1 Multipoint Ethernet Connection Protection

Slides:



Advertisements
Similar presentations
Intra-Carrier Solutions Enabled by the OIF NNI Erning Ye Nortel Networks.
Advertisements

Ethernet Switch Features Important to EtherNet/IP
1 On the Management Issues over Lambda Networks 2005 / 08 / 23 Te-Lung Liu Associate Researcher NCHC, Taiwan.
Igor Umansky Huub van Helvoort
Satoshi NARIKAWA NTT (G.8032 Acting Co-editor)
Slide 111 May 2008 Point-to-Multipoint in 802.1Qay Nurit Sprecher, Nokia Siemens Networks Hayim Porat, Ethos Networks.
Generalized Multiprotocol Label Switching: An Overview of Signaling Enhancements and Recovery Techniques IEEE Communications Magazine July 2001.
1 Transport Services Layer Protection Switching Types Interacting with DRNI Maarten Vissers
1 DRNI Examples and DAS position Maarten Vissers Version 01.
1 Distributed Network Protection (DNP) architecture study Maarten Vissers v4 v2: includes a few slides at the end illustrating segment protection.
802.1Qay PBB-TE Protection Switching Overview
1 DRNI and Distributed Protection Examples Maarten Vissers v01 Based on slides presented in IW meeting in Nanjing on Thursday Sept 22.
1 Distributed Network Protection (DNP) architecture study Maarten Vissers v3 v2: includes a few slides at the end illustrating segment protection.
Jaringan Komputer Lanjut Packet Switching Network.
DRNI Examples, DAS position, MEP/MIP position
1 Version 3 Module 8 Ethernet Switching. 2 Version 3 Ethernet Switching Ethernet is a shared media –One node can transmit data at a time More nodes increases.
1 DRNI and G.8031 ETH SNCP interworking Maarten Vissers
Control and Traffic Management Paper: Banerjee et al.: ” Generalized multiprotocol label switching: an overview of signaling enhancements and recovery.
1 25\10\2010 Unit-V Connecting LANs Unit – 5 Connecting DevicesConnecting Devices Backbone NetworksBackbone Networks Virtual LANsVirtual LANs.
Copyright 2003 CCNA 1 Chapter 6, part 2 Ethernet Switching By Your Name.
DataLink Layer1 Ethernet Technologies: 10Base2 10: 10Mbps; 2: 200 meters (actual is 185m) max distance between any two nodes without repeaters thin coaxial.
1 DRNI Data Plane Model I/II Comparison & MAC Address Values in DRNI Maarten Vissers v00.
Semester 1 Module 8 Ethernet Switching Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
Capacity of Wireless Mesh Networks: Comparing Single- Radio, Dual-Radio, and Multi- Radio Networks By: Alan Applegate.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: LAN Redundancy Scaling Networks.
Q description of G.8031 Ethernet Connection (EC) SubNetworkConnection (SNC) Protection “VLAN Segment Protection” Maarten Vissers v2.
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
Network Component's and terms.. Hubs  An Ethernet hub, active hub, network hub, repeater hub, multiport repeater or hub is a device for connecting multiple.
Common Devices Used In Computer Networks
Repeaters and Hubs Repeaters: simplest type of connectivity devices that regenerate a digital signal Operate in Physical layer Cannot improve or correct.
1 Portal Models Maarten Vissers v1. 2 DRNI Applicability DRNI model is applicable to many different portal types 1.PB Portal (S-DRNI) 2.BCB.
 Network Segments  NICs  Repeaters  Hubs  Bridges  Switches  Routers and Brouters  Gateways 2.
SONET Survivability Mechanisms CSC/ECE 772: Survivable Networks Spring, 2009, Rudra Dutta.
SMUCSE 8344 Protection & Restoration of Optical Networks.
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
OSI Model. Switches point to point bridges two types store & forward = entire frame received the decision made, and can handle frames with errors cut-through.
Slide 1 MPLS-TP Linear Protection / Author / RTP IE Fixed CET I insert classification level © Nokia Siemens Networks MPLS-TP Linear Protection.
Sem1 - Module 8 Ethernet Switching. Shared media environments Shared media environment: –Occurs when multiple hosts have access to the same medium. –For.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 9 Virtual Trunking Protocol.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 7 Spanning Tree Protocol.
(Slide set by Norvald Stol/Steinar Bjørnstad
Unit III Bandwidth Utilization: Multiplexing and Spectrum Spreading In practical life the bandwidth available of links is limited. The proper utilization.
1 Introduction filtering-0710-v04.pdfhttp://
RSVP-TE Extensions to Establish Associated Bidirectional LSP MPLS/CCAMP WG, IETF 81th, Quebec draft-ietf-ccamp-mpls-tp-rsvpte-ext-associated-lsp-01 Fei.
Computer Network Architecture Lecture 3: Network Connectivity Devices.
1 Generalized EC Type 2 support EC Type 1&2 supporting bridges Maarten Vissers
Portal Models Maarten Vissers v2
NETWORK DEVICES Department of CE/IT.
1 Protection in SONET Path layer protection scheme: operate on individual connections Line layer protection scheme: operate on the entire set of connections.
J. Liebeher (modified by M. Veeraraghavan) 1 Introduction Complexity of networking: An example Layered communications The TCP/IP protocol suite.
1 Revision to DOE proposal Resource Optimization in Hybrid Core Networks with 100G Links Original submission: April 30, 2009 Date: May 4, 2009 PI: Malathi.
Geneva, Switzerland, 13 July 2013 Multipoint Ethernet Connection Protection (MECP) Taesik Cheung Principal Researcher ETRI Joint IEEE-SA and ITU Workshop.
1 Distributed Network Protection (DNP) architecture study Maarten Vissers v1.
MPLS Introduction How MPLS Works ?? MPLS - The Motivation MPLS Application MPLS Advantages Conclusion.
Supporting VUNI in DRNI Maarten Vissers v00
Networking Devices.
Switching and High-Speed Networks
MPLS-TP Survivability Framework
Chapter 4 Data Link Layer Switching
Chapter 3 Part 1 Switching and Bridging
SWITCHING Switched Network Circuit-Switched Network Datagram Networks
Hubs Hubs are essentially physical-layer repeaters:
Network Survivability
Network Virtualization
Chapter 16 Connecting LANs, Backbone Networks, and Virtual LANs
Optical Layer Protection Schemes
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
SURVIVABILITY IN IP-OVER-WDM NETWORKS (2)
Eusebi Calle, Jose L Marzo, Anna Urra. L. Fabrega
Virtual LAN (VLAN).
Presentation transcript:

1 Multipoint Ethernet Connection Protection Maarten Vissers

2 Introduction [G.805] Protection – This makes use of pre-assigned capacity between nodes. The simplest architecture has one dedicated protection entity for each working entity (1 + 1). The most complex architecture has m protection entities shared amongst n working entities (m:n). Protection switching may be either unidirectional or bidirectional. Bidirectional protection switching takes switching actions for both traffic directions, even when the failure is unidirectional. Unidirectional protection switching takes switching actions only for the affected traffic direction in the case of a unidirectional failure. [G.805] Restoration – This makes use of any capacity available between nodes. In general the algorithms used for restoration will involve rerouting. When restoration is used some percentage of the transport network capacity will be reserved for rerouting of working traffic. Ethernet Connection Protection – The operator, a network management system or the ASON/GMPLS control plane will select a subset of the links and nodes inside the network to transport the EC signal. The EC’s VID value(s) will be registered on each of those selected links to establish the EC’s link connections. This VID registration is fixed and will not change under fault conditions. An APS protocol within the EC is responsible to chose a subset of these link connections/nodes within the EC to transport the traffic from input ports to output ports. Ethernet Connection Restoration – The operator, a network management system or the ASON/GMPLS control plane will select a subset of the links and nodes inside the network to transport the EC signal. The EC’s VID value(s) will be registered on each of those selected links to establish the EC’s link connections. This VID registration is dynamic. Under fault conditions in the network the set of selected links and nodes is changed to restore the EC and the EC’s VID value(s) are then registered on the set of alternative links and nodes.

3 EC Protection Well known protection architecture types are  1+1 Protection – Diversely routed Working and Protection EC Segment Connections are set up between the protected EC Segment end points and traffic flows are transmitted over both W and P EC segment connections; at the EC segment egress points traffic flows are read from either Working, or Protection  1:1 Protection – Diversely routed Working and Protection EC Segment Connections are set up between the protected EC Segment end points and traffic flows are transmitted under normal conditions over the W segment connection and read from this W segment connection at the EC segment egress points. Under fault conditions or under control of “external commands” traffic flows are transmitted over and read from the P segment connection.  1:n, m:n and (1:1) n Protection – Diversely routed Working and Protection EC Segment Connections are set up between the EC Segment end points. In 1:n case, n W and 1 P segment connections are set up. In m:n case, n W and m P segment connections are set up. In (1:1) n case, n W and n P segment connections are set up. In all cases, the protection bandwidth is shared amongst the n protected EC signals. 1+1 and 1:1 protection architectures are the commonly deployed architectures for bidirectional P2P connections; 1+1 protection architecture is the commonly deployed architecture for the unidirectional P2P and P2MP connections 1+1 and 1:1 RMP and MP2MP protection architectures can be used to protect RMP ECs and MP2MP ECs.  A necessary precondition is that W and P EC Segment connections can be set up with complete route diversity.  A multipoint version of G.8031’s ETH SNC APS protocol will provide protection control.

4 RMP and MP2MP EC Segment Protection Complete route diversity for W and P EC Segments may not be achievable in all cases, e.g. when the number of ports for an EC is large RMP ECs (without leaf groups) may in such cases be protected by means of more complex architectures; e.g. with a shared protection tree and multiple working trees (n working trees with different leaf sets are protected by 1 protection tree reaching superset of leaves) MP2MP ECs and RMP ECs with leaf groups can not be protected with such shared protection tree and multiple working trees An alternative RMP and MP2MP EC Segment protection architecture would be using an Ethernet Connection which includes additional link connections and nodes (but does not have separate Working and Protection EC Segments); result is that there is “more than one path between any input port and any output port”  Those additional link connections/nodes introduce loops in the EC and the EC is not longer “tree- structured”  Such EC however has build in path redundancy that can be deployed to restore the traffic flow connectivity between all input and output ports under link or node failure conditions  Refer to such EC as a “Redundant EC”

5 Redundant EC Flooding and MAC learning can not be used in a Redundant EC; instead an alternative flow forwarding computation and distribution protocol must be deployed within a Redundant EC SPB or ECMP-SPB protocols are natural “flow forwarding computation and distribution protocol” candidates So far SPB expects have been indicating that those protocols are not optimized for Redundant ECs But wouldn’t it be possible to deploy a Redundant EC optimized SPB/ECMP-SPB protocol? Redundant EC characteristics  A Redundant EC is a Service layer EC, which carries an E-Tree or E-LAN EVC between the EVC’s UNI-N ports, or between the EVC’s UNI-N and E-NNI ports, or between the EVC’s E-NNI ports  The UNI-N ports for this Redundant EC may contain an I-component and a CBP; if present, the Redundant EC is a B-VLAN, with B-MAC addresses inserted at the UNI-N ports, operating at the Service layer; i.e. it is operated as a “Service VLAN” with “Service MAC addresses” (which are inserted by the PIP in the UNI-N port) and a single I-SID value  A Redundant EC has N ports (N  2) and at least two paths between any input port and any output port  A change in the fault (or degradation) status in one or more of the Redundant EC’s link connections and/or nodes, or a change of an external command status triggers a flow forwarding recovery action in the Redundant EC  SF (and SD) status is monitored for each of the links (or link connections) in the Redundant EC  The Redundant EC’s APS OAM channel can transport the Redundant EC optimized SPB or ECMP-SPB protocol messages  Multiple independent Redundant ECs may be present in the transport network’s service layer, each performing its own (ECMP-)SPB based APS protocol

6 Thank you