SONET Protection

advertisement
SONET Survivability Mechanisms
CSC/ECE 772: Survivable Networks
Spring, 2009, Rudra Dutta
SONET APS

Automated Protection Switching
–
Switches traffic from working to protection resource
upon failure
– No manual intervention - first such mechanism
– Manual intervention necessary for repairs
– Revertive or non-revertive operation
– Two-fiber and four-fiber variants

OAM protocols expected to detect abnormal
conditions
 Similar techniques later used for ATM
Copyright Rudra Dutta, NCSU, Spring, 2009
2
SONET Operation

Plesiochronous to Synchronous
–
–
–

Original T-carrier for voice adopted “base rate”
(single voice digitized)
Successive higher rates formed by multiplexing
Synchronized (within limits), but not synchronous
Synchronous - input/output clocks synchronized
–
–
Jitter, wander, phase difference limited to ingress to
network, synchronized inside
Multiplexing and interleaving considered functions of
network

Early native optical transport
 Ring or non-ring operation
Copyright Rudra Dutta, NCSU, Spring, 2009
3
SONET Layers
Copyright Rudra Dutta, NCSU, Spring, 2009
4
STS-1 Frame
K1
K2
(POH)
(SOH + LOH)
Copyright Rudra Dutta, NCSU, Spring, 2009
5
Automatic Protection Switching






APS takes place at the SONET line level
Very complex task
ANSI APS document (T1.105.01-998) 100
pages long!
Only basic operation explained here
Emphasis on role of K1, K2 bytes of LOH
ATM APS protocol similar, K1, K2 bytes in APS
ATM cells
Copyright Rudra Dutta, NCSU, Spring, 2009
6
APS Objective

Whether traffic is received over the working or
protection fiber is determined by:
–
–
The status of the bridge at source node
The status of the selector at destination node

Objective: establish agreement between source
and destination regarding the status of
bridge/selector
 K1, K2 LOH bytes used by APS protocol for this
purpose
Copyright Rudra Dutta, NCSU, Spring, 2009
7
APS Events

Protection switching: a change in the current
position of the bridge/selector
 Initiated due to certain events:
–
–
Externally initiated commands, e.g., forced switch,
manual switch, lockout of protection, etc.
Automatically initiated command, e.g., loss of signal
(LOS), loss of frame (LOF), signal degrade (due to
parity errors), etc.
Copyright Rudra Dutta, NCSU, Spring, 2009
8
APS Protocol: K1, K2 bytes

K1 byte:
–
–

K2 byte:
–
–
–

Switch request (protection switching event) –4 bits
Destination node –4 bits (max 16 SONET nodes)
Source node –4 bits
Long/short bit
Status (of bridge/selector) –3 bits
Source/destination use K1, K2 bytes to
coordinate protection switching actions
Copyright Rudra Dutta, NCSU, Spring, 2009
9
APS Protocol Operation

Each node:
–
Uses local priority logic to rank (possibly many) local
events
– Encodes highest priority event E1 into K1 byte to be
sent
– Extracts event E2 last received by remote entity
– Uses global priority logic to rank events E1, E2
– Let E be the highest priority event among E1, E2:


–
Sets the status of local bridge/selector based on E
Encodes status in the K2 byte to be sent
If status != status of last K2 byte received, mismatch
alarm
Copyright Rudra Dutta, NCSU, Spring, 2009
10
Underlying concepts

From non-ring APS
–
–
–
–
–
1+1 switching
1:1 switching
1:n switching
Further generalizations
Physical diversity
Copyright Rudra Dutta, NCSU, Spring, 2009
11
1+1 Switching
Copyright Rudra Dutta, NCSU, Spring, 2009
12
1:1 Switching
Copyright Rudra Dutta, NCSU, Spring, 2009
13
1:n Switching
Copyright Rudra Dutta, NCSU, Spring, 2009
14
Access Protection
Copyright Rudra Dutta, NCSU, Spring, 2009
15
SONET Rings

Self-healing rings:
–
–

Services automatically restored following a failure or
signal degradation
Restoration times less than 60 ms
Deploy fiber for loop diversity:
–
–
–
Separate fiber sheath
Separate conduits
Route diversity: take different physical routes from
source to destination
Copyright Rudra Dutta, NCSU, Spring, 2009
16
SONET Ring Types

Choices for various attributes
–
–
–

Number of fibers per link: 2 or 4
Direction of signal: unidirectional or bidirectional
Level of switching: line or path
All 8 ring types are possible
–
But three have become common in practice
– UPSR (2 fiber)
– BLSR/2
– BLSR/4
Copyright Rudra Dutta, NCSU, Spring, 2009
17
Direction

Unidirectional
–
Only one direction around the ring used
for two-way communication

–
–

ADM
Asymmetric delays
ADM
All working traffic travels in clockwise direction
Opposite direction used for protection
ADM
ADM
Bidirectional
–
–
Physically indistinguishable from unidirectional rings; difference
is in direction of traffic flow
Under normal routing, both directions of a connection:

Travel along ring through same ring nodes
 Travel in two opposite directions - Symmetric delays
–
–
Working traffic in both clockwise and counter-clockwise direction
If links between NE1-NE2 fail, protection switching uses spans
between NE2-NE3, NE3-NE4, and NE4-NE1
Copyright Rudra Dutta, NCSU, Spring, 2009
18
Number of Fibers

2 or 4 fibers between each pair of SONET nodes in the
ring
–
–

2-fiber ring
–
–

2-fiber rings robust enough for small geographical area (within
city), may survive single failure, will partition with two or more
4-fiber rings used for regional, national backbones, may survive
multiple failures
Each fiber span carries both working-traffic channels and
protection channels
At most half the channels on each fiber can carry working traffic
4-fiber ring
–
–
Working and protection pairs carried over different fibers
Twice as much fiber cable, but each fiber can be used to
capacity
Copyright Rudra Dutta, NCSU, Spring, 2009
19
Switching Level


Concepts valid in general mesh networks (not just rings)
Path switching:
–
–
–
–
–

Restoration of traffic handled by source/destination of each affected
traffic stream
Source/destination reroute traffic in the event of a failure somewhere in
the route
Affected traffic streams may take different protection routes
Also called path protection
Implemented in a 1+1 or 1:n arrangements
Line switching:
–
Restoration of traffic is handled by the nodes at the ends of failed link,
not the sources/destinations
– Two ways to implement:

Span protection: if a fiber is cut between two nodes, traffic is switched to
another fiber between same two nodes
 Line protection: traffic is switched to another route through the network
between the same two nodes
–
All affected traffic streams take same protection route
Copyright Rudra Dutta, NCSU, Spring, 2009
20
UPSR



1+1 protection: traffic from A to B sent simultaneously on
working/protection fibers
B monitors both fibers, selects the better signal
Fast restoration:
–
Action required only at receivers
– No need for complicated signaling (APS) protocol

But: asymmetric delays
–
–


Not a problem for voice traffic
Potentially problem for TCP window flow control
Line switching not a natural choice with unidirectional ring
No spatial reuse:
–
A bidirectional connection uses capacity on each link of ring
– Max traffic on ring equal to link speed



No limit on number of nodes, length of ring
Simple, easy to implement, low cost
Popular in lower-speed local exchange and access networks
Copyright Rudra Dutta, NCSU, Spring, 2009
21
UPSR
Copyright Rudra Dutta, NCSU, Spring, 2009
22
BLSR/4




Two fibers for working traffic, two fibers for protection
Working traffic carried on both directions along the ring
Traffic routed on shortest path between end nodes
Spatial reuse:
–
Each connection uses capacity only on shortest path
– Aggregate traffic can significantly exceed link speed
– Shortest path routing maximizes spatial reuse


Extra traffic capability (1:1 protection)
Span protection: traffic switched to protection ber between two
nodes where failure occurred
–
Transmitter/receiver failures on a working fiber
– Working fiber cuts

Line protection: traffic rerouted around the ring on protection fibers
–
Cuts of both protection and working bers along a link
– Node failures
Copyright Rudra Dutta, NCSU, Spring, 2009
23
BLSR/4
Copyright Rudra Dutta, NCSU, Spring, 2009
24
BLSR/2

Protection fibers embedded within working bers
–
–
Both fibers used to carry working traffic
Half the capacity on each fiber reserved for
protection

Span protection not possible
 Line protection similar to BLSR/4:
–
Upon link failure, traffic rerouted along other part of
ring using protection capacity on two fibers
– Traffic mapping a tricky problem
– Extra traffic capability (1:1 protection)

Not discussing details
Copyright Rudra Dutta, NCSU, Spring, 2009
25
Download