1 DRNI  Network Protection Interaction Some examples in which one or more faults in DRNI require a change in Network Protection Some examples in which.

Slides:



Advertisements
Similar presentations
G.8032 for Ethernet Networks Ethernet Ring Protection
Advertisements

Rev. 1 Norman Finn P802.1AXbq editing plan Rev. 1 Norman Finn
Network Protection and Restoration Session 5 - Optical/IP Network OAM & Protection and Restoration Presented by: Malcolm Betts Date:
Satoshi NARIKAWA NTT (G.8032 Acting Co-editor)
1 Transport Services Layer Protection Switching Types Interacting with DRNI Maarten Vissers
1 DRNI Examples and DAS position Maarten Vissers Version 01.
Slide 1 Copyright : Valiant Communications Limited Slide 1 VCL-SafeComm 8 E1 Links (24 E1 Ports) Orion Telecom Networks Inc Updated: April,
CENG 3331 Introduction to Telecommunications and Networks.
Slide 1 VCL-SafeComm 16 T1 Links (48 T1 Ports) Copyright : Valiant Communications Limited Slide 1 Updated: April, 2010 Telecom Transmission Solutions.
1 Distributed Network Protection (DNP) architecture study Maarten Vissers v4 v2: includes a few slides at the end illustrating segment protection.
5.1 Overview of Network Access Protection What is Network Access Protection NAP Scenarios NAP Enforcement Methods NAP Platform Architecture NAP Architecture.
1 DRNI and Distributed Protection Examples Maarten Vissers v01 Based on slides presented in IW meeting in Nanjing on Thursday Sept 22.
M Vinod Kumar Tejas Networks Ltd.  Example  Requirements  Possible solutions.
1 Distributed Network Protection (DNP) architecture study Maarten Vissers v3 v2: includes a few slides at the end illustrating segment protection.
2. Computer Clusters for Scalable Parallel Computing
DRNI Examples, DAS position, MEP/MIP position
Hirschmann‘s RS2-FX/FX Fast Ethernet Rail Switch
MPLS-TP PWE3 dual-homed protection (MPDP)
ISE Architecture Monitoring (MnT) Inline Posture Node (IPN) Policy Service (PSN) Administration (PAN)
Peer to Peer Discovery Nate Thrasher. Peer to Peer Discovery ● 2 Basic Categories – Hardware Discovery – Information Discovery ● JXTA (
1 DRNI and G.8031 ETH SNCP interworking Maarten Vissers
Tesseract A 4D Network Control Plane
Chapter 1. Introduction 1.#.
Metrocore/Vesper Field Trial Pisa (Italy) Marconi PMA32 Metropolitan fiber optic ring located in the town of Pisa (Italy) Links based on G.652 fiber, 22.
P247. Figure 9-1 p248 Figure 9-2 p251 p251 Figure 9-3 p253.
INTERNET CRITICALITIES Activation and deactivation of the emergency back-up network Fabrizio Cuccoli, Francesco Sermi RaSS CNIT UO Firenze.
1 Multipoint Ethernet Connection Protection
1 DRNI Data Plane Model I/II Comparison & MAC Address Values in DRNI Maarten Vissers v00.
1 Data Plane Summary Maarten Vissers v1.
1 Supporting VUNI in DRNI Maarten Vissers v01 v01: added multiple virtual UNI with hairpin.
1 Terminology: Segment Protection M Vinod Kumar Abhay Karandikar.
Achieving Qualities 1 Võ Đình Hiếu. Contents Architecture tactics Availability tactics Security tactics Modifiability tactics 2.
Q description of G.8031 Ethernet Connection (EC) SubNetworkConnection (SNC) Protection “VLAN Segment Protection” Maarten Vissers v2.
MAL 1 MAL 2 MAL 3 MAL 4 COMMUNICATION LINKS 1.MCP – MAL : VSAT, FHTDMA RADIO, LINE MODEM, HF Radio, Inmarsat 2.CARNATION HUB – MCP: VSAT, Inmarsat 3.CARNATION.
Topology Level: Prep-I Topic: Computer Networks Ms. Fouzia Yousuf October 25, 2010.
Modeling Process CSCE 668Set 14: Simulations 2 May be several algorithms (processes) runs on each processor to simulate the desired communication system.
IMPROUVEMENT OF COMPUTER NETWORKS SECURITY BY USING FAULT TOLERANT CLUSTERS Prof. S ERB AUREL Ph. D. Prof. PATRICIU VICTOR-VALERIU Ph. D. Military Technical.
Chapter 12 Computer Networks. Basic Concepts in Computer Networking – Communication Links – Figure 12.1a –Two Forms of Information Representation (a)
1 Portal Models Maarten Vissers v1. 2 DRNI Applicability DRNI model is applicable to many different portal types 1.PB Portal (S-DRNI) 2.BCB.
What is Industrial Ethernet Industrial & Optical Ethernet Industrial Ethernet Networks? There is only one Ethernet –802.3 –Ethernet v2.
1 Terminology: Segment Protection M Vinod Kumar Abhay Karandikar.
Network Topologies Lecturer: Hyder R. Hamandi. Network Topologies Physical topologies describe how the cables are run in the network A topology is a way.
There are Physical and logical network layout. Physical : Topology of a network refers to the configuration of cables, computers, and other peripherals.
Physical Topology Physical layout of the network nodes – Broad description of the network: no detail about device types, connection methods, addressing,...
Clustering In A SAN For High Availability Steve Dalton, President and CEO Gadzoox Networks September 2002.
Messages asynchronously reads or writes a block of data to another module on a network. Controller communication done using local or remote messages. local.
COMPUTER NETWORKING.  Definition  Need & advantages  Types of network  Basics of network architecture  LAN Topologies  Network models  Network.
Configuring Network Access Protection
Network Programming Chapter 1 Networking Concepts and Protocols.
Portal Models Maarten Vissers v2
M Vinod Kumar Tejas Networks Ltd.  Example  Requirements  Possible solutions.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 ATM.
1 Distributed Network Protection (DNP) architecture study Maarten Vissers v1.
CENG 3331 Introduction to Telecommunications and Networks.
Network types Point-to-Point (Direct) Connection Dedicated circuit boards connected by cable; To transfer data from A to B: – A writes on its circuit board;
Developing an Implementation Framework for the Future Internet using the Y-Comm Architecture, SDN and NFV Glenford Mapp Associate Professor Middlesex University,
Supporting VUNI in DRNI Maarten Vissers v00
Implementing Network Access Protection
Discussion on Overlapped IPGs in 802.1Qbf
Computer Security Network Security
Virtual Network Management
Valiant Communications Limited
Stephen Haddock September 13, 2012
DRNI and Distributed Network Protection Model Evolution: Maarten  Norm  Steve Maarten Vissers v1  
ВОМР Подмярка 19.2 Възможности за финансиране
Споразумение за партньорство
Valiant Communications Limited
Valiant Communications Limited
Node 2 Migration.
Implementation Plan system integration required for each iteration
Presentation transcript:

1 DRNI  Network Protection Interaction Some examples in which one or more faults in DRNI require a change in Network Protection Some examples in which one or more faults in Network Protection require a change in DRNI Adds additional ‘external’ protection switching trigger condition(s) to DRNI (from NP) and to NP (from DRNI) DRNI and NP need to communicate with each other; what is the minimum message set?

Active GW Standby GW Figure 1A Figure 1B Active GW Standby GW W P W P W P W P Network Protection DRNI Network Protection DRNI Two Network Protection (NP) architecture cases TOP: with Intra-NP link BOTTOM: without intra-NP link

X Active GW Standby GW Figure 2A Figure 2B X Active GW Standby GW W P W P W P W P Network Protection DRNI Network Protection DRNI DRNI configuration change to restore EC (no interaction with network protection)

X X Active GW Standby GW X X Active GW Standby GW Figure 3A Figure 3B W P W P W P W P Network Protection DRNI Network Protection DRNI DRNI configuration change plus DRNI initiated Network Protection configuration change to restore EC NP change restricted to portal nodes NP change involves node outside portal

Active GW Standby GW Figure 4A Figure 4B Active GW Standby GW W P W P W P W P Network Protection DRNI Network Protection DRNI Network Protection configuration change to restore EC (no interaction with DRNI) X X Network Protection configuration change and NP initiated DRNI configuration change to restore EC

Active GW Standby GW Figure 5A W P W P Network Protection DRNI X X Network Protection configuration change and NP initiated DRNI configuration change to restore EC

7 Network Protection Types 802.1Q B-VLAN recovery via MSTP/MVRP 802.1Q TESI protection G.8031 EC SNCP G.8032 Ethernet Ring Protection G ODUk SNCP and more….

8 B-VLAN Recovery How to control that active B-VLAN endpoint is moved from node 2 to node 3 for examples in figures 3A, 3B, 4B and 5A? How to control that DRNI active GW is moved from node 2 to node 3 for examples in figures 4B and 5A?

9 TESI Protection How to control that active TESI endpoint is moved from node 2 to node 3 for examples in figures 3A, 3B, 4B and 5A? How to control that DRNI active GW is moved from node 2 to node 3 for examples in figures 4B and 5A? How to control that TESI endpoint in node 1 switches from W to P for example in figure 3B?

10 EC SNC Protection How to control that active EC SNCP endpoints are moved from node 2 to node 3 for examples in figures 3A, 3B, 4B and 5A? How to control that DRNI active GW is moved from node 2 to node 3 for examples in figures 4B and 5A? How to control that EC SNCP endpoint in node 1 switches from W to P for example in figure 3B?