge
Selector
Source
Sink
Working path
Protection Domain
CSC/ECE 791B, Spring 2008: SONET Protection Switching Copyright c 2007 by George N. Rouskas p.6
1:1 Switching
Protection path
Bridge
Selector
Source
Sink
Working path
Protection Domain
CSC/ECE 791B, Spring 2008: SONET Protection Switching Copyright c 2007 by George N. Rouskas p.7
1:n Switching
Switch Protection path Switch
Switch
Selector
Source n
Sink n
Source 2
Sink 2
Source 1
Sink 1
CO
CO
Business
Business
CO
SONET Rings
Self-healing rings: services automatically restored following a failure or signal degradation restoration times less than 60 ms Deploy ber for loop diversity: 1. separate ber sheath 2. separate conduits 3. route diversity: take different physical routes from src to dest
Attribute Number of bers per link Direction of the signal Level of protection switching
Unidirectional Rings
Only one direction around the ring used for two-way communication
Asymmetric delays
All working trafc travels in clockwise direction Opposite direction used for protection
NE 1 Span #8 Span #4
NE 2 Span #2
NE 4
Span #7 Span #3
NE 3
Bidirectional Rings
Physically indistinguishable from unidirectional rings; difference is in direction of trafc ow Under normal routing, both directions of a connection: travel along ring through same ring nodes travel in two opposite directions
Symmetric delays
Working trafc in both clockwise and counter-clockwise direction If links between NE1-NE2 fail, protection switching uses spans between NE2-NE3, NE3-NE4, and NE4-NE1
NE 1 Span #8 Span #4
NE 2 Span #2
NE 4
Span #7 Span #3
NE 3
NE1
NE2
Each ber span carries both working-trafc channels and protection channels At most half the channels on each ber can carry working trafc
NE1
NE2
Working and protection pairs carried over different bers Twice as much ber cable, but each ber can be used to capacity
Connection (a) Normal operation (b) Path switched restoration (path protection)
UPSR
1+1 protection: trafc from A to B sent simultaneously on working/protection bers B monitors both bers, selects the better signal Fast restoration: action required only at receivers no need for complicated signaling (APS) protocol But: asymmetric delays not a problem for voice trafc problem for TCP window ow control
UPSR (contd)
NE 1
NE 2
UPSR (contd)
No spatial reuse: a bidirectional connection uses capacity on each link of ring max trafc on ring equal to link speed No limit on number of nodes, length of ring Simple, easy to implement, low cost Popular in lower-speed local exchange and access networks
BLSR/4
Two bers for working trafc, two bers for protection Working trafc carried on both directions along the ring Trafc routed on shortest path between end nodes Spatial reuse: each connection uses capacity only on shortest path aggregate trafc can signicantly exceed link speed shortest path routing maximizes spatial reuse Extra trafc capability (1:1 protection)
BLSR/4 (contd)
NE 1 NE 2
NE 3 Protection fiber
Working NE 1 Protection NE 2 NE 3
NE 6
NE 5
NE 4
Working NE 1 Protection NE 2 NE 3
NE 6
NE 5
NE 4
Working NE 1 Protection NE 2 NE 3
NE 6
NE 5
NE 4
BLSR/2
Protection bers embedded within working bers Both bers used to carry working trafc Half the capacity on each ber reserved for protection Span protection not possible Line protection similar to BLSR/4: upon link failure, trafc rerouted along other part of ring using protection capacity on two bers trafc mapping a tricky problem extra trafc capability (1:1 protection)
W: 1-6 P: 7-12 NE 5 NE 4
W: 1-6 P: 7-12
W: 1-6 P: 7-12
W: 1-6 P: 7-12
W: 1-6 P: 7-12
W: 1-6 P: 7-12
STS-1 #3 NE 1
STS-1 #3
W: 1-6 P: 7-12 NE 5 NE 4
W: 1-6 P: 7-12
W: 1-6 P: 7-12
W: 1-6 P: 7-12
W: 1-6 P: 7-12
W: 1-6 P: 7-12
BLSRs
More efcient than UPSRs for distributed trafc patterns Protection capacity shared among all connections Example: 10-node ring, 1.5 Mbps between adjacent nodes UPSR requires 15 Mbps protection capacity on each ber BLSR/2 requires 1.5 Mbps protection capacity on each ber
BLSRs (contd)
Maximum number of nodes: 16 Maximum ring length: 1200 Km (6 ms propagation delay) BLSRs deployed in regional/national high-speed (OC-48, OC-192) networks BLSR/4 can handle more failures than BLSR/2
ADM
ADM
ADM
SONET Ring #1
ADM
MN MN
MN MN
ADM
SONET Ring #2
ADM
APS Objective
Whether trafc is received over the working or protection ber is determined by: 1. the status of the bridge at source node 2. the status of the selector at destination node Objective: establish agreement between source and destination regarding the status of bridge/selector K1, K2 LOH bytes used by APS protocol for this purpose
APS Events
Protection switching: a change in the current position of the bridge/selector Initiated due to certain events: 1. externally initiated commands, e.g., forced switch, manual switch, lockout of protection, etc. 2. automatically initiated command, e.g., loss of signal (LOS), loss of frame (LOF), signal degrade (due to parity errors), etc.
W point-to-point rings, each on one of W wavelengths high cost: W OADMs, SONET ADMs at each node
independent rings severe electro-optic bottleneck
2. Static virtual topology, based on trafc pattern fewer OADMs, SONET ADMs, alleviates bottleneck 3. Dynamic virtual topology requires sophisticated OXCs, trafc grooming capabilities