Documente Academic
Documente Profesional
Documente Cultură
Alberto Bellato
CTO
Technology and architecture
Optical Networks Division
ALCATEL
Vimercate
Content
> Transport Network Concept
> Need for traffic protection
> Methods for traffic protection: Protection & Restoration
> Basics for traffic protection
> Protection Schemes in Transport Networks
> APPENDIX: Protection schemes in SDH/ Sonet/ OTN
En
use d
rs
En
use d
rs
Intermedia
En rs
us
te nodes
d
e
End
s
En user
use d
rs
En
us
ers
d
> Client signals to be carried are
En
use d
rs
mapped over hierarchical transport
entities in order to achieve an
optimized network management
> I.e. no need to manage the client
signal at intermediate nodes, but
bundles of signals with larger
Intermed
En
iate
d
us
ers
nodes
granularity
End
En us ers
u se d
rs
OH client
OH client
⇒ SOURCE OF PROFITABILITY.
Ring Based
Linear
Eventual
closure
Medium High density Low density
density of population of population
of population
POPULATION IS CONSIDERED AS
AMOUNT OF NETWORK
ELEMENTS TO BE CONNECTED
H
G
I
F L
A
H
G
I
F L
A
Switch time
500 ms ÷ up to 10 s
E
D B
C
N
IO
ECT IO
N
O
T
ECT
P Ring Based
R
O
T Eventual
PR
closure
Sub-network Sub-network
Trail Protection
En
use d
rs
En
Intermedia use d
te nodes rs
l
‘b’ Trai La
er ye
Lay r‘
b’
T ra
En rs
us
il
ai l
‘a’ Tr
d
e
ye r
La
End
s
En user
use d
rs
AP TCP CP CP TCP AP
‘End-to-End’ Path
SNC Protection
En
use d
rs
En
Intermedia use d
te nodes rs
ion
port
En rs
us
pat h
iate
d
e
t er med
In
End
s
En user
use d
rs
‘+’ (1 wk + 1 pr)
Shared: Normal Traffic is
usually connected to
‘working’ resource -
‘bridge’ occurs only when
protection is required → End 1 ‘Working’ End 2
(wk) Normal
Extra Traffic may be Traffic
carried by ‘protection’
resource (when no ‘Protection’ Extra
requested for protection) (pr) Traffic
‘Working’
End 1 (wk)
End 2
End 1 End 2
End 1 End 2
‘Protection’ ‘Protection’
‘bidirectional’ revert switch
triggered by APS signaling
⇒ In non‑revertive operation mode, the traffic signal does not return to the
working transport entity, once the defect or the external request affecting
working resource has been removed.
IN DETAILS…
Available commands allowing the
EXTERNALLY operator to control protection
INITIATED
algorithm, by forcing, pre-empting
COMMANDS
or testing the switching status
Signal Fail
All the defect conditions producing the ‘unavailability’ of the
traffic to be protected at the interested layer
Signal Degrade
Error condition affecting traffic to be protected at the interested
layer, over a specific threshold set by operator (not necessarily
producing a ‘unavailability’)
Control Commands
Lockout of Working (#n) disables the access to the protection transport entity for
the (specific) Normal Traffic
Clear Lockout of Working (#n) clears the Lockout of Working (#n) command
Switch Initiation
Hold-Off Time Switch Completion
Time Time interval after the Time
(or Detection Time) detection of a SF or SD The interval from the
Time interval between the and its confirmation as a decision to switch
occurrence of a network condition requiring the (including time needed to
impairment and the protection switching achieve this decision) to the
detection of a signal fail procedure completion of the bridge
(SF) or signal degrade (SD) and switch operation at a
triggered by that network switching node initiating the
impairment ‘bridge request’
Time
NE 2 P.A.C. P.A.C.
N.T. N.T.
Linear’ network topology ‘Ring’ network topology
(Wk)
‘Intermediate’ nodes
performing traffic cross- (Pr)
connection and alarm
(defects / errors) propagation
N.T.
‘Meshed’ network topology
NE 1 NE 1
NE 2 NE 2
P.A.C.
P.A.C.
‘Working’ and ‘Protection’
resources carried into
dedicated transmission
N.T. N.T.
means (e.g. fiber / λ )
F’ (fiber) ring’ network topology ‘4F’ (fiber) ring’ network topolog
N.T.
(Wk)
(Pr)
SPRing protection architecture is also
applicable to meshed network topology,
whenever a ‘closed’ connection of NE’s
(i.e. a ring) is identified through the
network: again, every node of the ring,
performs a protection activity, due to the
resident ‘Protection Algorithm Controller’
N.T.
Cross-connection matrix
NE 1 Protection (Pr) NE 2
1+1 scheme
⇒ 1 ‘protection’ resources dedicated to 1 ‘working’ resource
⇒ only Normal Traffic connected (Extra Traffic on ‘protection’ res. NOT
supported) through permanent ‘bridge’ on the two communication
resources (wk/pr)
⇒ traffic data ‘switched’ (selected) on the base of switching criteria detected
NE 1 NE 2
Switching criterion
(Pr)
declaration
TAL
No
Action Switch
Unidirectional Switch
completed
[Time] [Time]
NE 1 Switch NE 2
N.T. (Wk) TAL – algorithm evolution time
NE 1 NE 2
Failure /
Degrade Switch
removal
(Pr)
No
W.T.R. (Switch)
Action Revert
TAL
(Pr) (Bridge)
Request Type,
Channel ‘identifier’
Protocol message along ‘protection’ resource TAL
(‘No Request’ code)
(Bridge)
Reverse Request,
Channel ‘bridged
TAL
Switch
Request Type,
Channel ‘bridged’
NE 1 Switch NE 2 TAL
N.T. (Wk) Switch
Bidirectional Switch
completed
[Time] [Time]
No Request, Revert
Switch present at both ends
Channel ‘bridged’
until WTR timer expiring Revert
No Request
(Pr)
As soon as WTR timer is expired, starting connectivity
is re-established on both ends through, ‘No Request’
A. Bellato – CTO T&A Team - OND 49 code.
Linear ‘1 : N’ protection scheme
Bridge Switch
N. T. #1 recovered
Working (Wk)
N. T. #n not interested
by protection activity Protection (Pr)
E. T. squelched
‘Squelching’ ‘Squelching’
(AIS injection) (AIS injection)
N. T. #1 recovered
Working (Wk)
N. T. #n not interested
by protection activity Protection (Pr)
E. T. squelched
N. T. #1
As soon as WTR timer is Working (Wk)
expired, starting
connectivity is re- N. T. #n
established on both Protection (Pr)
ends through protocol
E. T.
NE 1 NE 2 NE 1 NE 2
Head end Failure / Tail end
Switching criterion
Degrade
declaration removal
Wait To Restore,
TAL Bridge Channel ‘bridged’
E.T. sq. &
W.T.R.
Request Type, Reverse Request, Bridge
Channel Identifier Switch
Channel ‘bridged &
TAL Switch
E.T. sq. Release
Reverse Request, No Request,
Bridge Channel ‘bridged Switch
E.T/N.S. Ch. Ident.
TAL Bridge Release Switch No Request
& Bridge E.T. / N.S. E.T./N.S. Ch. bridge
Request Type, Switch
Channel ‘bridged’ on protection No Request Bridge & Switch
TAL Switch
E.T./N.S. Ch. bridge E.T. / N.S.
Switch on protection
Bidirectional Switch E.T. / N.S. Revert on main
completed on protection ‘bidirectionally’perfor
[Time] [Time] [Time] med [Time]
st Type i.e. the request (failure / degrade / command) or state (‘No Request’ /
‘Do Not Revert’ / WTR) to be signalled / acknowledged by each end of
the protection group
d Channel Identifier (bridge status) i.e. the identifier of ‘working’ / ‘protection’ resource
for which the ‘bridge’ / ’switch’ matrix configuration
is performed
ecture mode i.e. the ‘redundant’ configuration, “+”, or the ‘shared’ configuration, “:”
tion mode i.e. the locally ‘revertive’ / ‘not revertive’ operation mode signalled
remote end for possible ‘provisioning mismatch’ detection
(supported in OTH)
⇒ In linear 1:N schemes, Extra Traffic squelching implies that ‘end’ nodes forces
a defined alarm signal (AIS) towards the Extra Traffic user.
E.T. E.T.
(Pr)
Request Type,
Channel Identifier (No E.T. sq.)
NE 1 NE 2
N.T. (Wk) N.T.
NE 1 NE 2
N.T. (Wk) N.T.
Request Type,
Switch Channel ‘bridged’
Switch
P.T.
‘Protection’ resources
NE 3 ‘N/2+1 ÷ N’
Pass-through
PATH
‘LONG’
‘Full’ Pass-through Macro-state entered by each node of the ring (not ‘switching’), by-
passing ‘bridge request’ not destined to itself; performing also the ‘bidirectional’ by-pass
(EW, W E) of ‘protection’ resources (Low Priority channels). ‘Pass-through’ nodes are
also called ‘intermediate’ nodes.
(see grey nodes in previous example)
A. Bellato – CTO T&A Team - OND 62
4F ‘classic’ SPRing – Ring Switch
In ‘classic’ application (2F/4F) the
protection path corresponds always to
the ‘LONG’ path of the scheme: the
N.T. recovered E.T. squelched propagation delay for the protected
PATH
traffic is, then, always maximized.
‘SHORT’
Switch
P.T.
NE 3 PATH
‘LONG’
‘Working’ resources
Switch
Bridge
NE 3 Temporary squelching, if associated LP channels
are not required for ‘ring switch’ connectivity
PATH
‘LONG’
⇒ ‘Ring Switch’, in 4F topology occurs anytime a failure/degrade affects at least two out of
four transmission means of a span, in such a way that both one ‘working’ and one
‘protection’ resources results fault affected or when a ring command is applied on that span. As
for ‘2F ring’, Normal Traffic is recovered through ‘protection’ resources on the ‘LONG’ path.
⇒ In ‘classic’ (also called ‘terrestrial’) application, same behaviour already described about
‘2F’ ring’, same E.T. squelching policy and same node macro-states apply.
⇒ In ‘transoceanic’ application, current standard reference (SDH) states that during ‘ring
switch’ all the Extra Traffics configured through the ring are ‘squelched’; after the ‘ring switch’
is performed, those Low Priority channels not used for Normal Traffic protection are re-
connected to Extra Traffic.
This is a slow process possibly using ‘communication channels’ between the nodes of the
ring, i.e. control plane, for E.T. re-configuration (protection protocol independent).
Both ‘distributed’ ring switch and Extra Traffic recovery is applicable, due to the knowledge
of the whole ring connectivity at each node of the ring (see ‘Traffic Map’).
The following node macro-states are entered during protection activity:
Switching Macro-state entered by ’end’ node of the span interested with switching
criteria, initiating a ‘ring switch’ by sending (tail end) to the adjacent ‘switching’ node, both
on the ‘LONG’ and on the ‘SHORT’ path of the ring a ‘ring bridge request’, or acknowledging
(head end), both on LONG/SHORT path a ‘ring bridge request’ destined to itself.
Switching nodes performs ring
‘Bridge&Switch’ only when adding/dropping (terminating) Normal Traffic to be protected on the
base of APS signaling exchanged through the ‘LONG’ path (see yellow nodes in previous
example).
‘Full’ Pass-through Macro-state entered by each node of the ring (not ‘switching’), by-
passing ‘bridge request’ not destined to itself. The same protocol specified in ‘classic’
application is used. ‘Pass-through’ nodes performs ring ‘Bridge&Switch’ only when
adding/dropping (terminating) Normal Traffic to be protected on the base of APS signaling
received by both switching nodes; otherwise, they realize the ‘bidirectional by-pass (EW,
W E) of ‘protection’ resources (Low Priority channels). ‘Pass-through’ nodes are also called
‘intermediate’ nodes (see grey nodes in previous example).
Protocol parameters
• Request Type i.e. the request (failure / degrade / command) or state (‘No Request’ / WTR)
to be signalled / acknowledged by opposite end of the span interested
• Path i.e. the portion of the ring interested by APS signaling, ‘short’ ,(span fault affected), or
‘long’, (the remaining spans of the ring)
• Bridge status i.e. ‘idle’, ‘bridge’ , ’bridge & switch’ matrix configuration
‘Switch’ to ‘Protection’
resource x
NE 1
Bridge
E.T. E.T.
squelched NE 2 kept
NE 4 K - pass-through
Switch
NE 3 The protection path corresponds
always to the ‘SHORT’ path of the
PATH
‘K byte’ Pass-through Macro-state entered by each node of the ring (not ‘switching’),
by-passing ‘bridge request’ sent on the ’LONG’ path by ‘switching’ node. The same protocol
specified in ‘classic’ application is used.
‘K byte’ Pass-through nodes do not perform any
reconfiguration
A. of local
Bellato – CTO T&A Team connectivity.
- OND 69 ‘K-byte Pass-through nodes are also called
‘intermediate’ nodes. (see grey nodes in the example)
Squelching in ring schemes
⇒ In ring schemes, Extra Traffic squelching implies that nodes ‘dropping’ Extra
Traffic forces a defined alarm signal (AIS) towards the Extra Traffic user, both
in case they enter the ‘switching’ (due to a ring/span switch) or the ‘pass-
through’ state.
Besides, nodes performing ‘span switch’ have also to insert the alarm
signal (AIS) towards the ring, on ‘Low Priority’ channels carrying possible E.T.
passing from the ‘protected’ span through the node.
NE 1
Span
Br&Sw
NE 4 NE 2
E.T. squelched
on adjacent span
NE 3
Ring squelching
This type of squelching is needed in 2F/4F ‘classical’ SPRing, when a node of the
ring becomes ‘isolated’ either for node failure or for multiple failures requiring ‘ring
switch’ at both sides.
In this case, due to the ring switch action performed by nodes adjacent the
isolated one (i.e. ‘switching’ nodes), possible traffics terminated into isolated node
and allocated on same ‘High Priority’ channels for both sides (West/East), would be
misconnected by accessing the same ‘Low Priority’ channels.
Wk Ch. #x
E W
N.T. #1
NE 4 NE 2
N.T. #2
W E
E NE 3 W
Pr Ch. #x+ N/2
Wk Ch. #x
Wk CH. #x
E W
N.T. #1
NE 4 NE 2
N.T. #2
W E
E NE 3 W
Pr CH. #x+ N/2
Wk CH. #x
N.T. #2
Misconnection avoided through Low
Priority channel squelching (AIS
injection) at switching nodes
Total N paths
SPRING SNC
Ring protection
Access
network
Access
networ
k
e2e protection
Centralized restoration is
historically an application of Operating System
network management in Transport
Network (i.e. SDH), where the
amount of operators was very
limited and a complete
DCN Network
geographical network (e.g. country)
used to be configured and
controlled by a single(few) ECC
manager(s).
Centralized Restoration is an
application provided to an operator Network
by a ‘single’ vendor. Element
Distributed Restoration is an
application thought for a ‘multi’
vendor enviroment.
The de-regulation in ‘Public Networks’, Transport Network
has made ‘distributed management’,
then ‘distributed restoration’ attractive
also for Transport Network. This Generic Path Distributed
Manger
implies a standard activity in order to
align applications from different NE from
vendor ‘b’
vendors.
MSASk MSASo
HTCM HPOM
HTCT HSUT
HPC
HO PATH/TRAIL
HPTSk HO HPTSo
Trail
HPASk LPASo
LTCM LPOM
LTCT LSUT
LPC
LO PATH/TRAIL
LPTSk LO LPTSo
Trail
CLIENT CLIENT
A. Bellato – CTO T&A Team - OND 81
SDH Network
STM-N STM-N STM-N
ST tra l
NRS
M
RS trail RS trail RS trail
-
M
S
MS trail MS trail ADM
il
tr
ai
2R 3R
TM TM
DXC DXC ADM ADM
TM TM
DXC
HO / LO PATH (TRAIL)
KEY
TM Terminal Multiplexer
LE (2R) Line Equipment: repeater (no Ck recovery)
LE (3R) Line Equipment: regenerator (Ck recovery)
DXC Digital Cross-Connect
ADM Add Drop Multiplex
RSOH AUG V
C High
Two ways of SDH 3
High
Administrative pointers
P Order
Order
multiplexing
O
H
MSOH
V
C
3
Low
Low
V P Order
Order
C O
4 High
High H
KEY P
RSOH Regenerator Section OverHead
Order
Order V
O C
MSOH Multiplex Section OverHead
AUG Administrative Unit Group H 1 Low
Low
VC Virtual Container 2 Order
Order
POH Path OverHead P
O
H
Layer MS Trail
Layer MS Trail
STM-N
RSOH
Administrative pointers
MSOH
STM-N STM-N
RSOH RSOH
MSOH MSOH
M
S
tr
MS trail MS trail
ai
ADM
l
Working
2R 3R
TM TM 2/4 F
DXC Protection DXC ADM MS-SPRing ADM
TM TM
Layer HO / LO Path
Switch Completion 50 ms (due to the lack of APS protocol, line propagation delay not
Time applicable)
RSOH
H1 H2 H3 VC 12
V1
V2
MSOH
V3
V4
V5
• V1, V2 bytes TUAIS / TULOP (LO VC12 SSF
SF)
K4
Stuff byte
Layer HO / LO Path
Switching Mode Unidirectional
Operation Mode Revertive / Not Revertive
W.T.R. timer 5 ÷ 12 min; 1 sec step
(Revertive mode)
APS channel NOT APPLICABLE
(Bidirectional Mode)
Switching Criteria/ Clear Lockout-Pr Forced Switch SF SD Manual Switch WTR
States (decreasing NR
priority level)
Switch Completion 50 ms (due to the lack of APS protocol, line propagation delay not
Time applicable)
Stuff byte
HO/LO Sub-Network
HO/LO
HO/LO Sub-Network Sub-Net. ADM
Working
2R 3R
TM TM HO/LO
DXC Protection DXC ADM SNCP N ADM
TM TM
Layer HO / LO Path
Switching Mode Unidirectional
Operation Mode Revertive / Not Revertive
W.T.R. timer 5 ÷ 12 min; 1 sec step
(Revertive mode)
APS channel NOT APPLICABLE
(Bidirectional Mode)
Switching Criteria/ Clear Lockout-Pr Forced Switch SF SD Manual Switch WTR
States (decreasing NR
priority level)
Switch Completion 50 ms (due to the lack of APS protocol, line propagation delay not
Time applicable)
K3
N1
• N1 Bip8 Signal Degrade (SD) / UNEQ (SF) / Loss of
Tandem Connection (SF) / Trace Identifier Mismatch
(SF) VC 12 POH
V5
J2
N2
• N2 Bip2 Signal Degrade (SD) / UNEQ (SF) / Loss of
Tandem Connection (SF) / Trace Identifier Mismatch K4
(SF)
Stuff byte
DOMAIN B HTCT/LTCT
Protection
HTCT/LTCT
DXC
DXC DXC
Working
HO / LO VC TC
(intermediate monitoring)
Layer HO / LO Trail
* - As for SNCP/N
O
OC-M OC-M OC-M
C-
Se ne
M
Section Section Section
ct
Li
io
n
Line Line ADM
3R
TM TM
DCS DCS ADM ADM
TM TM
DCS
Layer Line
Layer Line
Section
Overhead
STS1 pointers
Line
Overhead
OC-N OC-N
SectionOH SectionOH
LineOH LineOH
Layer HO / LO Path
Switch Completion 50 ms (due to the lack of APS protocol, line propagation delay not
Time applicable)
- ‘P’ for STS path (HO) / ‘V’ for VT path (LO) ^ - Applicable only to STS path
* - Excessive STS path BER (HO) / Excessive VT path + -BER
STS(LO)
Signal Degrade (HO) / VT Signal Degrade (LO
OPTICAL CHANNEL (λ )
OMSSk OMSSo
ASSIGNMENT &
OMSnP MULTIPLEXING
OMS/OCH_A OMS/OCH_A
OCH ELECTRO/OPTICAL
POM CONVERSION
OCHSo OCH_C OCHSk
CLIENT CLIENT
LT
DXC 3R DXC
IP data IP
KEY
LT Line Terminal (optical channel multiplexing)
OADM Optical Channel Add/Drop Multiplexer
OXC ODU Cross-Connect
3R Wavelength assignment/regeneration (O/E/O, w/ clock recovery)
R repeater (Optical Amplifier)
Associated
overhead
40 Gb/s
OH OPUk OCh Payload K=3
Unit (OPUk)
level)
OTU
OCh OH
OCH
OMS OH
OCC OCC
OTS OH
OMSn
OPSn
λ OSC OTSn
3R 3R
λ OSC
LT LT R Wk λ 1÷ λ LT
LT
N
LT OADM
OXC Pr λ 1÷ λ N
OXC
LT LT
STM-N STM-N
λ OSC (OMS-OH OOS)
IP IP data
WK λ ’s
x2 Wavelength
accomodation
PR λ ’s
x2
OTU
Loss of Signal Payload TSF-P
OCH OH (SF)
OCH
(LOS-P)
OMS OH
OCC OCC
OTS OH
OMSn
OPSn
λ OSC OTSn
IP data IP
Optical Fiber
WK λ ’s WK λ ’s
x2
x2
PR λ ’s PR λ ’s
x2
WK λ ’s
Possible wavelength
PR λ ’s
x1 accomodation
IAE
BDI
• MFAS LOM (SF) BEI/BIAE RES
• TTI Trace Identifier Mismatch SM
(SF) 1 2 3
• BIP-8 DEG (SD) TTI BIP8
Column #
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15…………..3824 3825…………4080
Row#
OH ODUk FEC
OTUk
KEY
FAS: Frame Alignment Signal (3xF6h,
OCH 3x28h)
MFAS: Multi-frame alignment signal
(0..255)
SM: Section Monitoring overhead
A. Bellato – CTO T&A Team - OND 120
APS channel in OTN linear protection
ODUk
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
LT LT R
LT LT OADM
OXC OXC OXC
LT LT
STM-N
IP data IP
Optical Fiber
WK λ ’s WK λ ’s
x2
x2
PR λ ’s PR λ ’s
x2
WK λ ’s
Possible wavelength
PR λ ’s
x1 accomodation
BDI
• TTI Trace Identifier Mismatch (SF) BEI STAT
• BIP-8 DEG (SD) PM
1 2 3
TTI BIP8
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
OH OPUk
LT LT R
LT LT OADM
OXC OXC OXC
LT LT
STM-N
LT
DXC 3R
IP data IP
Optical Fiber
WK λ ’s WK λ ’s
x2
x2
PR λ ’s PR λ ’s
x2
WK λ ’s
Possible wavelength
PR λ ’s
x1 accomodation
BDI
• STAT Locked Defect (SF) / AIS (SF) / LTC BEI/BAEI STAT
(SF) TCMi
• TTI Trace Identifier Mismatch (SF)
1 2 3
• BIP-8 DEG (SD)
TTI BIP8
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
Up to six
OH OPUk independent TC
levels
monitored/termin
OH ODUk FEC ated
KEY
TCM: Tandem Connection Moniitoring
OTUk STAT: Status
Operator B
User
Working
User
Protection