0% found this document useful (0 votes)
294 views128 pages

Transport Network Protection

The document discusses traffic protection in transport networks. It describes the need for traffic protection to minimize interruptions of service due to network failures. It then covers different methods of traffic protection, including protection which uses preassigned backup capacity for fast restoration, and restoration which uses any available capacity for slower restoration managed by a network management system. The document dives deeper into concepts like protection scope, architectures, switching criteria and protection schemes.

Uploaded by

phanlinh1987
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
294 views128 pages

Transport Network Protection

The document discusses traffic protection in transport networks. It describes the need for traffic protection to minimize interruptions of service due to network failures. It then covers different methods of traffic protection, including protection which uses preassigned backup capacity for fast restoration, and restoration which uses any available capacity for slower restoration managed by a network management system. The document dives deeper into concepts like protection scope, architectures, switching criteria and protection schemes.

Uploaded by

phanlinh1987
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 128

TRAFFIC PROTECTION IN TRANSPORT NETWORKS

Alberto Bellato CTO Technology and architecture Optical Networks Division ALCATEL Vimercate

Content
>

Transport Network Concept

>
> > > >

Need for traffic protection


Methods for traffic protection: Protection & Restoration Basics for traffic protection

Protection Schemes in Transport Networks


APPENDIX: Protection schemes in SDH/ Sonet/ OTN

A. Bellato CTO T&A Team - OND 2

Content
>

Transport Network Concept

>
> > > >

Need for traffic protection


Methods for traffic protection: Protection & Restoration Basics for traffic protection

Protection Schemes in Transport Networks


APPENDIX: Protection schemes in SDH/ Sonet/ OTN

A. Bellato CTO T&A Team - OND 3

Transport network concept


Scope of a Transport Network is to
>

Transparently carry a client signal over several nodes in the network


Provide means for a service monitoring in order to guarantee an agreed quality of service

>

>

Simplify maintenance operations

A. Bellato CTO T&A Team - OND 4

Transport network concept

Intermediate nodes

A. Bellato CTO T&A Team - OND 5

Transport network concept


Client signals to be carried are mapped over hierarchical transport entities in order to achieve an optimized network management I.e. no need to manage the client signal at intermediate nodes, but bundles of signals with larger granularity

>

>
Intermedia te nodes

OH OH OH

client client client OH


OH client OH client OH client

OH

OH

OH

A. Bellato CTO T&A Team - OND 6

Content
>

Transport Network Concept

>
> > > >

Need for traffic protection


Methods for traffic protection: Protection & Restoration Basics for traffic protection

Protection Schemes in Transport Networks


APPENDIX: Protection schemes in SDH/ Sonet/ OTN

A. Bellato CTO T&A Team - OND 7

Need for traffic protection


>

A transport network should provide a mean for a secure traffic delivery between different sites Need to provide a mechanism able to minimize as much as possible the impact of events that may cause the interruption of the service

>

Note that this is different from network security, where there is the need to protect data from external attacks

A. Bellato CTO T&A Team - OND 8

Failures in the Network


FIBRE DAMAGE
DIG UP FIRE HUMIDITY MICRO-BENDING RODENT VIBRATION

CONNECTOR FAILURE

OPTICAL LINK FAILURE

CONNECTOR DEFECT

NODE FAILURE

TEMPERATURE CYCLING DIRT

N.E. SITE FAILURE

EQUIPMENT FAILURE POWER SUPPLY FAILURE OVERLOADS / SOFTWARE / PROCEDURAL

HARDWARE FAILURE
OPTO-ELECTRONIC DEVICE FAILURE POWER SUPPLY FAILURE

SPLICE FAILURE
VIBRATION CRAFT DEFECTS

A. Bellato CTO T&A Team - OND 9

Why Traffic Protection in Transport Network?

IMPORTANT SOURCE OF COMPETITIVE ADVANTAGE. SOURCE OF PROFITABILITY. GAINS CUSTOMER LOYALTY.

REDUCES NETWORK MAINTENANCE COSTS.


MINIMISES BAD PRESS.

A. Bellato CTO T&A Team - OND 10

Users Dependency in Telecoms


ESTIMATED BUSINESS LOSS DUE TO TELECOMS SERVICE FAILURE, AN FCA (US) REPORT:
$107000 PER MINUTE IN A BROKERAGE INSTITUTION $47000 PER MINUTE IN A CREDIT CARD/SALES AUTHORISATION $2500 PER MINUTE IN A PAY PER VIEW $1800 PER MINUTE IN A HOME SHOPPING (TV) $1500 PER MINUTE IN A CATALOG SALES $1500 PER MINUTE IN AN AIRLINE RESERVATION BOOTH

A. Bellato CTO T&A Team - OND 11

Price Sensitivity in Public Telecom Operators SLAs

EXAMPLES OF NATIONAL OPERATORS SERVICE LEVEL AGREEMENTS


GUARANTEED MAX UAT EU Premium: 1 2 Hour/Year EU Standard: 4 13 Hour/ Year GUARANTEED MAX MTTR 4 8 Hours 4 8 Hours FINANCIAL PENALTY 10% of a month 2 months 1 month - 1year revenue fees PRICE PREMIUM 15 50% 10 15%

A. Bellato CTO T&A Team - OND 12

Content
>

Transport Network Concept

>
> > > >

Need for traffic protection


Methods for traffic protection: Protection & Restoration Basics for traffic protection

Protection Schemes in Transport Networks


APPENDIX: Protection schemes in SDH/ Sonet/ OTN

A. Bellato CTO T&A Team - OND 13

Network Topologies

Ring Based
Mesh Based Linear

Eventual closure

Ring Based
Linear Eventual
closure

Medium density of population

High density of population

Low density of population

POPULATION IS CONSIDERED AS AMOUNT OF NETWORK ELEMENTS TO BE CONNECTED

A. Bellato CTO T&A Team - OND 14

PROTECTION
Protection is a method for the traffic recovery, considered as high priority traffic (Normal traffic) , usually associated to a fast process where the Network Elements (NE) autonomously decide when to act (selfhealing). The protection algorithm is implemented and handled by NEs The protection application makes use of preassigned capacity between nodes (protection transport entity) The alternative path used for traffic recovery, has a either a predefined routing or it is allocated through predefined links Protection transport entity can carry low priority traffic (Extra Traffic) when not in switching condition

A. Bellato CTO T&A Team - OND 15

Protection application
H G I F A

Switch time 50 300 ms


E D B

Working circuit path: GFHIL Failure on section: HI Predefined alternative path (protection path) on GEABL Protection transport entity can be used for the transport of low riority traffic (depending
on the specific protection scheme)

A. Bellato CTO T&A Team - OND 16

RESTORATION
Restoration is a method for the traffic recovery, usually associated to a slower process, where the switching decision is taken by a Network Management System (NMS) which can be either centralized or distributed through the network. The restoration application makes use of any capacity available between nodes, depending on failure scenario and on traffic matrix The restored path doesn't have a unique predefined routing.

A. Bellato CTO T&A Team - OND 17

Restoration Application
H G I

F
A

Switch time 500 ms up to 10 s


E D B C

Working circuit path: GFHIL Failure on section: HI NMS decides optimum routing (e.g. GFABIL) among possible alternative paths
(e.g. GEDCL or GFAIL or GFEABL)

A. Bellato CTO T&A Team - OND 18

Network Topologies

Ring Based Mesh Based Linear

Eventual closure

Ring Based Linear Eventual


closure

Medium density of population

High density of population

Low density of population

A. Bellato CTO T&A Team - OND 19

Content
>

Transport Network Concept

>
> >

Need for traffic protection


Methods for traffic protection: Protection & Restoration Basics for traffic protection

Definitions Switching Criteria Protection Architectures

>

Protection Schemes in Transport Networks

>

APPENDIX: Protection schemes in SDH/ Sonet/ OTN

A. Bellato CTO T&A Team - OND 20

Scope of the Protection - Trail


A Trail is defined as the transfer of information validated by the overhead information between two Access Points at whichever layer, (after terminating the overhead associated to that layer)

AP

TCP
Sub-network

TCP

AP

AP

TCP
Sub-network

TCP

AP

Layer a Trail Layer b Trail

Layer a Trail

Trail Protection

A. Bellato CTO T&A Team - OND 21

Transport network concept

Intermediate nodes

A. Bellato CTO T&A Team - OND 22

Scope of the Protection - SNC


A Sub-Network Connection (SNC) is defined as the transfer of information between Connection Points or Termination Connection Points, (before terminating the overhead associated to that layer).

AP

TCP Sub-network

CP Sub-network

CP Sub-network

TCP

AP

Intermediate Path portion End-to-End Path

SNC Protection

A. Bellato CTO T&A Team - OND 23

Transport network concept

Intermediate nodes

A. Bellato CTO T&A Team - OND 24

Architecture Mode
Redundant: Normal Traffic is bridged permanently on working/protection resources Extra Traffic is not supported

End 1 Working
(wk)

End 2
Normal Traffic

Protection (pr)

+ (1 wk + 1 pr)
Shared: Normal Traffic is usually connected to working resource bridge occurs only when protection is required Extra Traffic may be carried by protection resource (when no requested for protection)

End 1 Working
(wk)

End 2

Normal Traffic Extra Traffic

Protection (pr)

: (N1 wk : M pr)

A. Bellato CTO T&A Team - OND 25

Switching Mode
End 1 Working
(wk)

End 2

Protection (pr)

Unidirectional (or single ended )

Each end switches independently on the base of switching criteria locally detected

End 1

Working (wk)

End 2
Both ends, on the base of switching criteria detected, perform bridge & switch triggered by protocol exchange message (Automatic Protection Switching signalling) over protection transport entity

Protection (pr) APS signaling over protection

Bidirectional (or dual ended)

A. Bellato CTO T&A Team - OND 26

Switching Mode and Path Routing


Unidirectional Diverse routing

End 1

End 2

Bidirectional Uniform routing


End 1

The traffic is routed on different equipment and links

End 2

The traffic shares the same equipment and links


A. Bellato CTO T&A Team - OND 27

Switching Mode Possible Advantages


Advantages of unidirectional protection switching:
simplicity of implementation: no protocol required
but double bandwidth used best switch time performance, than bidirectional protection switching, due to the lack of protocol message exchange greater chance of restoring traffic, than bidirectional protection switching, but diverse routing

Advantages of bidirectional protection switching:


greater efficiency of bandwidth usage, than unidirectional protection switching,
due to the ability of supporting extra-traffic on protection path when no switching is required chance to get easier maintenance operations due to uniform routing: traffic travels in both directions either along the working path or the protection path, then, one path is active the alternative path is standby (reduced number of sites possibly interested) equal delay for both directions of transmission, significant feature with transoceanic links and via-satellite links

A. Bellato CTO T&A Team - OND 28

Operation Mode
In revertive operation mode, the traffic signal always returns to the working transport entity, when it has recovered from the defect or the external request is cleared (revertive operation is handled either unidirectionally or bidirectionally consistently to the switching mode of the protection scheme) Revertive unidir
End 1 Working End 2 End 1

Revertive bidir
Working End 2

Protection

Protection bidirectional revert switch triggered by APS signaling

In non-revertive operation mode, the traffic signal does not return to the working transport entity, once the defect or the external request affecting working resource has been removed.

A. Bellato CTO T&A Team - OND 29

Operation Mode Application


The not revertive operation mode is applicable only where a working transport resource has a dedicated protection resource (e.g. protection scheme with unidirectional switching mode).
Advantage: glitch on traffic, due to revert switch, avoided, then traffic performance increased.

The revertive operation mode is applicable both in case of protection resource dedicated to a working resource and in case of protection resource shared among different working transport entities. The revertive mode is appropriate when: the protection resource capacity is required to restore other traffic signal, due to more
urgent need (e.g., protection scheme with shared protection transport entity) the protection resource may be subject to frequent re-arrangement (e.g. where a network has limited capacity and protection routes are frequently re-arranged to maximize network efficiency when changes occur in the network) the protection resource is of significantly lower performance than the working resource (e.g. where the protection transport entity has a worse error performance or longer delay than the working transport entity) an operator needs to know which transport entities are carrying normal traffic in order to simplify the management of the network

A. Bellato CTO T&A Team - OND 30

Content
>

Transport Network Concept

>
> >

Need for traffic protection


Methods for traffic protection: Protection & Restoration Basics for traffic protection

Definitions Switching Criteria Protection Architectures

>

Protection Schemes in Transport Networks

>

APPENDIX: Protection schemes in SDH/ Sonet/ OTN

A. Bellato CTO T&A Team - OND 31

Protection Algorithm Controller


SWITCHING CRITERIA EXTERNALLY INITIATED COMMANDS INPUTS Parameters able to produce a state machine evolution AUTOMATICALLY PROTOCOL INITIATED MESSAGES COMMANDS (in dual-ended sw.)

PROTECTION ALGORITHM CONTROLLER

OUTPUTS Actions produced by the state machine evolution

MATRIX RE-CONFIGURATION (e.g. Bridge/Switch)

UPDATED PROTOCOL MESSAGES (in dual-ended sw.)

Hardware (fpga usually) or Software tasks resident into the Network Element able to process input parameters and providing output actions according to the specific protection algorithm

A. Bellato CTO T&A Team - OND 32

Switching Initiation Criteria


are, those conditions able to START (initiate), at a Network Element, a protection activity (i.e. a state machine evolution). Specifically:
AUTOMATICALLY INITIATED COMMANDS

Fault conditions affecting the traffic to be protected at the specific layer

IN DETAILS
EXTERNALLY INITIATED COMMANDS

Available commands allowing the operator to control protection algorithm, by forcing, pre-empting or testing the switching status

A. Bellato CTO T&A Team - OND 33

Automatically Initiated Commands

Signal Fail All the defect conditions producing the unavailability of the traffic to be protected at the interested layer Signal Degrade

Error condition affecting traffic to be protected at the interested layer, over a specific threshold set by operator (not necessarily producing a unavailability)

A. Bellato CTO T&A Team - OND 34

Externally Initiated Commands


Configuration modification and maintenance Lockout of Protection makes the protection transport entity unavailable for (all) the Normal Traffic(s) to be protected Forced Switch (#n) forces Normal Traffic (#n) to be routed over the protection transport entity Manual Switch (#n) routes Normal Traffic (#n) over the protection transport entity unless a fault condition (SF, SD) requires another signal to be routed over this transport entity Control Commands Lockout of Working (#n) disables the access to the protection transport entity for the (specific) Normal Traffic Clear Lockout of Working (#n) clears the Lockout of Working (#n) command

A. Bellato CTO T&A Team - OND 35

Externally Initiated Commands


In bidirectional switching mode systems, testing of APS protocol

Exercise (#n) emulates a switch request (for Normal Traffic #n) without performing any actual switch action, unless the protection transport entity is being used
Clearing previous external command (not addressable by other specific clear command) Clear clears all the switch commands Freeze the protection process (commands under standardization) Freeze the current state of the Protection Algorithm Controller (mainly thought for checking the APS protocol exchange for APS Controller) Clear Freeze clears the Freeze command and allows the Protection Algorithm Controller to evolve on the base of current inputs state
A. Bellato CTO T&A Team - OND 36

Protection Switching Performance

Switch Initiation Time (or Detection Time)


Time interval between the occurrence of a network impairment and the detection of a signal fail (SF) or signal degrade (SD) triggered by that network impairment

Hold-Off Time
Time interval after the detection of a SF or SD and its confirmation as a condition requiring the protection switching procedure

Switch Completion Time


The interval from the decision to switch (including time needed to achieve this decision) to the completion of the bridge and switch operation at a switching node initiating the bridge request

Time

Network Impairment

SF SD trigger

Start of protection Switching operations (SF-SD confirmation)

Protected traffic restored

A. Bellato CTO T&A Team - OND 37

Content
>

Transport Network Concept

>
> >

Need for traffic protection


Methods for traffic protection: Protection & Restoration Basics for traffic protection

Definitions Switching Criteria Protection Architectures

>

Protection Schemes in Transport Networks

>

APPENDIX: Protection schemes in SDH/ Sonet/ OTN

A. Bellato CTO T&A Team - OND 38

Protection Architecture Linear


N.T.

Linear protection architecture is applicable to both linear and ring network topology: only End nodes performs a protection activity, due to the resident Protection Algorithm Controller
N.T.

NE 1

P.A.C.

Intermediate node performing traffic cross-connection and alarm (defects / errors) propagation

P.A.C.

NE 3
(Pr) (Wk)

NE 1 NE 3
(Pr)

(Wk)

NE 4

NE 4

NE 2
P.A.C.

NE 2

P.A.C.

N.T.

N.T.

Linear network topology


A. Bellato CTO T&A Team - OND 39

Ring network topology

Protection Architecture Linear


Linear protection architecture is also applicable to meshed network topology, whenever two separated paths (working and protection) can be identified through the network: again, only End nodes performs a protection activity, due to the resident Protection Algorithm Controller
N.T.

Intermediate nodes performing traffic crossconnection and alarm (defects / errors) propagation

(Wk)
(Pr)

N.T.

Meshed network topology


A. Bellato CTO T&A Team - OND 40

Protection Architecture SPRing


SPRing (Shared Protected Ring) protection architecture is applicable only to ring network topology: every node of the ring performs a protection activity due to the resident Protection Algorithm Controller (APS controller) N.T.
(Pr)
P.A.C.

(Wk)

Working and Protection resources carried into the same transmission mean (e.g. fiber / )

N.T.

P.A.C.

NE 1
P.A.C.

NE 1
P.A.C.
P.A.C.

NE 3

NE 4

NE 3

NE 4

P.A.C.

NE 2
P.A.C.

NE 2
Working and Protection resources carried into dedicated transmission means (e.g. fiber / )
P.A.C.

N.T.

N.T.

2F (fiber) ring network topology


A. Bellato CTO T&A Team - OND 41

4F (fiber) ring network topology

Protection Architecture SPRing


N.T.
(Wk) (Pr)

SPRing protection architecture is also applicable to meshed network topology, whenever a closed connection of NEs (i.e. a ring) is identified through the network: again, every node of the ring, performs a protection activity, due to the resident Protection Algorithm Controller

N.T.

Meshed network topology

A. Bellato CTO T&A Team - OND 42

Content
>

Transport Network Concept

>
> > >

Need for traffic protection


Methods for traffic protection: Protection & Restoration Basics for traffic protection

Protection Schemes in Transport Networks


Linear Ring

>

APPENDIX: Protection schemes in SDH/ Sonet/ OTN

A. Bellato CTO T&A Team - OND 43

Basic Linear Protection Schemes


Protection Architecture Network Topology
Linear / Ring / Meshed LINEAR

Protection Algorithm
1+1 1:N M:N

Switching Operation
unidir / bidir unidir / bidir bidir

Linear / Ring / Meshed


Linear / Ring / Meshed

A. Bellato CTO T&A Team - OND 44

Linear 1 + 1 protection scheme


Linear / ring protected network Permanent bridge Working (Wk) Selector

Normal Traffic (High Priority)

Normal Traffic (High Priority)

NE 1 1+1 scheme

Protection (Pr)

NE 2

Cross-connection matrix

1 protection resources dedicated to 1 working resource only Normal Traffic connected (Extra Traffic on protection res. NOT supported) through permanent bridge on the two communication resources (wk/pr) traffic data switched (selected) on the base of switching criteria detected
A. Bellato CTO T&A Team - OND 45

1 + 1 unidir algorithm - I
NE 1
N.T.
(Wk)

NE 2 Protection activity NE 1
(Pr) Switching criterion declaration No Action

NE 2

TAL
Switch Unidirectional Switch completed

[Time]

[Time]

NE 1
N.T.
(Wk)

Switch

NE 2
TAL algorithm evolution time

(Pr)

In non-revertive systems, new switch status is kept also after failure/degrade/command removal from working resource

A. Bellato CTO T&A Team - OND 46

1 + 1 unidir algorithm - II
Failure/Degrade condition removed from working resource WTR timer starts
Switch present until WTR timer expiring

NE 1
N.T.
(Wk)

NE 2 NE 1

Protection activity NE 2
Failure / Degrade removal Switch

(Pr) No Action

W.T.R. (Switch)
Revert Revert switch on main performed

[Time]

[Time]

NE 1
N.T.
(Wk)

NE 2
W.T.R. timer expiring

(Pr)

At WTR timer expired, starting connectivity re-established (revert switch on working main resource)

A. Bellato CTO T&A Team - OND 47

1 + 1 bidir algorithm - I
Protection activity NE 1
N.T.
(Wk)

NE 2 NE 1
Switching criterion declaration

NE 2

TAL
(Pr)
Protocol message along protection resource (No Request code) Request Type, Channel identifier

(Bridge)

TAL
(Bridge)
Reverse Request, Channel bridged

TAL

NE 1
N.T.
(Wk)

Switch

NE 2
Switch

Request Type, Channel bridged

Switch

TAL
Bidirectional Switch completed

[Time] TAL algorithm evolution time (Pr)


Switch

[Time]

A. Bellato CTO T&A Team - OND 48

In non-revertive systems, new switch status is kept also after failure/degrade/command removal from working resource, Do Not Revert code is signaled

1 + 1 bidir algorithm - II
Failure/Degrade condition removed from working resource WTR timer starts at tail end

Protection activity NE 2 NE 1
Head end
Failure / Degrade removal
Wait To Restore, Channel bridged Reverse Request, Channel bridged

NE 1
N.T.
(Wk)

NE 2
Tail end

(Bridge) Switch (Pr)

W.T.R.
(Bridge) Switch Revert

Switch present at both ends until WTR timer expiring

No Request, Channel bridged

Revert
No Request

NE 1
N.T.
(Wk)

NE 2

Revert switch on main bidirectionallyperformed [Time] W.T.R. timer expiring [Time]

(Pr) As soon as WTR timer is expired, starting connectivity is re-established on both ends through, No Request code.

A. Bellato CTO T&A Team - OND 49

Linear 1 : N protection scheme


Normal Traffic #1 (High Priority) Normal Traffic #n (High Priority) Extra Traffic (Low Priority)
Working (Wk)

Normal Traffic #1 (High Priority) Normal Traffic #n (High Priority) Extra Traffic (Low Priority)

Protection (Pr)

NE 1 1:N scheme
1 protection resource shared among N (1) working resources

NE 2

implicitly bidirectional; protocol exchange along the protection resource the amount of working resources (N) handled, and, consequently, of the Normal Traffics protected, depends on the characteristics of protocol supported (nr of bits/bytes dedicated into signaling) both bridge and switch connections performed on the base of protocol algorithm activation either Null Signal (no meaningful traffic connected) or Extra Traffic (low priority traffic) can be connected to protection resource when protection activity is not required

A. Bellato CTO T&A Team - OND 50

1 : N bidir algorithm - I
N. T. #1
Working (Wk) No Request code on protocol and E.T./ Null Signal connected on pr)

N. T. #n

Protection (Pr)

E. T.

Bridge

Switch

N. T. #1 recovered
Working (Wk)

N. T. #n not interested by protection activity E. T. squelched


Squelching (AIS injection)

Protection (Pr)

Squelching (AIS injection)

A. Bellato CTO T&A Team - OND 51

1 : N bidir algorithm - II
Br&Sw and E.T. squelching present at both ends until WTR timer expiring

Failure/Degrade condition removed from working resource WTR timer starts at tail end

N. T. #1 recovered
Working (Wk)

N. T. #n not interested by protection activity E. T. squelched

Protection (Pr)

N. T. #1
As soon as WTR timer is expired, starting connectivity is reestablished on both ends through protocol Working (Wk)

N. T. #n

Protection (Pr)

E. T.

A. Bellato CTO T&A Team - OND 52

1 : N bidir algorithm - III


Protection activity for single Degrade/Failure/Command NE 1
Switching criterion declaration

NE 2

NE 1
Head end
Failure / Degrade removal
Wait To Restore, Channel bridged Reverse Request, Channel bridged

NE 2
Tail end

TAL
Request Type, Channel Identifier

E.T. sq.

Bridge & Switch

W.T.R.
Bridge & Switch Release Switch

TAL
E.T. sq. Bridge
Reverse Request, Channel bridged

TAL
Request Type, Channel bridged

No Request, E.T/N.S. Ch. Ident.

Bridge & Switch

Release Switch Bridge E.T. / N.S. on protection Switch E.T. / N.S. on protection

No Request E.T./N.S. Ch. bridge No Request E.T./N.S. Ch. bridge

Switch

TAL
Bidirectional Switch completed

Revert on main bidirectionallyperformed

Bridge & Switch E.T. / N.S. on protection

[Time]
TAL algorithm evolution time

[Time]

[Time] W.T.R. timer expiring

[Time]

A. Bellato CTO T&A Team - OND 53

Linear APS channel content


Protocol Parameters
Request Type i.e. the request (failure / degrade / command) or state (No Request / Do Not Revert / WTR) to be signalled / acknowledged by each end of the protection group Requesting Channel Identifier i.e. the identifier of working / protection resource for which the request type is issued Bridged Channel Identifier (bridge status) i.e. the identifier of working / protection resource for which the bridge / switch matrix configuration is performed Architecture mode i.e. the redundant configuration, +, or the shared configuration, : Switching mode i.e. the locally provisioned unidirectional / bidirectional switching mode signalled to remote end for possible provisioning mismatch detection (supported in OTH, optional in SDH) Operation mode i.e. the locally revertive / not revertive operation mode signalled to remote end for possible provisioning mismatch detection (supported in OTH)
A. Bellato CTO T&A Team - OND 54

Squelching in linear schemes


Extra Traffic squelching This type of squelching is needed in every type of scheme, linear or ring, supporting traffic configuration on the Low Priority channels (Protection channels). This traffic, called extra with respect that one configured on High Priority channels called normal, is pre-empted when the Low Priority channels are required for protecting normal traffic. The access to the Low Priority by Normal Traffic might lead to traffic misconnected, if no specific mechanism was implemented: Extra Traffic squelching performed before any matrix re-configuration (Bridge/Switch) avoids this potential problem. In linear 1:N schemes, Extra Traffic squelching implies that end nodes forces a defined alarm signal (AIS) towards the Extra Traffic user.

A. Bellato CTO T&A Team - OND 55

Squelching in linear schemes - I


NE 1
N.T.
(Wk)

NE 2
N.T.

E.T.
(Pr)
Request Type, Channel Identifier

E.T.

(No E.T. sq.)

NE 1
N.T.
(Wk)

NE 2
N.T.

E.T.
(Pr)
Request Type, Channel Identifier

E.T.

Request Type from NE2 processed Bridge performed at NE1 (but Switch not performed yet at NE2) transient misconnection between N.T. and E.T. in the direction NE1 > NE2

(No E.T. sq.) Bridge

A. Bellato CTO T&A Team - OND 56

Squelching in linear schemes - II


NE 1
N.T.
(Wk)

NE 2
N.T.
Reverse Request from NE1 processed Switch performed at NE2 initial misconnection removed; Bridge performed at NE2 (and Switch not performed yet at NE1) new transient misconnection between N.T. and E.T. in the direction NE2 > NE1

E.T.
(Pr)
Reverse Request, Channel bridged

E.T.

Bridge & Switch

NE 1
N.T.
(Wk)

NE 2
N.T.
Request Type from NE2 processed Switch performed at NE1 new misconnection removed;

E.T.
(Pr) Switch
Request Type, Channel bridged

E.T.

A. Bellato CTO T&A Team - OND 57

Content
>

Transport Network Concept

>
> > >

Need for traffic protection


Methods for traffic protection: Protection & Restoration Basics for traffic protection

Protection Schemes in Transport Networks


Linear Ring

>

APPENDIX: Protection schemes in SDH/ Sonet/ OTN

A. Bellato CTO T&A Team - OND 58

Basic SPRing Protection Schemes


Protection Architecture Network Topology
Ring / Meshed SPRING Ring / Meshed

Protection Algorithm
1:1 2F/4F classic

Switching Operation
bidir

1:1
4F transoceanic bidir

A. Bellato CTO T&A Team - OND 59

2F/4F SPRing protection scheme


2F/4F scheme Working (Wk)

N.T. E.T.

Protection (Pr)

In 2F topology, same transmission mean (fiber / ) carries both working and protection resources. If N is total number of resources (channels) available as ring line capacity, then:

- working resources are 1 N/2 - protection resources are N/2 + 1 N


W E

NE 1

E W

NE 4
W E

NE 2
E

In 4F topology, dedicated transmission mean (fiber / ) carries either working or protection resources. If N is total number of resources (channels) available as ring E.T. line capacity, then:

E.T.

- working resources are N protection resources are N

NE 3

Each side of a node interfacing the ring is conventionally named West/East Each node of the ring is involved in protection activity (protocol handling, matrix configuration). Protocol message exchange always occurs between adjacent nodes along protection resources

N.T. E.T.

IDLE state

Working resources Protection resources

In Idle state (no protection required through the ring), N.T. is on working resources, E.T. may be configured on protection resources. Protocol signaling carries No request code from each node to the adjacent one

A. Bellato CTO T&A Team - OND 60

2F classic SPRing Ring Switch


PATH SHORT

N.T. recovered E.T. squelched

Bridge to x+N/2 Protection resources

NE 1
Working resource x Bridge

Switch to x+N/2 Protection resources E.T. squelched

NE 4
Switch P.T.

NE 2

NE 3
PATH

Protection resources N/2+1 N Pass-through

LONG

N.T. recovered E.T. squelched


Working resources Protection resources Squelching (AIS injection)

A. Bellato CTO T&A Team - OND 61

2F classic SPRing Ring Switch


Ring Switch recovers Normal Traffic through protection resources on the LONG path, when both working and protection resources of a span are failure/degrade affected or when a ring command (Force / Manual)is applied. - In 2F topology this scenario occurs anytime a failure/degrade affects at least one out of two transmission means of a span, or when a ring command is applied on that span. During ring switch all the Extra Traffics configured through the ring are squelched (regardless of the actual use of that channel for Normal Traffic protection). The following node macro-states are entered during protection activity: Switching Macro-state entered by end nodes of the span interested with switching criteria, both initiating a ring switch by sending (tail end) to the adjacent switching node, both on the LONG and on the SHORT path of the ring a ring bridge request, or acknowledging (head end), both on LONG / SHORT path a ring bridge request destined to itself. In classic application, only switching nodes performs ring Bridge&Switch, on the base of APS signaling exchanged through the LONG path

(see yellow nodes in previous example)

Full Pass-through Macro-state entered by each node of the ring (not switching), by-passing bridge request not destined to itself; performing also the bidirectional by-pass (EW, W E) of protection resources (Low Priority channels). Pass-through nodes are also called intermediate nodes.

(see grey nodes in previous example)


A. Bellato CTO T&A Team - OND 62

4F classic SPRing Ring Switch


N.T. recovered E.T. squelched
PATH SHORT

In classic application (2F/4F) the protection path corresponds always to the LONG path of the scheme: the propagation delay for the protected traffic is, then, always maximized. When applied to huge rings including transoceanic links or via satellite links, and depending on the type of service transported, this delay can lead to a final performance degradation of the service
E.T. squelched

Switch Bridge

NE 1

Bridge P.T.

NE 4
Switch P.T.

NE 2

NE 3
PATH LONG

Working resources Protection resources

N.T. recovered E.T. squelched

Squelching (AIS injection)

A. Bellato CTO T&A Team - OND 63

4F transoceanic SPRing Ring Switch


N.T. recovered E.T. squelched
PATH SHORT

In transoceanic application (4F) the protection path in ring switch condition, corresponds to the LONG path of the scheme only when the protected Normal Traffic is configured between adjacent nodes. With different traffic distribution (where node pass-through occurs) the protection path is limited to the portion of the ring, not fault affected, between nodes terminating the protected Normal Traffic.

Switch

NE 1

Bridge

Pass-through

NE 4
Switch Bridge

NE 2

E.T. squelched

NE 3
PATH

Temporary squelching, if associated LP channels are not required for ring switch connectivity

LONG

N.T. recovered E.T. squelched

A. Bellato CTO T&A Team - OND 64

4F SPRing Ring Switch - I

Ring Switch, in 4F topology occurs anytime a failure/degrade affects at least two out of four transmission means of a span, in such a way that both one working and one protection resources results fault affected or when a ring command is applied on that span. As for 2F ring, Normal Traffic is recovered through protection resources on the LONG path. In classic (also called terrestrial) application, same behaviour already described about 2F ring, same E.T. squelching policy and same node macro-states apply. In transoceanic application, current standard reference (SDH) states that during ring switch all the Extra Traffics configured through the ring are squelched; after the ring switch is performed, those Low Priority channels not used for Normal Traffic protection are re-connected to Extra Traffic. This is a slow process possibly using communication channels between the nodes of the ring, i.e. control plane, for E.T. re-configuration (protection protocol independent). Both distributed ring switch and Extra Traffic recovery is applicable, due to the knowledge of the whole ring connectivity at each node of the ring (see Traffic Map). The following node macro-states are entered during protection activity:

A. Bellato CTO T&A Team - OND 65

4F SPRing Ring Switch - II


Switching Macro-state entered by end node of the span interested with switching criteria, initiating a ring switch by sending (tail end) to the adjacent switching node, both on the LONG and on the SHORT path of the ring a ring bridge request, or acknowledging (head end), both on LONG/SHORT path a ring bridge request destined to itself. Switching nodes performs ring Bridge&Switch only when adding/dropping (terminating) Normal Traffic to be protected on the base of APS signaling exchanged through the LONG path (see yellow nodes in

previous example).

Full Pass-through Macro-state entered by each node of the ring (not switching), by-passing bridge request not destined to itself. The same protocol specified in classic application is used. Pass-through nodes performs ring Bridge&Switch only when adding/dropping (terminating) Normal Traffic to be protected on the base of APS signaling received by both switching nodes; otherwise, they realize the bidirectional by-pass (EW, W E) of protection resources (Low Priority channels). Passthrough nodes are also called intermediate nodes (see grey nodes in previous example).

A. Bellato CTO T&A Team - OND 66

SPRing APS channel content


Protocol parameters
Request Type i.e. the request (failure / degrade / command) or state (No Request / WTR) to be signalled / acknowledged by opposite end of the span interested Destination Node i.e. the adjacent node addressed by APS signalling Source Node i.e. the node sourcing the APS signaling Path i.e. the portion of the ring interested by APS signaling, short ,(span fault affected), or long, (the remaining spans of the ring) Bridge status i.e. idle, bridge , bridge & switch matrix configuration

A. Bellato CTO T&A Team - OND 67

4F SPRing Span switch


Working resource x
Temporary squelching in transoceanic application, if associated LP channels are not required for span switch connectivity

Bridge to Protection resource x

N.T. recovered
PATH
SHORT

E.T. squelched

Switch to Protection resource x

NE 1
Bridge

E.T. squelched

NE 2

E.T. kept

NE 4
Switch

K - pass-through

NE 3
PATH

LONG

The protection path corresponds always to the SHORT path of the scheme: i.e. Normal Traffic is recovered through the same span along protection resource.

N.T. recovered E.T. kept

A. Bellato CTO T&A Team - OND 68

4F SPRing Span switch


Span Switch, in 4F topology (both classic and transoceanic applications) occurs anytime a failure/degrade affects only the working transmission mean of a span in one or both directions or a span command is applied. Normal Traffic is recovered through the associated protection resource of that span by using the same algorithm already described for linear 1:N scheme.

During span switch (both classic and transoceanic applications) all the Extra Traffics configured in the span fault affected are squelched; while remaining E.T. allocated in different spans of the ring are kept. In transoceanic application, those L.P. channels not required for span switch connectivity, then the associated E.T., are restored after span switch is performed (same way already described for ring switch).
The following node macro-states are entered during protection activity: Switching Macro-state entered by end node of the span interested with switching criteria, initiating a span switch by sending (tail end) to the adjacent switching node, both on the LONG and on the SHORT path of the ring a span bridge request, or acknowledging (head end) , both on LONG/SHORT path, a span bridge request destined to itself. Only switching nodes performs span Bridge&Switch (see yellow nodes in the example). K byte Pass-through Macro-state entered by each node of the ring (not switching), by-passing bridge request sent on the LONG path by switching node. The same protocol specified in classic application is used. K byte Pass-through nodes do not perform any reconfiguration of local connectivity. K-byte Pass-through nodes are also called intermediate nodes. (see grey nodes in the example)
A. Bellato CTO T&A Team - OND 69

Squelching in ring schemes


Extra Traffic squelching The same considerations already reported for linear schemes apply: the access to the Low Priority by Normal Traffic might lead to traffic misconnected, if no specific mechanism was implemented: Extra Traffic squelching performed before any matrix re-configuration (Bridge/Switch/Pass-Through) avoids this potential problem. In ring schemes, Extra Traffic squelching implies that nodes dropping Extra Traffic forces a defined alarm signal (AIS) towards the Extra Traffic user, both in case they enter the switching (due to a ring/span switch) or the pass-through state. Besides, nodes performing span switch have also to insert the alarm signal (AIS) towards the ring, on Low Priority channels carrying possible E.T. passing from the protected span through the node.

A. Bellato CTO T&A Team - OND 70

Squelching in ring schemes


4F topology
N.T. recovered E.T. squelched

NE 1
Span Br&Sw

NE 4
E.T. squelched on adjacent span

NE 2

NE 3

N.T. recovered E.T. squelched (by NE 4)

A. Bellato CTO T&A Team - OND 71

Squelching in ring schemes


Ring squelching This type of squelching is needed in 2F/4F classical SPRing, when a node of the ring becomes isolated either for node failure or for multiple failures requiring ring switch at both sides. In this case, due to the ring switch action performed by nodes adjacent the isolated one (i.e. switching nodes), possible traffics terminated into isolated node and allocated on same High Priority channels for both sides (West/East), would be misconnected by accessing the same Low Priority channels. This condition is avoided by inserting at the switching nodes AIS signal on protection channels, making them unavailable through the ring (the AIS insertion is performed bidirectionally).

A. Bellato CTO T&A Team - OND 72

Squelching in ring schemes


N.T. #1 Wk Ch. #x Pr Ch. #x+ N/2 W E NE 4 W E Pr Ch. #x+ N/2 NE 3 W Wk Ch. #x NE 1 E W N.T. #1 NE 2 E N.T. #2

Same Protection channel accessed by switching nodes (NE1-NE3) through Ring Br&Sw with no squelching policy, permanent misconnection produced between N.T. #1 and N.T. #2

N.T. #2

A. Bellato CTO T&A Team - OND 73

Squelching in ring schemes


N.T. #1
Wk CH. #x Pr CH. #x+ N/2 W E

NE 1

E W

N.T. #1 NE 4
W E Pr CH. #x+ N/2

NE 2
E

N.T. #2

NE 3

W Wk CH. #x

N.T. #2
Misconnection avoided through Low Priority channel squelching (AIS injection) at switching nodes

A. Bellato CTO T&A Team - OND 74

SNC vs SPRing
Up to 2xN paths N/2 wk resources N/2 wk resources N/2 wk resources N wk resources Up to N paths

Total N paths

N/2 wk resources

WITH ADJACENT TRAFFIC ALLOCATION THE PROTECTION SCHEME WITH MOST PROFITABLE BANDWIDTH OCCUPATION IS

WITH HUBBED TRAFFIC ALLOCATION THE PROTECTION SCHEME WITH MOST PROFITABLE BANDWIDTH OCCUPATION IS

SPRING
A. Bellato CTO T&A Team - OND 75

SNC

SNC vs SPRing

Ring protection

Access network Access network

e2e protection

A. Bellato CTO T&A Team - OND 76

Content
>

Transport Network Concept

>
> > >

Need for traffic protection


Methods for traffic protection: Protection & Restoration Basics for traffic protection

Protection Schemes in Transport Networks

Restoration

>

APPENDIX: Protection schemes in SDH/ Sonet/ OTN

A. Bellato CTO T&A Team - OND 77

Centralized Restoration
Centralized restoration is historically an application of network management in Transport Network (i.e. SDH), where the amount of operators was very limited and a complete geographical network (e.g. country) used to be configured and controlled by a single(few) manager(s).

Operating System

DCN Network
ECC

Centralized Restoration is an application provided to an operator by a single vendor.


Centralized Restoration is a network application not standardized, i.e. proprietary applications are provided by each vendor.
Network Element

Transport Network Generic Path

A. Bellato CTO T&A Team - OND 78

System Evolution - Distributed Restoration


Distributed Restoration is historically an application coming from Data Network survivability , where the amount of Private Networks (i.e. Data) is unlimited and it becomes unfeasible to configure and control different networks connected to each other through a single (few) manager(s).

DCN Network
NE from vendor a ECC

Distributed Restoration is an application thought for a multi vendor enviroment. The de-regulation in Public Networks, has made distributed management, then distributed restoration attractive also for Transport Network. This implies a standard activity in order to align applications from different vendors.

Transport Network Generic Path


NE from vendor b

Distributed Manger

A. Bellato CTO T&A Team - OND 79

Content
>

Transport Network Concept

>
> > > >

Need for traffic protection


Methods for traffic protection: Protection & Restoration Basics for traffic protection

Protection Schemes in Transport Networks


APPENDIX: Protection schemes in SDH/ Sonet/ OTN
Layering Network Frame Structure Schemes Network Applications Reference Standards

A. Bellato CTO T&A Team - OND 80

SDH layering
PHYSk RSTSk MSTSk PHYSo RSTSo MSTSo

LAYERS
PHYSICAL RS TRAIL

MSPC
MSASk
HTCM HPOM HTCT HSUT

MS TRAIL
MSASo

HPC HO Trail
HPTSo

HO PATH/TRAIL

HPTSk

HPASk
LTCM LPOM LTCT LSUT

LPASo

LPC LO Trail
LPTSo CLIENT

LO PATH/TRAIL

LPTSk CLIENT
A. Bellato CTO T&A Team - OND 81

SDH Network
STM-N RS trail MS trail 2R
TM

STM-N RS trail

STM-N RS trail MS trail ADM

3R
TM

DXC
TM TM

DXC

ADM

ADM

DXC HO / LO PATH (TRAIL)

KEY TM Terminal Multiplexer LE (2R) Line Equipment: repeater (no Ck recovery) LE (3R) Line Equipment: regenerator (Ck recovery) DXC Digital Cross-Connect ADM Add Drop Multiplex

A. Bellato CTO T&A Team - OND 82

STM-N Frame Structure


STM-N
RSOH AUG
V C 3 P O H

Administrative pointers

Two ways of SDH multiplexing

High Order

MSOH

KEY RSOH Regenerator Section OverHead MSOH Multiplex Section OverHead AUG Administrative Unit Group VC Virtual Container POH Path OverHead

V C 4 P O H

High Order

V C 3 P O H

Low Order

V C 12 P O H

Low Order

A. Bellato CTO T&A Team - OND 83

SDH Protection Schemes - Summary


LAYER SCHEME Linear 1+1 MSP (uni/bid) Linear 1:N MSP (uni/bid) 2F/4F classic MS-SPRing (bid) 4F transoceanic MS-SPRing (bid) TRIGGERING FAULT MS layer defects (SF/SD) MS layer defects (SF/SD) MS layer defects (SF/SD) MS layer defects (SF/SD) MSA/HPA defects (SF AIS/LOP) MSA/HPA defects + HPOM/LPOM defects (SF/SD) HTCM/LTCM defects (N1/N2 byte SF/SD) SNCP/N defects (SF/SD) SWITCH COM. TIME 50 ms 50 ms 50 ms 300 ms REFERENCE STANDARDS

MS Trail

ITU-T G.841
50 ms 50 ms ITU-T G.783 ITU-T G.808.1

HO/LO Path

Linear 1+1 SNCP/I (uni) Linear 1+1 SNCP/N (uni) Linear 1+1 SNCP/S (uni)

50 ms

HO/LO Trail

Linear 1+1 VC Trail (uni/bid)

50 ms

A. Bellato CTO T&A Team - OND 84

SDH Multiplex Section Protection


Protection Scheme
Linear 1+1 MSP - Linear 1:N MSP

Layer
Switching Mode Operation Mode W.T.R. timer APS channel
(Revertive mode)

MS Trail
Unidirectional / Bidirectional Revertive / Not Revertive 5 12 min K1 K2 byte of MSOH Clear SF on Protection Lockout Pr FS SF High Priority SF Low Priority SD High Priority SD Low Priority MS WTR EX NR N x Clear N x Lockout Wk (in 1:N scheme only) 50 ms (line/NE propagation delay not included) NOT DEFINED by ITU-T G.841

(Bidirectional Mode)

Switching Criteria/ States (decreasing


priority level)

Switch Completion Time Hold-Off timer

A. Bellato CTO T&A Team - OND 85

SDH Multiplex Section Protection


Protection Scheme Layer Switching Mode Operation Mode W.T.R. timer APS channel
(Revertive mode) K1 K2 bytes of MSOH Clear LP-S (or SF-P) FS-S FS-R SF-S SF-R SD-P SD-S SD-R MS-S MS-R WTR EX-S EX-R NR Clear LW-S Clear LW-R 50 ms for classic application (1200 Km/16 NEs propagation delay included) 300 ms for transoceanic application NOT REQUIRED by ITU-T G.841 (Bidirectional Mode) 2/4F classic MS-SPRing - 4F transoceanic MS-SPRing (ring) MS Trail Bidirectional Revertive NOT DEFINED

Switching Criteria/ States* (decreasing


priority level)

Switch Completion Time Hold-Off timer

A. Bellato CTO T&A Team - OND 86

* - S span / P protection / R ring

SDH Multiplex Section Protection SF / SD


STM-N
RSOH
Administrative pointers

MSOH

K2 byte (bits 5-8) MS-AIS (due to LOS, LOF) (SF) B2 bytes B2 Exber (SF) / B2 Signal Degrade (SD)

A. Bellato CTO T&A Team - OND 87

APS channel in SDH MSP schemes


STM-N
RSOH
Pointers K1 K2 bits 1-4

STM-N
RSOH
Pointers K1 K2 bits 1-4

MSOH

MSOH

Request Type Req. Ch. Id. Br. Ch. Id. (Bridge Status) Arch. Mode

Request Type Source Node ID Destination Node ID Path Bridge Status

A. Bellato CTO T&A Team - OND 88

SDH MS Protection Applications

MS trail
Working TM

MS trail

ADM 2/4 F ADM MS-SPRing ADM

2R

3R
TM

DXC
TM

Protection TM

DXC

Linear 1+1 MSP

Linear 1:N MSP

DXC

A. Bellato CTO T&A Team - OND 89

SDH SNC Protection


Protection Scheme Layer Switching Mode Operation Mode
Linear 1+1 SNCP/I - Inherent based on MSA (HO) or HPA defects (LO) HO / LO Path Unidirectional Revertive / Not Revertive 5 12 min; 1 sec step NOT APPLICABLE Clear Lockout-Pr Forced Switch SF (SSF) Manual Switch WTR NR 50 ms (due to the lack of APS protocol, line propagation delay not applicable) 0 10 sec; 100 ms step

W.T.R. timer
APS channel

(Revertive mode) (Bidirectional Mode)

Switching Criteria/ States (decreasing


priority level)

Switch Completion Time Hold-Off timer

A. Bellato CTO T&A Team - OND 90

SDH SNC Protection SF (SNCP/I)


STM-N
RSOH
H1 H2 H3

H1, H2 bytes AUAIS / AULOP (HO VC3/VC4 SSF SF) H1, H2 bytes TUAIS / TULOP (LO VC3 SSF SF)

VC 12
V1 V2 V3 V4 V5

MSOH

V1, V2 bytes TUAIS / TULOP (LO VC12 SSF SF) K4 Stuff byte

A. Bellato CTO T&A Team - OND 91

SDH SNC Protection


Protection Scheme Layer Switching Mode Operation Mode W.T.R. timer APS channel
(Revertive mode) NOT APPLICABLE Clear Lockout-Pr Forced Switch SF SD Manual Switch WTR NR (Bidirectional Mode) Linear 1+1 SNCP/N - Not Intrusive based on MSA / HPA defects + POH defects (HPOM / LPOM) HO / LO Path Unidirectional Revertive / Not Revertive 5 12 min; 1 sec step

Switching Criteria/ States (decreasing


priority level)

Switch Completion Time

50 ms (due to the lack of APS protocol, line propagation delay not applicable)

Hold-Off timer

0 10 sec; 100 ms step

A. Bellato CTO T&A Team - OND 92

SDH SNC protection SF / SD (SNCP/N)


HO / LO SSF (SF) (AUAIS / TUAIS AULOP / TULOP) + VC 3/4 POH J1 B3 C2 G1 F2 H4 F3 K3 N1 VC 12 POH V5 V5 Bip2 Exber (SF) / Bip2 Signal Degrade (SD) / Signal Label Mismatch (SF) / UNEQ (SF) J2 Trace Identifier Mismatch (SF) K4 (bit 1) Extended Signal Label Mismatch (SF) J2 N2 K4 Stuff byte
140 bytes

J1 Trace Identifier Mismatch (SF) B3 B3 Exber (SF) / B3 Signal Degrade (SD) C2 Signal Label Mismatch (SF) / UNEQ (SF)

A. Bellato CTO T&A Team - OND 93

SDH SNC Protection Application


HO/LO Sub-Network HO/LO Sub-Network
Working TM

HO/LO Sub-Net.

ADM HO/LO SNCP N

2R

3R
TM

DXC
TM

Protection TM

DXC

ADM

ADM

HO/LO SNCP N

HO/LO SNCP I

DXC

A. Bellato CTO T&A Team - OND 94

SDH SNC Protection


Protection Scheme Layer Switching Mode Operation Mode W.T.R. timer APS channel
(Revertive mode) NOT APPLICABLE Clear Lockout-Pr Forced Switch SF SD Manual Switch WTR NR (Bidirectional Mode) Linear 1+1 SNCP/S - Subsystem based on N1 byte (HO-POH) and N2 byte (LO-POH) monitoring through HTCM block or LTCM block HO / LO Path Unidirectional Revertive / Not Revertive 5 12 min; 1 sec step

Switching Criteria/ States (decreasing


priority level)

Switch Completion Time

50 ms (due to the lack of APS protocol, line propagation delay not applicable)

Hold-Off timer

0 10 sec; 100 ms step

A. Bellato CTO T&A Team - OND 95

SDH SNC Protection SF / SD (SNCP/S)


HO / LO SSF (SF) (AUAIS / TUAIS AULOP / TULOP) + VC 3/4 POH J1

N1 Bip8 Signal Degrade (SD) / UNEQ (SF) / Loss of Tandem Connection (SF) / Trace Identifier Mismatch (SF)

K3 N1 VC 12 POH V5 J2

N2 Bip2 Signal Degrade (SD) / UNEQ (SF) / Loss of Tandem Connection (SF) / Trace Identifier Mismatch (SF)

N2 K4 Stuff byte

A. Bellato CTO T&A Team - OND 96

SDH SNCP/S Application


DOMAIN B
HTCT/LTCT
Protection

HTCT/LTCT

DOMAIN A
DXC

DXC

DXC

DOMAIN C

DXC
Working

DXC

HO / LO VC TC (intermediate monitoring) HO / LO VC trail (end-to-end monitoring)

A. Bellato CTO T&A Team - OND 97

SDH Trail Protection


Protection Scheme
Linear 1+1 HO / LO VC Trail (linear 1:1 f.f.s.) HO / LO Trail Unidirectional / Bidirectional f.f.s. Revertive / Not Revertive 5 12 min; 1 sec step K3 (bits 1-4; APS protocol T.B.D.) (HO) K4 (bits 3-4; APS protocol T.B.D.) (LO) Clear Lockout-Pr Forced Switch SF* SD* Manual Switch WTR NR 50 ms (line/NEs propagation delay is T.B.D.) 0 10 sec; 100 ms step

Layer
Switching Mode Operation Mode W.T.R. timer APS channel
(Revertive mode) (Bidirectional Mode)

Switching Criteria/ States (decreasing


priority level)

Switch Completion Time Hold-Off timer


* - As for SNCP/N

A. Bellato CTO T&A Team - OND 98

SONET Layering (Bellcore GR-253)


Payload (DS1, DS2, DS3 DS4NA, Video, etc.) LAYERS Map Payload and Path OH into SPE Map SPE and Line OH into internal signal Map internal signal and Section OH into STS-N signal Optical Conversion Terminal Payload and Path Overhead

HO/LO PATH

SPE and Line Overhead

LINE

STS-N Signal

SECTION

Light Pulses

PHYSICAL
STE Regenerator Terminal

A. Bellato CTO T&A Team - OND 99

SONET Network
OC-M Section Line 3R
TM TM

OC-M Section

OC-M Section Line ADM

DCS
TM TM

DCS

ADM

ADM

DCS STS path / VT PATH


The following matches may be considered between SDH and SONET technology: STM-N OC-M (where M=3N) RS Section MS Line HO PATH STS path LO PATH VT path

KEY TM Terminal Multiplexer RGTR Regenerator (3R) DCS Digital Cross-Connect ADM Add Drop Multiplex

A. Bellato CTO T&A Team - OND 100

SONET Frame Structure


OC-N / STS-N
Section Overhead
STS1 pointers V T 2 P O H V T 1.5 P O H

Low Order

Line Overhead

Transport Overhead

S T S 1 P O H

Low Order

High Order

V T 3 P O H V T 6 P O H

Low Order

Low Order

A. Bellato CTO T&A Team - OND 101

SONET Protection Schemes - Summary


LAYER SCHEME TRIGGERING FAULT Line layer defects (SF/SD) Line layer defects (SF/SD) Line layer defects (SF/SD) STS/VT pointer processing defects (AIS/LOP) + STS/VT POH defects SWITCH COM. TIME 50 ms 50 ms 50 ms 50 ms Bellcore GR-253
(linear APS) (UPSR) (BLSR)

REFERENCE STANDARDS

Line

Linear 1+1 APS (uni/bid) Linear 1:N APS (uni/bid) 2F/4F classic MS-SPRing (bid)

Bellcore GR- 1400 Bellcore GR-1230

HO/LO Path

Linear 1+1 UPSR (uni)

A. Bellato CTO T&A Team - OND 102

SONET Line Protection


Protection Scheme
Linear 1+1 APS - Linear 1:N APS

Layer
Switching Mode Operation Mode W.T.R. timer APS channel
(Revertive mode)

Line
Unidirectional / Bidirectional Revertive / Not Revertive 5 12 min; 1 min step K1 K2 byte of Line Overhead Clear SF on Protection Lockout Pr FS SF High Priority SF Low Priority SD High Priority SD Low Priority MS WTR EX NR N x Clear N x Lockout Wk (in 1:N scheme only) 50 ms (line/NE propagation delay not included) NOT DEFINED by Bellcore GR-253

(Bidirectional Mode)

Switching Criteria/ States (decreasing


priority level)

Switch Completion Time Hold-Off timer

A. Bellato CTO T&A Team - OND 103

SONET Line Protection


Protection Scheme Layer Switching Mode Operation Mode W.T.R. timer APS channel
(Revertive mode) K1 K2 bytes of MSOH Clear LP-S (or SF-P) FS-S FS-R SF-S SF-R SD-P SD-S SD-R MS-S MS-R WTR EX-S EX-R NR Clear LW-S Clear LW-R 50 ms for classic application (1200 Km/16 NEs propagation delay included) NOT DEFINED by Bellcore GR-1230 * - S span / P protection / R ring
A. Bellato CTO T&A Team - OND 104

2/4F Bidirectional Line Selfhealing Ring (BLSR) Line Bidirectional Revertive 5 12 min; step 1 min (optionally, lower bound of 0 min)

(Bidirectional Mode)

Switching Criteria/ States* (decreasing


priority level)

Switch Completion Time Hold-Off timer

SONET Line Protection SF / SD


OC-N
Section Overhead
STS1 pointers OPTICAL SIGNAL ONLY

Line Overhead LOS (Loss of Signal) and LOF (Loss of Frame) are considered as direct triggers (both as SF) for Line protection scheme

Transport Overhead

K2 byte (bits 5-8) AIS-L (SF) B2 bytes B2 Exber (SF) / B2 Signal Degrade (SD)

A. Bellato CTO T&A Team - OND 105

APS channel in SONET Line schemes


OC-N
SectionOH
Pointers K1 K2 bits 1-4

OC-N
SectionOH
Pointers K1 K2 bits 1-4

LineOH

LineOH

Request Type Req. Ch. Id. Br. Ch. Id. (Bridge Status) Arch. Mode

Request Type Source Node ID Destination Node ID Path Bridge Status

A. Bellato CTO T&A Team - OND 106

SONET Path Protection


Protection Scheme Layer Switching Mode Operation Mode W.T.R. timer
(Revertive mode) Linear 1+1 Unidirectional Path Self-healing Ring (UPSR) - based on STS / VT pointer processing defects + STS POH / VT POH defects HO / LO Path Unidirectional Revertive / Not Revertive 5 12 min; 1 min step NOT APPLICABLE Clear Lockout-Pr Forced Switch AIS;LOP;UNEQ* Ex BER** PDIP^ SD+ Manual Switch WTR NR 50 ms (due to the lack of APS protocol, line propagation delay not applicable) NOT DEFINED by Bellcore GR-1400

APS channel

(Bidirectional Mode)

Switching Criteria/ States (decreasing


priority level)

Switch Completion Time Hold-Off timer

* - P for STS path (HO) / V for VT path (LO) ^ - Applicable only to STS path ** - Excessive STS path BER (HO) / Excessive VT path BER + (LO) - STS Signal Degrade (HO) / VT Signal Degrade (LO)
A. Bellato CTO T&A Team - OND 107

SONET Path Protection SF / SD


OC-N / STS-N
Section Overhead
STS1 pointers

H1, H2 bytes AIS-P / LOP-P (SF)

V1, V2 bytes AIS-V / LOP-V (SF) Line Overhead VT pointer

VT
V1 V2 V3

STS1
J1 B3 C2 G1 F2 H4 Z3 Z4 Z5

B3 B3 Exber (SF) B3 Signal Degrade (SD) C2 UNEQ (SF) VT POH

V4 V5 J2 Z6

STS1 POH

V5 Bip2 Exber (SF) Bip2 Signal Degrade (SD) Uneq (SF)

Z7 Stuff byte

A. Bellato CTO T&A Team - OND 108

OTH Layering
OTSSk OMSSk OMSnP OTSSo OMSSo

LAYERS
MULTIPLEXED SIGNAL TRANSMISSION OPTICAL CHANNEL () ASSIGNMENT & MULTIPLEXING

OMS/OCH_A
OCH POM

OMS/OCH_A OCH_C OCHSk

OCHSo

ELECTRO/OPTICAL CONVERSION

OTUkSk

ODUkSk
TCT TCM ODU POM

ODUkSo ODUk_C

OTUkSo

OPUkSo

OPUkSk

DIGITAL PATH

CLIENT

CLIENT

A. Bellato CTO T&A Team - OND 109

OTH Network
ODUk path (trail) OCH, OTUk trail OMSn trail OTSn trail
3R LT LT

OCH, OTUk trail OMSn trail OTSn trail OTSn trail R


LT LT

OCH, OTUk trail OMSn trail OMSn trail OTSn trail OTSn trail
3R OADM LT

OXC
STM-N LT LT

OXC
STM-N

OSn

LT

DXC

3R IP data

DXC
IP

KEY LT Line Terminal (optical channel multiplexing) OADM Optical Channel Add/Drop Multiplexer OXC ODU Cross-Connect 3R Wavelength assignment/regeneration (O/E/O, w/ clock recovery) R repeater (Optical Amplifier)
A. Bellato CTO T&A Team - OND 110

OTH Frame Structure


SDH/SONET FDDI ATM IP GbE clear channel

2.5 Gb/s K=1 10 Gb/s K=2 40 Gb/s K=3

Digital domain

Associated overhead

OH OH OH

Client

OPUk
ODUk FEC

OCh Payload Unit (OPUk) OCh Data Unit (ODUk) OCh Transport Unit (OTUk) Optical Channel (OCh)

OTUk
Non-associated overhead Optical domain OCh OH

OCH OCC OCC OPS0

OMS OH OTS OH

Optical Channel Carrier (OCC) Optical Physical Section Optical Multiplex Section Optical Transmission Section

OSC

Optical Transport Module

Optical Supervisory Channel

A. Bellato CTO T&A Team - OND 111

OTH Protection Schemes - Summary


LAYER SCHEME TRIGGERING FAULT SWITCH COM. TIME 50 ms REFERENCE STANDARDS

OMS Trail OCH Trail ODUk Path

Linear 1+1 OMS (uni) Linear 1+1 OCH SNC/N (uni)

OMS layer LOS + OMS OH OOS defects (SF/SD) OCH layer LOS (through OCH POM) + OCH OH OOS defects (SF/SD) OTUk defects (SF/SD)

50 ms ITU-T G.873.1 50 ms ITU-T G.798 ITU-T G.808.1


(under definition)

Linear 1+1/1:N ODUk SNCP/I (uni/bid) Linear 1+1/1:N ODUk SNCP/N (uni/bid)

(Linear protection)

ODUk defects (through ODUk POM) (SF/SD)

50 ms

Linear 1+1 SNCP/S (uni/bid)

TCMi defects (up to six TC independent levels in ODUk OH)

50 ms

A. Bellato CTO T&A Team - OND 112

OTH OMS Protection


Protection Scheme Layer Switching Mode
Linear 1+1 OMS (scheme under definition - based on OMS LOS detection and OMS-OH OOS defects detection) OMS trail Unidirectional

Operation Mode
W.T.R. timer APS channel
(Revertive mode)

Revertive / Not Revertive


5 12 min; (T.B.D. step) Not Required (since unidir switching mode) Clear SF on Protection (TSF-P) Lockout Pr FS SF (TSF-P) SD (TSF-O)* MS WTR NR 50 ms (line/NE propagation delay not included) 0 10 sec; 100 ms step

(Bidirectional Mode)

Switching Criteria/ States (decreasing


priority level)

Switch Completion Time


Hold-Off timer

* - TSF-O may be disabled by provisioning


A. Bellato CTO T&A Team - OND 113

OTH OMS Protection SF / SD


Logical content for protection purpose Forward Defect Indication Overhead TSF-O (SD)
(FDI-O due to Loss of Signal Overhead or Trace Identifier Mismatch detected, locally or remotely, at OTS OH level)

Forward Defect Indication Payload TSF-P (SF)


(FDI-P due to Loss of Signal Payload / Trace Identifier Mismatch / Payload Missing Indication detected, locally or remotely, at OTS OH level)

OTM Overhead Signal (OOS)

OTU
OCh OH
OMS OH OTS OH

OCH OCC OCC

OSC
Loss of Signal Payload TSF-P (SF)
(LOS-P)

A. Bellato CTO T&A Team - OND 114

OTH OMS Protection Application


OMSn trail
3R LT LT

OMSn trail
OSC LT OADM

OMSn trail
3R
LT

R
LT

Wk 1 N Pr 1 N

OXC
STM-N LT

OXC
LT STM-N

OSC (OMS-OH OOS)

Linear 1+1 OMS DXC


Same s bundle

LT 3R

Linear 1+1 OMS DXC

IP

IP data

WK s PR s

x2 x2

Wavelength accomodation

A. Bellato CTO T&A Team - OND 115

OTH OCH Protection


Protection Scheme Layer Switching Mode
Linear 1+1 OCH SNC/N - Not Intrusive based on OCH LOS detection through POM and OCH-OH OOS defects OCH trail Unidirectional

Operation Mode
W.T.R. timer APS channel
(Revertive mode)

Revertive / Not Revertive


5 12 min; (T.B.D. step) Not Applicable Clear Lockout-Pr Forced Switch SF (TSF-P) SD (TSF-O)* Manual Switch WTR NR 50 ms (line/NE propagation delay not included) 0 10 sec; 100 ms step

(Bidirectional Mode)

Switching Criteria/ States (decreasing


priority level)

Switch Completion Time


Hold-Off timer

* - TSF-O may be disabled by provisioning


A. Bellato CTO T&A Team - OND 116

OTH OCH Protection SF / SD


Logical content for protection purpose Forward Defect Indication Overhead TSF-O (SD)
(FDI-O due to Loss of Signal Overhead or Trace Identifier Mismatch detected, locally or remotely, at OTS OH level and confirmed at OMS level)

Forward Defect Indication Payload TSF-P (SF)


(FDI-P due to Loss of Signal Payload / Trace Identifier Mismatch / Payload Missing Indication detected, locally or remotely, at OTS OH level or due to Loss of Signal Payload detected at OMS level)

OTM Overhead Signal (OOS)

OTU
OCH OH OMS OH OTS OH

Loss of Signal Payload TSF-P (SF)


(LOS-P)

OCH OCC

OCC

OSC

A. Bellato CTO T&A Team - OND 117

OTH OCH Protection Application


OCH trail
3R LT LT

OCH trail
OSC (OCH OH-OOS)

R
LT

Wk 1 N Pr 1 N

LT

OADM

OXC
STM-N LT

OXC
LT

OXC

OSC (OCH OH-OOS)

Linear 1+1 OCH DXC


Same s bundle

LT
3R IP data

Linear 1+1 OCH IP

Optical Fiber
WK s WK s

x2 x2

x2
PR s WK s PR s PR s

x1

Possible wavelength accomodation

A. Bellato CTO T&A Team - OND 118

OTH ODUk Protection


Protection Scheme Layer Switching Mode
Linear 1+1 Linear 1:N ODUk SNC/I - Inherent based on server OTUk defects driving ODUk matrix re-configuration ODUk path Unidirectional / Bidirectional

Operation Mode
W.T.R. timer APS channel
(Revertive mode)

Revertive / Not Revertive


5 12 min; (T.B.D. step) APS / PCC bytes of ODUk Overhead Clear Lockout-Pr Forced Switch SF (SSF) SD (SSD) Manual Switch WTR NR 50 ms (line/NE propagation delay not included) 0 10 sec; 100 ms step

(Bidirectional Mode)

Switching Criteria/ States (decreasing


priority level)

Switch Completion Time


Hold-Off timer

A. Bellato CTO T&A Team - OND 119

OTH ODUk SNC/I protection SF / SD


FAS LOF (SF) MFAS LOM (SF) TTI Trace Identifier Mismatch (SF) BIP-8 DEG (SD)
1 2 3 4 5 6 7 8

BEI/BIAE

BDI IAE
3

RES

SM
1 2

TTI
Column #
1 2 3 4 5 6 7 8 9 10 11 12 13

BIP8

14

15..3824 38254080

Row#

1 2 3 4

FAS

MFAS

SM

GCC0

RES

FEC
ODU Overhead

OH

ODUk OTUk OCH

FEC
KEY FAS: Frame Alignment Signal (3xF6h, 3x28h) MFAS: Multi-frame alignment signal (0..255) SM: Section Monitoring overhead

A. Bellato CTO T&A Team - OND 120

APS channel in OTN linear protection

ODUk
1 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16

Frame Alignment Overhead RES


TCM ACT

OTUk Overhead TCM5 TCM4 FTFL OPUk overhead

Row#

2 3 4

TCM6

TCM3
GCC1 GCC2

TCM2

TCM1

PM
RES

EXP

APS/PCC

Request Type Req. Ch. Id. Br. Ch. Id. (Bridge Status) Arch. Mode

Bytes 5-6-7 Automatic Protection Switching / Protection Communication Channel Byte 8 reserved for future use

A. Bellato CTO T&A Team - OND 121

OTH ODUk SNC/I Protection Application


OTUk trail
LT LT

OTUk trail
LT

R
LT

OADM

OXC
STM-N
LT LT

OXC

OXC

Linear 1+1 ODUk SNC/I DXC

LT 3R

Linear 1+1 ODUk SNC/I

IP data

IP

Optical Fiber
WK s WK s

x2 x2

x2
PR s WK s PR s PR s

x1

Possible wavelength accomodation

A. Bellato CTO T&A Team - OND 122

OTH ODUk Protection


Protection Scheme Layer Switching Mode
Linear 1+1 Linear 1:N ODUk SNC/N - Not Intrusive based on ODUk defects monitored through ODUk POM ODUk path Unidirectional / Bidirectional

Operation Mode
W.T.R. timer APS channel
(Revertive mode)

Revertive / Not Revertive


5 12 min; (T.B.D. step) APS / PCC bytes of ODUk OH Clear Lockout-Pr Forced Switch SF (TSF) SD (TSD) Manual Switch WTR NR 50 ms (line/NE propagation delay not included) 0 10 sec; 100 ms step

(Bidirectional Mode)

Switching Criteria/ States (decreasing


priority level)

Switch Completion Time


Hold-Off timer

A. Bellato CTO T&A Team - OND 123

OTH ODUk SNC/N Protection SF / SD


STAT Locked Defect (SF) / ODUkAIS (SF) TTI Trace Identifier Mismatch (SF) BIP-8 DEG (SD)
1 2 3 4 5 6 7 8

BEI

BDI
3

STAT

PM
1 2

TTI
1 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16

BIP8

Frame Alignment Overhead RES


TCM ACT

OTUk Overhead TCM5 TCM4 FTFL OPUk overhead

Row#

2 3 4

TCM6

TCM3
GCC1 GCC2

TCM2

TCM1
APS/PCC

PM
RES

EXP

OH OH

OPUk ODUk OTUk FEC


KEY PM: Path Monitoring STAT: Status

A. Bellato CTO T&A Team - OND 124

OTH ODU SNC/N Protection Application


Linear 1+1 ODUk SNC/N ODUk path

LT

LT

R
LT LT

OADM

OXC
STM-N LT LT

OXC

OXC

LT

DXC

3R IP data

IP

Optical Fiber
WK s WK s

x2 x2

x2
PR s WK s PR s PR s

x1

Possible wavelength accomodation

A. Bellato CTO T&A Team - OND 125

OTH ODUk Protection


Protection Scheme Layer Switching Mode
Linear 1+1 Linear 1:N ODUk SNC/S - based on TCMi defects monitored at ODUk OH ODUk path Unidirectional / Bidirectional

Operation Mode
W.T.R. timer APS channel
(Revertive mode)

Revertive / Not Revertive


5 12 min; (T.B.D. step) APS / PCC bytes of ODUk OH Clear Lockout-Pr Forced Switch SF (TSF) SD (TSD) Manual Switch WTR NR 50 ms (line/NE propagation delay not included) 0 10 sec; 100 ms step

(Bidirectional Mode)

Switching Criteria/ States (decreasing


priority level)

Switch Completion Time


Hold-Off timer

A. Bellato CTO T&A Team - OND 126

OTH ODUk SNC/S Protection SF / SD


1 2 3 4 5 6 7 8

STAT Locked Defect (SF) / AIS (SF) / LTC (SF) TTI Trace Identifier Mismatch (SF) BIP-8 DEG (SD)

BEI/BAEI

BDI

STAT

TCMi
1 2 3

TTI
1 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16

BIP8

Frame Alignment Overhead RES


TCM ACT

OTUk Overhead TCM5 TCM4 FTFL OPUk overhead

Row#

2 3 4

TCM6

TCM3
GCC1 GCC2

TCM2

TCM1
APS/PCC

PM
RES

EXP

OH OH

OPUk ODUk OTUk FEC

Up to six independent TC levels monitored/terminated


KEY TCM: Tandem Connection Moniitoring STAT: Status

A. Bellato CTO T&A Team - OND 127

OTH ODUk SNC/S Protection Application


TCM2 trail
TCM3 trail
Operator A Operator B
User

Border of the OTN Client mapping into ODU

Working User Protection

Linear 1+1 ODUk SNC/S (B)


Border of the OTN Client mapping into ODU

Linear 1+1 ODUk SNC/S (A) User QoS supervision (TCM1) End-to-End path supervision (PM)

A. Bellato CTO T&A Team - OND 128

You might also like