Documente Academic
Documente Profesional
Documente Cultură
Objectives
During this course we are going to focus on:
An introduction to ASON/WSON technology
A description of the ASON/WSON Control Plane
A description of the ASON/WSON Protections
On completion of this course the participants will be able to:
1.Describe what ASON/WSON is and which are its main characteristics.
2.Differentiate between ASON and WSON
3.Understand how WSON works and the relevant characteristics in terms of control plane and
protection schemes introduced into the WDM layer
Introduction
Terminology
Optical Domain
MPLS-TP
(ITU-T / IETF)
GMPLS
(IETF)
ASON
(ITU-T)
OTN
(ODU Switching)
(IETF)
ASTN
SDH
(ITU-T)
WSON
WDM
(IETF)
WDM Domain
Before beginning with the details about the ASON/WSON technology and
according to the fact that its not unusual to listen to people speaking about
ASON, ASTN, WSON, GMPLS, as if all these technologies were the same, it
seems to be useful to clarify some points about the terminology.
The acronym GMPLS, that stands for Generalized Multi-Protocol Label
Switching, refers to a suite of protocols developed by IETF to extend the MPLS
ideas outside the context of the IP world.
The acronym ASON, that stands for Automatic Switched Optical Network, is a
Recommendation developed by ITU-T that specifies the requirement to apply the
GMPLS technology to a generic optical network; in this context, with the term
generic optical network we refer both to an SDH or WDM network, or even to
OTN (ODU switching) an MPLS-TP packet network.
In the SDH domain, the specific used acronym is ASTN, that stands for
Automatic Switched Transport Network, and, also in this case, it is a
Recommendation developed by ITU-T. Its a framework that represents the ITU-T
ideas about how the GMPLS technology should be applied to the SDH world (fast
rerouting of Virtual Containers).
In the WDM domain, instead, the specific used acronym is WSON, that stands for
Wavelength Switched Optical Network, and this a draft, not yet a
Recommendation, developed by IETF, that represent the IETF and ITU-T vision
of how the GMPLS should be applied to the optical part of the WDM world (fast
rerouting of wavelength).
Terminology
ASON
(ITU-T)
GMPLS
(IETF)
ASTN
WSON
(ITU-T)
(IETF)
GMPLS
FRAMEWORKS
Supporting
Protocols
GOSPF - TE
GRSVP - TE
LMP
OIF-UNI
WSON
Advantages
Automatic Circuit
Provisioning
Reduced Costs
a Traditional Network
WDM Node
Ethernet Node
Ethernet Node
a wson Network
WDM Node
Ethernet Node
Ethernet Node
WSON
CENTRALIZED
DITRIBUTED
CONTROL PLANE
CONTROL PLANE
So the first point of distinction between a traditional WDM network and WSON is
the evolution from a centralized intelligence to a distributed intelligence, therefore
the evolution from a centralized control plane to a distributed control plane.
DATA PLANE
The distributed control plane controls the data plane, that is the logical entity
formed by all the resources available in the network to transport customer traffic.
The data plane transports the customer traffic; the control plane decides where
this traffic should pass through and sends the right commands to the involved
data plane resources.
The distinction between Control Plane and Data Plane is important in a WSON
context.
Please notice that, the fact the control plane is distributed among different
entities, means that these entities must be coordinated: the complexity of the
WSON Control Plane is mainly due to its distributed nature.
10
WDM Node
Ethernet Node
WSON Inter-node
Communication
Network
Ethernet Node
11
IN-FIBER-IN-BAND
IN-FIBER-OUT-OF-BAND
12
OUT-OF-FIBER-OUT-OF-BAND
Ethernet INTERFACE
Ethernet INTERFACE
13
1
2
3
..
.
80
Optical Supervisory Channel (OSC)
14
What are
the general
requirements
for a WSON
But, what are the general requirements to realize a WSON able to take
advantage of the advanced new protection schemas?
A WSON is based on the following assumptions:
The nodes are able to exchange information about the status of the network;
The nodes are able to send commands to each other;
The nodes are able to re-route the traffic from one line to another line even
changing the lambda of the circuit.
15
LIN
LINE 4
LI
N
5 E
ROADM
3
LINE 2
LINE 6
LINE 1
LINE 7
LIN
E
LINE 9
CUSTOMER
TRAFFIC
A WDM node that is able to reconfigure the direction of the traffic via software
commands is called multi-directional Reconfigurable Optical Add and Drop
Multiplexer or ROADM: all WSON capable nodes are multi-directional ROADMs.
But how is the capability to change the lambda used by a circuit using only one
transponder obtained?
This is obtained using a special kind of transponder that is called tunable
transponder: this transponder can change the lambda of the circuit changing its
internal configuration via software.
Please notice that, its always the controller of the WSON node, guided by the
distributed control plane processes, that triggers the change of direction and, if
necessary, lambda for a circuit.
16
THE WHERE
DECISION
BE TAKEN
TOCAN
RE-ROUTE
BY
THE TRAFFIC ?
NMS
WSON NODE
OR
PCE
PCE
One of the WSON requirements is that the WSON nodes should be able to reroute traffic when a failure occurs.
In order to be able to create or re-route WSON circuits, the equipment must know
which is the best path to choose (click);
How is this knowledge obtained?
We can have two alternative approaches:
The decision is taken by some process running inside the NMS; The NMS tells to
the nodes which is the best path to create;
The decision is taken by the WSON node itself; its able to calculate where to
route o re-route the traffic without passing through the NMS.
In both cases, the engine that is in charge to calculate the best worker and all the
best protections path, according to some specific constraints, that its possible
to explicitly define, is generically called Path Computation Engine or PCE.
17
18
Ideal situation
1.
INFORMATION ABOUT
2.
WSON NODE
3.
19
Ideal situation
1.
INFORMATION ABOUT
2.
WSON NODE
3.
The second step is to calculate the best path: having the picture of the network,
every WSON node is able to find out what is the best path to follow to create or to
protect a circuit; the tool that is in charge of calculating best paths is the PCE.
20
Ideal situation
1.
INFORMATION ABOUT
2.
WSON NODE
3.
21
PERFORM
THE RWA
PCE
VALIDATE
THE PATHS
22
PERFORM
THE RWA
PCE
VALIDATE
THE PATHS
In a WSON, the work of the PCE is complicated by the fact that calculating the
best path in the photonic world is not as easy as it would be in SDH world.
In the photonic world there are some additional physical constraints to be taken
into consideration, such as Polarization Mode Dispersion, non-linear effects, not
perfect signal amplification and so on; these constraints have a more critical
impact in WDM world compared with SDH world.
For example, in the photonic world, the fact that its possible to create a circuit
between a node A and a node B and that its possible to create a circuit between
node B and a node C, doesnt imply that its always possible to create a circuit
between node A and node C.
Another critical point is that, in WDM world, given the fact that it is not possible to
change the frequency of a circuit without going in the electrical domain, its
necessary to try to minimize the usage of the lambdas all around the network; the
problem to find out the best path in terms of administrative cost, minimizing, at
the same time, the number of lambdas used in the network is known in literature
as the Routing and Wavelength Assignment problem (RWA). The RWA has been
demonstrated to be an hard problem to solve; practically, a real PCE will solve
the problem using approximated solutions, based on heuristic, that are
techniques designed to solve a problem that ignores whether the solution can be
proven to be correct, but which usually produces a good solution.
In conclusion, the work of the PCE is to resolve, for each circuit that its
necessary to create o protect, the RWA problem, taking into account all the
possible physical impairments specific for the network: every path must be
calculated and validated, checking if the path is physically feasible despite all the
physical impairments.
23
PERFORM
THE RWA
PCE
VALIDATE
THE PATHS
Its not easy to realize an efficient engine that is able to perform all these tasks:
especially the validation step can be a long process in a big network.
This is the reason why its difficult to have PCE running inside the single WSON
node.
More commonly, WSON nodes interact with a PCE that works off-line, to have
the time to plan all the paths performing calculation, RWA and validation.
The circuits that pre-calculate and pre-validate the protection paths before a
failure happens are called pre-planned protected circuits.
In a first phase, all the WSON protections are pre-planned;
In a second phase, when the PCEs will run directly inside the WSON nodes
controllers, other kinds of protection will be available, like the so called on the fly
protections, in which the protection path is calculated and validated on the fly,
real-time, only when a failure occurs.
Notice that, even in case in which the PCE works off-line, the routing protocol is
still required to be running to monitor the real time status of the network
resources; otherwise, the nodes would never know if a link that is part of a precalculated protection path is still available or not.
24
COST 10
COST 5
COST 20
COST 15
COST 10
COST 20
COST 30
25
Information
packet
LINK 1
LINK 2
LSU
LSU
LSU
COST 20
Im 5the node 1
LINK
COST 5
LINK 7
LSU
LSU
COST 10
COST 15
COST 20
LINK 3
through link 1,
the cost of which is 10;
LINK 4
LINK 6
COST 30
LSU
LSU
through link 7,
the cost of which is 5
26
LINK 1
LINK 2
LSR
LSR
LSR
COST 10
COST 5
LINK 7
COST 20
COST 15
LINK 5
COST 10
LSR
COST 30
LSR
LSR
LINK 4
LINK 6
COST 20
LINK 3
27
GOSPF-TE: TE information
In GMPLS context, with the term Traffic Engineering, we refer to the capability to
take routing decision based on some additional information that is not possible to
express only with a fixed cost given to a link.
What we have seen till now, regards only the part of the GOSPF-TE that is not
related to the traffic engineering functionalities.
To support the traffic engineering functionalities, the LSU packet must transport
some additional information regarding the links, not only the administrative cost.
For example, we can think of assigning an higher cost to links that have a very
high percentage of used bandwidth, so we can imagine a dynamic cost
associated to the link that can vary with the bandwidth occupancy.
Every time that there is a variation on the bandwidth, for example, when a new
circuit is created or is released, new LSU are sent by the nodes that are adjacent
to the links involved in the paths to all the other nodes.
This functionality is difficult to use when the PCE works off-line, because all the
path calculation is done in advance and so the dynamic cost cannot be taken in
account.
This functionality is important when the PCE run directly inside the nodes and
can calculate and validate the paths real time.
Notice that, even if the PCE works off-line the status of the network must be
monitored because the WSON nodes must always know which of the links are
available and which are not.
28
GOSPF-TE: TE information
The total reserve-able bandwidth: for each link, how many channels can I reserve
for WSON paths? All? Only a part? Is this an 80 channels link o a 40 channels
link?
The Bandwidth available: how many lambda are free in a moment to create new
paths?
29
GOSPF-TE: TE information
30
GOSPF-TE: TE information
The concept of Shared Risk Link Group in used by the PCE when calculating the
protection path for a circuit. It represents a group of links that, somehow, share
some risk. For example two links passing through the same physical conduit in
some point share a risk, in the sense that, if someone damages the conduits,
probably the two links will be broken at the same time. During the configuration of
the control plane is possible to specify the SRLGs of which a link is part of: its an
additional topological information that cant be given only with the administrative
cost metric.
When are SRLGs used? An operator can specify that he would like to have the
worker and protection paths passing through completely disjoint SRLGS. If, for
example, the worker path pass through links that are part of SRLG 1, SRLG 2
and SRLG 3, the PCE will try to avoid the usage of links that are parte of SRLG1,
SRLG 2 or SRLG 3.
As it was for the colors constraint, the SRLGs constraint is stronger than the
Administrative cost. But, unlike the case of the colors constraint, the SRLG
constraint is not blocking: even if it is not possible to respect the SRLGs diversity
between worker and protection paths, the circuit is protected, if a path is
available.
31
GOSPF-TE: colors
NODE 1
LINK 7
COST 5
LINK 1
COLOR RED
LINK 2
COLOR GREEN
COST 10
COST 20
LINK 5
COLOR RED
COST 10
LINK 6
COST 15
LINK 3
COST 20
LINK 4
COST 30
COLORS RED
AND GREEN
NODE 4
32
GOSPF-TE: colors
NO PROTECTION PATH AVAILABLE: THE CIRCUIT IS NOT PROTECTED
NODE 1
LINK 7
COST 5
LINK 1
COLOR RED
LINK 2
COLOR GREEN
COST 10
COST 20
LINK 5
COLOR RED
COST 10
LINK 6
COST 15
LINK 3
COST 20
LINK 4
COST 30
COLORS RED
AND GREEN
NODE 4
The PCE, before calculating the best path, deletes from the picture of the network
the links not respecting the color red constraint: link 2, link, 3, link 6 and link 7 are
deleted from the topology.
Now the PCE calculate the best path taking into account the administrative costs;
there is only one path available: the one passing through link 1, link 4 and link 5;
node 1 sends commands to the nodes involved in the path and the circuit is
created.
Notice that, once a color attribute has been assigned to the links, it can be used
or not; if the operator doesnt specify a color during a creation of the circuit, the
color attribute is not taken into consideration by the PCE.
Another point is that, in case the operator wanted this circuit to be protected by
another path passing only through red links, if there is a failure on one of the links
of the working side, its not possible to protect the circuit anymore, because there
is no other path that can join node 1 and node 4 passing only through red links.
33
GOSPF-TE: srlgs
COST 10/SRLG 1/LINK 1
SRLG 5
SRLG 3
COST 5
LINK 9
SRLG 4
COST 15
LINK 7
COST 10
SRLG 6/ LINK 8
COST 20
LINK 5
COST 30
SRLG 7/ LINK 6
34
GOSPF-TE: srlgs
THE CIRCUIT IS PROTECTED EVEN IF
THE CIRCUIT IS PROTECTED TRYING
IT IS NOT POSSIBLE TO RESPECT
TO RESPECT THE SRLG DIVERSITY
THE SRLG DIVERSITY
Failure on a link
SRLG 5
SRLG 3
COST 5
LINK 9
SRLG 4
COST 15
COST 10
SRLG 6/ LINK 8
COST 20
LINK 5
LINK 7
COST 30
SRLG 7/ LINK 6
Failure on a second link
35
VALIDATED
LSPs
OFF-LINE
PCE
WSON
CIRCUIT REQUEST
Once the PCE has calculated and validated a circuit, worker and protection
paths, the next step will be to setup the circuits, that, in a WSON, must always be
bidirectional.
The validates paths are therefore sent by the PCE to the NMS, that passes these
information on to the ingress node for the specific circuit.
36
NODE 2
NODE 1
Control Channel
NODE 3
Control Channel
LINK 1
LINK 5
LINK 3
LINK 6
NODE 6
Control Channel
LINK 7
LINK 2
LINK 4
NODE 5
NODE 4
37
NODE 2
NODE 1
Control Channel
Control Channel
LINK 1
LINK 2
LINK 5
LINK 3
LINK 6
NODE 6
Control Channel
LINK 7
NODE 3
LINK 4
NODE 5
NODE 4
38
PCE
NODE 2
NODE 1
PATH
NODE 3
RSV
PATH
Control Channel
LINK 2
Control Channel
LINK 5
LINK 3
LINK 4
NODE 5
RSV
LINK 6
NODE 6
PATH
LINK 1
LINK 7
RSV
Control Channel
NODE 4
Please, notice that, in both cases, the signaling phase is performed directly by
the ingress node, not by the NMS: in the first case, we can think about a
centralized routing and a distributed signaling behavior (CD); in the second
case, we can think about a distributed routing and a distributed signaling
behavior (DD).
Now, suppose that the output of the PCE were: node 1 - link1 - node 2 - link 2 node 3 - link 3 - node 4 lambda 1. The ingress node prepares a GRSVP-TE
message, that is called Path message, and sends it to next node in the list; in
the example, node 1 sends a path message to node 2. The Node 2 checks
the lambda 1 on the link 2: if its still available, it forwards the request to the
next node in the list, that is, the node 3; otherwise, it sends a path error
message to the node 1 to inform that is not possible to satisfy the request. If
all is ok, the node 3 performs the same operations as the node 2 and forward
the path message to the node 4.
The node 4 recognizes that its the egress node of the LSP, and, if all its ok,
builds a new message, the reservation message (RSV message) to send
backward to the ingress node, the node 1.
When the reservation message reaches the node 1, the LSP is created and the
information is sent to the NMS to align it about the status of the circuit.
Optionally, the ingress node can send a confirm message to the egress node to
inform it that all the LSP creation operation has been completed successfully.
39
Related to the GMPLS technology, there are some other important concepts:
the concepts of link component or LC;
the concepts of link cluster or LK;
the concept of control channel or CC.
40
Link Component
41
Link Cluster
LC 1
Link Cluster (LK)
LC 2
42
Link Cluster
LC 1
Link Cluster (LK)
LC 2
Two link components can be inserted in the same link cluster only if they share
some common characteristics: same capacity, same set of SRLGs, colors,
administrative cost; same nodes as termination points; same kind of link level
protection.
Its always necessary to create the logical entity link cluster, even if only one link
component is defined, because, the GOSPF-TE exchange information about link
clusters and not about link component.
During the control plane configuration phase, the normal procedure is:
Step 1: Define an empty link cluster, assigning to it all the GOSPF-TE
parameters, like administrative cost, SRLGs, colors, etc.
Step 2. Define one or more link components;
Step 3: Associate one or more link component to the already created link cluster.
When all the link clusters are defined, even the one containing only one link
component, the GOSPF-TE process will only take them into consideration.
This means that, in general, the nodes all around the network are aware only of
the link clusters that are present in the network; The details about what is inside a
single link cluster are known only by the nodes that are the termination point of
that particular link cluster, through a specific GMPLS protocol called Link
Management Protocol or LMP.
43
LMP Messages
LMP Messages
44
Protections
45
WSON Protections
There are two different kinds of WSON protections:
The Transponder Sharing Protection or Green Protection
The Safe Optical Sub-Network Connection Protection (Safe OSNCP)
46
transponder sharing
In case of Transponder Sharing Protection, the PCE calculates and validates
two or more LSPs:
One worker LSP, that is immediately signaled and activated by the ingress node;
One or more protection LSPs, that the ingress node do not signal and do not activate
immediately; they are maintained inside the database of the ingress node, associated to the
specific transponder sharing protected circuit.
The first kind of WSON protection is the transponder sharing protection: one
worker LSP is activated and one or more protection LSPs are pre-calculated and
pre-validated but not activated until a failure occurs.
Only one transponder is necessary for this kind of protection;
This type of protection in similar to an On the Fly protection, in which, as soon as
a failure occurs, a new protection path is calculated, validated, signaled and
activated: the only difference is that, for the transponder sharing protection, the
paths calculation and validation is done in advance by the PCE off-line; only the
signaling and activation phase are done on the fly, when a failure occurs.
This is a flexible protection, because the protection bandwidth can be shared
among the protection paths of other WSON circuits.
The only disadvantage is the time for switching, not only because its necessary
to signal the new protection path, and this requires an amount of time that
depends on the number of nodes, but mainly because adding a new circuit in a
WDM network requires an amount of time for equalization and PMD
compensation. PMD compensation can be critical especially for high bit rates, like
40 Gigabit per seconds or 100 Gigabit per seconds.
Please notice that, in general, planning a WSON only with transponder sharing
protections, allows to save a lot of resources in terms of power consumption: this
is the reason why this type of protection is also called Green Protection.
47
transponder sharing
Third
Protection
NODE 1
NODE 2
LSP
Link 1
Second
Protection
LSP
First
Lin
k
Link 2
Link 5
Protection
Link 8
LSP
Link 7
NODE 6
NODE 3
k6
Lin
Worker
Link 3
LSP
Link 4
NODE 5
NODE 4
48
transponder sharing
NODE 1
NODE 2
NODE 3
Link 2
Link 1
Li
nk
9
Link 5
nk
Li
Link 3
Link 8
Link 7
NODE 6
Link 4
NODE 5
NODE 4
Now, suppose a failure happens on the link 2; the ingress node, the node 1 in this
case, checks if all the links on the path for the first protection LSP are ok; if all are
ok, the LSP is signaled and activated; if one of the links is not ok, the ingress
node checks the second LSP and, if all the links are ok, this LSP is signaled and
activated; over wise, the ingress node goes on checking all the possible
protection LSPs until one of these has all the links that are ok. In this case, the
first protection LSP is good because all its links are ok.
If, after a while, before repairing the link 2, a second failure occurs, on link 9, for
example, the third LSP is signaled and activated.
If there is an other failure, on link 8, for example, the ingress node is able to react
because it knows also a third protection LSP and the traffic can be protected.
Of course, in case of a fourth failure, the traffic is lost.
This type of protection is called transponder sharing because to implement this
protection only one transponder is necessary; if we would like to have the
capability not only to reroute the circuit, but also to change the lambda, it will be
necessary to use a kind of transponder that has the capability to tune its
frequency. Its common to refer to these transponders as tunable transponders.
49
transponder sharing
Multi Direction
Line 1
Directionless
Protection
Colorless
Line 1
Trp sharing
Line 2
Line 9
50
transponder sharing
Multi Direction
Line 1
Directionless
Protection
Colorless
Line 1
Trp sharing
Line 2
Line 9
A failure occurs on the line 1: the controller immediately activates its GRSVP-TE
process to signal and to activate the pre-calculated protection LSP passing
through the line 9.
Please notice that, in this example, we changed the lambda, because the orange
lambda on the line 9 has been considered as already used by an other circuit; the
change of lambda is obtained using a tunable transponder, in a configuration
called color-less, that means, with no fixed lambda.
If, at this point, a second failure occurs on the line 9, a second pre-calculated
LSP is signaled and activated.
51
Safe OSNCP
In case of the Safe OSNCP Protection, the PCE calculates and validates three
LSPs:
One worker LSP and one protection LSP, that are both immediately signaled and activated
by the ingress node;
One more protection LSP, that the ingress node doesnt signal and doesnt activate
immediately; its maintained inside the database of the ingress node, associated to the
specific Safe OSNCP protected circuit.
The second kind of WSON protection is the Safe OSNCP protection: one worker
LSP and one protection LSP are activated and one protection LSP is precalculated and pre-validated but not activated until a failure occurs.
Two transponders are necessary for this kind of protection;
The traffic is sent in both the worker and protection side at the same time, as it
would happen for the traditional OSNCP protection.
In case there is a failure on the worker side, the traffic is switched on the
protection side in less than 50 milliseconds and the second protection LSP is
immediately signaled and activated.
Now, in case there is a second failure, this time on the first, original, protection
side the traffic is switched on the second protection LSP in less than 50
milliseconds.
52
SAFE OSNCP
NODE 1
NODE 2
Link 1
First
Protection
LSP
Second
Link 2
Li
nk
9
Link 5
Protection
Link 8
LSP
Link 7
NODE 6
NODE 3
nk
Li
Worker
Link 3
LSP
Link 4
NODE 5
NODE 4
53
Safe OSNCP
NODE 1
Worker
NODE 2
NODE 3
Side
Link 1
Lin
k
Firsttraffic is LOST
The
Protection
Link 8
Link 2
The traffic is switched on this side in less than 50 ms
6
nk
Li
Link 5
Link 3
Side
Link 4
Link 7
NODE 6
NODE 5
NODE 4
The traffic switch on this side in less than 50 ms and the precalculated secondary protection LSP is signaled and activated
The output of the PCE is passed through the NMS to the ingress node of the
circuit, in this example, the node 1, but only the worker LSP (green) and the first
protection LSP (orange) are signaled and activated; the other protection LSP is
maintained in the database of the node associated to this particular circuit.
Now suppose that a failure happens on the link 2: in less than 50 milliseconds the
traffic is switched on the first protection side (orange); in the meanwhile, the
secondary protection LSP (red) is signaled and activated.
If, after a while, and before repairing the link 2, a second failure happens on link
7: the ingress node reacts switching the traffic on the second protection side in
less than 50 milliseconds.
If a third failure occurs, for example, on the link 9, the traffic is lost until one of the
LSPs is repaired.
54
Safe OSNCP
Multi Direction
Line 1
Protection
Colorless
Directionless
Safe-1+1
OSNCP/OUPSR
Line 1
Line 2
Line 9
Lets see an example of what happens inside a WSON node in case of a SAFE
OSNCP protection.
In the picture, its possible to see one circuit formed by two LSPs: the orange line
represents the worker LSP and the green line represents the protection LSP; two
tunable transponders are necessary for the SAFE OSNCP protection.
Suppose that a failure occurs on the line 1: The traffic is switched on the
protection side in less than 50 milliseconds, as it would happen for the normal
OSNCP protection. The original worker path is deleted; a new pre-calculated
protection LSP 2 is signaled and activated passing through the line 2.
Now suppose that an other failure happens on line 9. The traffic is switched on
the LSP 2 in less than 50 ms.
In case a third failure occurs, the circuit is not protected anymore, because only
two protection LSPs are pre-calculated by PCE for that specific circuit. In
conclusion, the Safe OSNCP protection is very fast compared with the
Transponder sharing protection; we pay this speed with more bandwidth to
reserve for a specific circuit, because the protection bandwidth cannot be shared
with other protection LSPs of other circuits and with an additional transponder
that must be present.
55
Thank you for taking the time to listen to this ASON-WSON Fundamentals
course.
For more technical information regarding WDM and OTN, please view the
relevant Fundamentals courses.
56