RPR Interconnection Topologies IEEE802.17 WG Orlando, Florida USA March 11~16, 2007.

Slides:



Advertisements
Similar presentations
EdgeNet2006 Summit1 Virtual LAN as A Network Control Mechanism Tzi-cker Chiueh Computer Science Department Stony Brook University.
Advertisements

G.8032 for Ethernet Networks Ethernet Ring Protection
1588V2 Telecom Profile Framework
Exercises and Solutions Lecture 1
BUDAPEST UNIVERSITY OF TECHNOLOGY AND ECONOMICS Budapest University of Technology and Economics Verification of RSTP Convergence and Scalability by Measurements.
Micro-loop Prevention Methods draft-bryant-shand-lf-conv-frmwk-00.txt draft-zinin-microloop-analysis-00.txt.
Resilience Issues in Information Centric Networks Ning Wang University of Surrey.
Development and Operation of Active Distribution Networks: Results of CIGRE C6.11 Working Group (Paper 0311) Dr Samuel Jupe (Parsons Brinckerhoff) UK Member.
802.17c Protected Inter-Ring Connection Rafi Ram - Corrigent Systems March 2007.
Slide 1 Parallel Computation Models Lecture 3 Lecture 4.
Chapter 2 Network Models.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 2 The OSI Model and the TCP/IP.
ATSN 2009 Towards an Extensible Agent-based Middleware for Sensor Networks and RFID Systems Dirk Bade University of Hamburg, Germany.
July 15, 2002 SCI02 ORLANDO Wireless Token Ring Protocol1 UC Berkeley WOW Wireless Token Ring Protocol (WTRP) A Medium Access Control Protocol for QoS.
Corona Stacking – new features
Implementing a Highly Available Network
DataLink Layer1 Ethernet Technologies: 10Base2 10: 10Mbps; 2: 200 meters (actual is 185m) max distance between any two nodes without repeaters thin coaxial.
Network-based IP VPNs using Virtual Routers Tim Hubbard.
Doc.: IEEE xxxxx Submission doc. : IEEE wng0 Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
Manufacturing, Engineering & Technology, Fifth Edition, by Serope Kalpakjian and Steven R. Schmid. ISBN © 2006 Pearson Education, Inc.,
1 Overview of MS-SPRing and GMPLS Multiplex Section - Shared Protection Ring Prepared by: –Diego Caviglia – –Huub van Helvoort.
ASHIMA KALRA.  COMPUTER NETWORK  Local Area Network (LAN) Local Area Network (LAN)  Metropolitan Area Network(MAN) Metropolitan Area Network(MAN) 
Computer Network: It is group of interconnected computers and devices which are sharing the same communication infrastructure and communication protocols.
NETWORK Topologies An Introduction.
Multiple Links Failover Mechanism for RPR Interconnected Rings IEEE WG Orlando, Florida USA March 11~16, 2007.
Doc.: IEEE xxx e Submission March 14, 2008 Huawei, Telecom Italia Slide 1 Project: IEEE P Working Group for Wireless Personal Area.
Network Survivability Yishi Li, Matt Willis (Mentor: Svetlana Poroseva) Summer 2005 Research Experience for Undergraduates at Florida State University.
Load Balancing in Protection Switching of Optical Networks Hongkyu Jeong, Gyu-Myoung Lee Information and Communications Univ. (ICU) Student ID : ,
FRE 2672 TFG Self-Organization - 01/07/2004 Engineering Self-Organization in MAS Complex adaptive systems using situated MAS Salima Hassas LIRIS-CNRS Lyon.
A New Handover Mechanism for Femtocell-to-Femtocell Adviser: Frank, Yeong - Sung Lin Presented by Li Wen Fang.
Doc.: IEEE /495r1 Submission July 2001 Jon Edney, NokiaSlide 1 Ad-Hoc Group Requirements Report Group met twice - total 5 hours Group size ranged.
Clustering In A SAN For High Availability Steve Dalton, President and CEO Gadzoox Networks September 2002.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 9 Virtual Trunking Protocol.
-Network topology is the layout of the connection between the computers. -It is also known as the pattern in which computers.
September 2004Rudolf, Carlton and TGr Marian Rudolf, Alan Carlton - InterDigital doc: IEEE /1052r0.
Data Communications and Networks Chapter 1 - Classification of network topologies Data Communications and Network.
Interconnect Networks Basics. Generic parallel/distributed system architecture On-chip interconnects (manycore processor) Off-chip interconnects (clusters.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Protection concerns using Switched Ethernet as internal bus for a Telecommunication Network Element.
Virtual MAC Redundancy Protocol (VMRP) IEEE WG Hyatt Regency Dallas, TX USA Nov 12~17, 2006.
Yan Wang Proposed amendments of control frames for c Yan Wang Huawei technologies.
Tunable QoS-Aware Network Survivability Presenter : Yen Fen Kao Advisor : Yeong Sung Lin 2013 Proceedings IEEE INFOCOM.
Distributed DBMS, Query Processing and Optimization
Telecommunications and Networking
Introduction Computer networks: – definition – computer networks from the perspectives of users and designers – Evaluation criteria – Some concepts: –
Computer Network Architecture Lecture 2: Fundamental of Network.
1 IEEE interim, Orlando, Florida, March, 2008new-nfinn-fast-chains-rings-par5c-0308-v1 Fast Recovery for Chains and Rings Proposal for PAR and 5.
Collaboration diagrams. Deployment diagrams. Lesson 4.
1 IETF-70 draft-akhter-bmwg-mpls-meth MPLS Benchmarking Methodology draft-akhter-bmwg-mpls-meth-03 IETF 70 Aamer Akhter / Rajiv Asati /
802.17c Protected Inter-Ring Connection Rafi Ram - Corrigent Systems March 2008.
Multi-carrier Handover Method IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE C802.16m-08/1007 Date Submitted: Source:
Sub-IP Layer Protection Mechanism Performance Benchmarking draft-ietf-bmwg-protection-term-04.txt draft-ietf-bmwg-protection-meth-03.txt BMWG, IETF-71.
IEEE Smart Grid TAG July 2013 working document
Some aspects to be determined in PIRC July
802.17c Protected Inter-Ring Connection
The Load Balancing Schemes Observations
Multi Domain Segmented network Protection (MDSP)
Review of March 2013 Proposed Pars
Chapter 16: Distributed System Structures
RNI Requirements Imposed by PBB-TE
DATA COMMUNICATION Lecture-43.
Presented by Jason L.Y. Lin
Sami Repo Tampere University of Technology FINLAND
The University of Adelaide, School of Computer Science
Protection of UNIs and E-NNIs
Commission report on Art. 8 WFD Monitoring programmes
1st Implementation Report of the Water Framework Directive
CAN (Campus Area Network)
MSFD PoMs workshop on CEA/CBA April 1, 2014
Presentation transcript:

RPR Interconnection Topologies IEEE WG Orlando, Florida USA March 11~16, 2007

Two Basic RPR Interconnection Topologies Topology A Topology B

Topology ATopology B Cost effective and maintenanceInterconnected stations are co-located, the cost is relatively economical. There are four box to be connected for the PIRC, more cost than topology A domain protection and load- balancing perspective Only the two interconnected stations are involved. All four interconnected stations are involved, and need more mechanisms such as synchronization message between the two directly interconnected stations, link failure detection/notification, link failure indication. Note: more discussion about this on the companion document ( rpr multi-links failover.ppt). Topology flexibilityThe interconnected stations are coupled, it is not flexible for the network deployment. The interconnected stations are decoupled, more flexibility Fast recoveryUse the domain recovery mechanism can reach 50ms failover time. Use the xSTP (or variation) may realize fast failover time. However it’s also feasible to use domain protection mechanism, however with more implementation complexity. The Comparison of Two Topologies

Tentative Conclusion (need further discussion): When the requirement of network deployment flexibility outweighs the cost, then the Topology B is used, or else the Topology A is recommended in the RPR interconnection rings network. The Comparison of Two Topologies – Cont.

The following slides will illustrate the different application scenarios for the interconnected RPR rings. The following figures take the Topology A as example, but the same topologies also apply to Topology B as well.

Application Scenario 1 There are several subtending rings across one ring. Each pair of interconnected stations ({A, B} and {C,D}) are independent and belong to different protection groups.

Application Scenario 2 There are several subtending rings across one ring, and these subtending rings share a common station. Each pair of interconnected stations ({A, B} and {B, C}) are independent and belong to different protection groups.

Application Scenario 3 There are several subtending rings across one ring, and these subtending rings share the same interconnection stations. For the usual deployment, subtending access rings are not communicated each other, they only need to communicate with the aggregation rings. But if the subtending access rings need to communicate each other, they still can at the cost of some implementation complexity.

Application Scenario 4 We don’t want support this disordered topologies. Do we want?

Thank you