Unreal-to- Real

Unreal-to- Real

Saturday, January 26, 2013

SDH Networks - Protection Mechanism

SDH Networks - Protection Mechanisms 


Network failures, whether due to human error or faulty technology,  can be very expensive for users and network providers alike. As a result, the subject of so called fall-back  mechanisms is very important. A wide range of standardized mechanisms are incorporated into synchronous networks in order to compensate for failures in network elements.

Protection Mechanism  evolution:

  v  80' s –
-          DCS-based Mesh Restoration of DS3 Facilities
-          Centralized (EMS/NMS)
-          Path-based, failure-dependent, after fault detection and isolation
-          Capacity-efficient but slow (~ minutes)

  v  90' s –
-          ADM-based Ring Protect ion of SONET/SDH Facilities
-          Distributed
-          Path-based (UPSR)  or span-based (BLSR) , pre-determined
-          Fast (“ 50 msec” )  but capacity-inefficient

  v  2000' s  –
-          OXC-based Mesh Protect ion/Restorat ion
-          Distributed
-          Path-based, failure-independent, pre-determined and pre-provisioned
-          Capacity-efficient AND fast  (10’s – 100's msec)

Automatic protection switching (APS):

Two basic types of protection architecture are distinguished in APS.

One is the linear protection mechanism used for point-to-point connections

The other basic form is the so called ring protection mechanism which can take on many different forms. 

Both mechanisms use spare circuits or components to provide the back-up path. Switching is controlled by the overhead bytes K1 and K2.

Linear protection : The simplest form of back-up is the so-called 1+1 APS. Here, each working line is protected by one protection line. If a defect occurs, the protection agent in the network elements at both ends switch the circuit over to the protection line. The switch over is triggered by a defect such as LOS. Switching at the far end is initiated by the return of an acknowledgment in the backward channel.

1+1 architecture includes 100%redundancy, as there is a spare line for each working line. Economic considerations have led to the preferential use of 1:N architecture, particularly for long-distance paths. In this case, several working lines  are protected by a single back-up line. If switching is necessary, the two ends of the affected path are switched over to the back-up line.

The 1+1 and 1:N protection mechanisms are standardized in ITU-T Recommendation G.783.

The reserve circuits can be used for lower-priority traffic, which is simply interrupted if the circuit is  needed to replace a failed working line.



Ring protection : A ring is the simplest and most cost-effective way of linking a number of network elements. Various protection mechanisms are available for this type of network architecture, only some of which have been standardized in ITU-T Recommendation G.841.

A basic distinction must be made between ring structures with unidirectional and bi-directional connections. Figure below shows the basic principle of APS for unidirectional rings. Let us assume that there is an interruption in the circuit between the network elements A and B. Direction y is unaffected by this fault. An alternative path must, however, be found for direction x. 

The connection is therefore switched to the alternative path in network elements A and B. The other network elements (C and D) switch through the back-up path. This switching process is referred to as line switched. 

A simpler method is to use the so-called path switched ring (see figure). Traffic is transmitted simultaneously over both the working line and the protection line. If there is  an interruption, the receiver (in this case A) switches to the protection line and immediately takes up the connection



In unidirectional path-switched rings (UPSRs), two redundant (path-level) copies of protected traffic are sent in either direction around a ring. A selector at the egress node determines which copy has the highest quality, and uses that copy, thus coping if one copy deteriorates due to a broken fiber or other failure. UPSRs tend to sit nearer to the edge of a network, and as such are sometimes called collector rings.

Because the same data is sent around the ring in both directions, the total capacity of a UPSR is equal to the line rate N of the OC-N ring. For example, in an OC-3 ring with 3 STS-1s used to transport 3 DS-3s from ingress node A to the egress node D, 100 percent of the ring bandwidth (N=3) would be consumed by nodes A and D. Any other nodes on the ring could only act as pass-through nodes.

The SDH equivalent of UPSR is SubNetwork Connection Protection (SNCP); SNCP does not impose a ring topology, but may also be used in mesh topologies.


Bi-directional rings : In this network structure, connections between network elements are bi-directional. This is indicated in figure by the absence of arrows when compared with first figure.The overall capacity of the network can be split up for several paths each with one bi-directional working line, while for unidirectional rings, an entire virtual ring is required for each path. If a fault occurs between neighboring elements A and B, network element B triggers protection switching and controls network element A by means of the K1 and K2 bytes in the SOH.


Bidirectional line-switched ring
Bidirectional line-switched ring (BLSR) comes in two varieties: two-fiber BLSR and four-fiber BLSR. BLSRs switch at the line layer. Unlike UPSR, BLSR does not send redundant copies from ingress to egress. Rather, the ring nodes adjacent to the failure reroute the traffic "the long way" around the ring on the protection fibers. BLSRs trade cost and complexity for bandwidth efficiency, as well as the ability to support "extra traffic" that can be pre-empted when a protection switching event occurs. In four-fiber ring, either single node failures, or multiple line failures can be supported, since a failure or maintenance action on one line causes the protection fiber connecting two nodes to be used rather than looping it around the ring.


BLSRs can operate within a metropolitan region or, often, will move traffic between municipalities. Because a BLSR does not send redundant copies from ingress to egress, the total bandwidth that a BLSR can support is not limited to the line rate N of the OC-N ring, and can actually be larger than N depending upon the traffic pattern on the ring. In the best case, all traffic is between adjacent nodes. The worst case is when all traffic on the ring egresses from a single node, i.e., the BLSR is serving as a collector ring. In this case, the bandwidth that the ring can support is equal to the line rate N of the OC-N ring. This is why BLSRs are seldom, if ever, deployed in collector rings, but often deployed in inter-office rings.


The SDH equivalent of BLSR is called Multiplex Section-Shared Protection Ring (MS-SPRING).



Despite predictions of SDH reduction in favour of lower cost transmission, such as Gigabit  Ethernet, still the vast majority of traffic in the operators transport networks runs of SDH.

Apart from the need for well-defined protection switching strategies, SDH on reconfigurable optical networks is quite straightforward. When the cost for an OXC port is lower than for a DXC port an optical bypass layer can be formed reducing the total network cost, especially if protection is done in the optical layer.


ASON



Automatically Switched Optical Network (ASON) is a network management feature which enables dynamic control of transmission networks through an automated management of network resources. ASON functionality is typically made available in higher capacity SDH/SONET and DWDM networks. It enables fast end-to-end service provisioning, re-routing and restoration. As per ITU-T G.8080, the key goals for ASON are:

-          Facilitate fast and efficient configuration within transport layer network
-          Reconfigure or modify connections
-          Perform a protection/restoration function 

No comments:

Post a Comment