Sei sulla pagina 1di 242

NG SDH/ASON

Developed & Delivered By: Dr Muhammad Khalil Shahid

Associate Professor, ICT, PTCL, Islamabad

COURSE OBJECTIVES
To provide participants with clear understanding and practical knowledge of next generation SDH and ASON At the end of this course participants will be able to:

Understand Essentials of transmission


Understand the major components of NGSDH Understand the Equipment and Line protection of NGSDH Outline the Limitations of NGSDH Outline the classification of Ethernet Services Configure different services through NMS (Huawei iManagerT2000) Outline the structure of ASON Understand different service types in ASON

COURSE OUTLINE

Introduction & Overview NGSDH Components and Protection NGSDH Features Hardware (OSN 3500)

Ethernet Services & Configuration


ASON

Introduction & Overview

Transport Network

A Transmission Network which has abilities of Manageability, Scalability, have QoS and Fast Protection is called Transport Network Earlier systems up to PDH were considered as Transmission system. SDH introduces the new term Transport Network

Transmission Fundamentals
Some basic concepts in Transmission are:

Modulation Demodulation Line coding Multiplexing De-multiplexing

Optical Communication System

Telecommunication Bands
Optical telecommunication in the near & short infrared is technically often separated Or

O-band 1,2601,360 nm ---------- Original E-band 1,3601,460 nm ---------- Extended S-band 1,4601,530 nm------------- Short wavelength C-band 1,5301,565 nm----------- Conventional L-band 1,5651,625 nm------------ Long Wavelength U-band 1,6251,675 nm-----------Ultra long wave length

Optical Windows

Limiting Factors

Attenuation Dispersion

10
10

Attenuation

Due to impurities in glass In fabrication Bad connectors Insertion losses pulse can be weaker

11
11

On

Of f

On

On

Off On Receiver Threshold

On

Off On

1 On

On On

Excessive Dispersion
Bit Error

1 Off

Off Off

Excessive dispersion & (attenuation) Bit

SM Optical Fiber Dispersion Characteristics

Dispersion coefficient (ps/nm Km)

G.655 fiber with positive dispersion coefficient G.652 fiber

17

G.653 fiber

1310

1550

G.655 fiber with negative dispersion coefficient (nm)

13
13

Evolution Of Transport Technologies

PCM PDH SDH NGSDH/Ethernet/RPR WDM/ROADM/OTN

14

SDH

Synchronous Digital Hierarchy SDH is a hierarchical set of digital transport structures, standardized for the transport of suitably adapted payloads over physical transmission networks An integrated transmission network managed by a powerful network management system

15

SDH

A standard developed by the International Telecommunication Union (ITU) It is documented in standard G.707 and its extension G.708 Developed to replace the Plesiochronous Digital Hierarchy (PDH) system Allow interoperability between equipment from different vendors with Strong Network Management capabilities

16

SDH Bit Rates


STM-1: 155.52 Mbps STM-4: 622.08 Mbps STM-16: 2.488.32 Gbps STM-64: 9.95 Gbps

STM-256: 40 Gbps

17

SDH Link Structure


REG
RS MUX

MUX

Regenerator Section

MS MS
Multiplex Section Multiplex Section

MS
Multiplex Section

Sub network

Path Section

18

RS, MS, AND Path Overheads


Difference among POH, MSOH, & RSOH
Repeater Term Mux Add-Drop Mux Repeater

Term Mux

POH MSOH RSOH Path OH end to end circuit Multiplex Section OH multiplexer to multiplexer Regenerator Section OH repeater to adjacent node or vice versa
19

STM Performance Monitoring And Management

RSOH, MSOH and POH provide monitoring and management function for different layers/levels of STM-N frame For STM-64 frame: RSOH monitors the overall transmission performance of STM-64 signal MSOH monitors the performance of individual STM-1s POH monitors each low-rate signal (e.g., 2 Mbps)
20

Mapping & Multiplexing Procedures


x3 Multiplexing x3 Multiplexing AU PTR LO POH VC-4 TUG-3 TUG-2 TU-12 VC-12 C-12

xN
STM-N AUG-4

x1
AU-4
2Mb/s

xN Multiplexing HO POH x7 Multiplexing

TU PTR

Code rate adjustment

21

Communication Channel
Data Communication Channel Bytes: D1~D12

These 12 bytes are provided for the transport of monitoring & control data in Network Management System. D1-D3 belongs to RSOH, bandwidth is 3x64 kb/s D4-D12 belongs to MSOH, bandwidth is 9x64 kb/s D1-D12 are transmitted in STM-1#1 of STM-N only.

DCC Channel

NMS

OAM Massages: performance, alarm, operation commands etc.

22

APS
Automatic Protection Switching (APS) bytes: K1, K2 (bits:b1-b5) Used for network multiplex protection switch function K1 & K2 only transmitted in STM-1 #1 of STM-N Multiplex Section Remote Defect Indication (MS-RDI): K2 (b6-b8) Return alarm message from Rx to Tx Indicate Rx receiving alarm K2 (b6-b8) value is 110

23

K1 & K2 Bytes
Detect K2 (b6~b8)

N 111 Y Normal Operation Generate MSAIS

Return MSRDI

24

Clock Quality

SSM indicates the status & quality level of SDH signal Value indicates quality level of available clock source (b5-b8) 0010 = G.811 = External Clock (Cesium) 0100 = G.812 = Transit Exchange Clock Signal (Rubidium) 1000 = G.812 = Local Exchange Clock Signal (Rubidium or Crystal) 1011 = G.813 = Internal Clock (SETS) (Crystal) 1111= Not Suitable for synchronization Only transmitted in STM-1 #1 of STM-N

25

E1 Mapping In VC4
TS#

X+ 3 (Y-1)+ 21 (Z-1)

X= TUG-3 Location (1-3) Y= TUG-2 Location (1-7) Z= TU-12 Location (1-3) If E1 location is TU 2 4 3, find TS#

26

SDH Synchronization Method


Network elements are synchronized to a central clock. This central clock is generated by a high-precision primary reference clock (PRC) unit (ITU-T G.811). This specifies an accuracy of 1 x 10 e-11. This clock signal must be distributed throughout the entire network. A hierarchical structure is used for this. Improper synchronization causes degradation in network function, and even total failure results

27

Synchronization Network Chain


Cascading of timing references through a network should be minimized and governed by the ITU recommendation. Timing performance degrades as timing is passed from clock to clock. Synchronization chains should be kept short

PRC 1 SEC

20
1 SSU 21

10

SSU

60

28

Synchronous Timing Unit

NE clock working mode

Normal
b d b c

Normal Operating mode Holdover mode Free-run mode


Free-run

Holdover

29

Network Protection

30

Line Network Protection Types

1+1 Multiplex Section Protection


1:1 Multiplex Section Protection

31

Line Network 1+1 Multiplex Section Protection


TR
CS work route

CS

OL

OL

TR

OL
protect route

OL
work or protect

At sending end, the STM-N signal is sent simultaneously over both segments of the work and protect. At receiving side, only one (work or protect) path is selected based on quality. Send Together Receive One
32

Line Network 1:1 Multiplex Section Protection


Work
CS CS

Work

OL

OL

OL

OL

Protection Protection The 1:1 structure is the subset of the 1:N (where N=1) structure. It has the capacity to work in the 1+1 structure and to interconnect with the 1+1 structure of the other end.
33

Continue

In Multiplexing segment 1:1 protection The working payload is transmitted through the working path while the protection path can be used to carry extra payload which is of inferior class. When the working path fails, the extra payload on the protection path will be superseded by the working payload according to APS protocol. Thus the working payload is protected.

34

Under normal circumstances, 1:1 becomes 2+0.

Basic Ring Network Protection Types


2-fiber Unidirectional Path Protection Ring 2-fiber Bidirectional Protection Ring 4-fiber Bidirectional Protection Ring Multiplex Section

Multiplex

Section

36

2-fiber Unidirectional Path Protection Ring


CA AC W1 P1 A D P1 W1 C B D P1 W1 A C B CA AC W1 P1

switching
CA AC CA AC It adopts 1+1 protection mode, the switching criteria is PATH-AIS, & APS protocol is not needed. At the source NE, the payload is send to the working path and protection path simultaneously. The destination NE detect and compare the coming signal from both paths, then determine to receive the payload of better quality.

37

2-fiber Bidirectional MS Protection Ring

2 fiber: Two fibers between a pair of nodes Bi-direction: Service between two NEs use the same section of the network and are transmitted by reverse direction Multiplexing Section: Protection based on MS, protect the payload part, use APS protocol for protection.

38

Working Principle
S1/P2 A D C S2/P1 B

Working path
S1 & S2; under normal situations, service are transmitted over working path. The first half of one fiber is working path. Taking STM-16 as an example, 1-8 AU4 are used for working path.

39

Working Principle
Protecting Path
S1/P2 A D C S2/P1 B

P1 & P2; services transmit along protection path after switch over. The last half part of the fiber is used as protecting path. Taking STM-16 as example, 9-16 AU4 are used as protecting path.

40

Working Principle
S1/P2 A D C S2/P1 B

Relationship between working & protecting paths


The protecting path of one direction protect the working path of the other direction, i.e, P1 protects S1, & P2 protects S2.

41

Working Principle
CA Rx

AC Tx
S1/P2

Use S1 & S2 to transmit services.


Service AC is sent in S1 through path A->B->C Service CA is sent in S2 through path C->B->A P1 and P2 can be used to send extra service now.

A D C

S2/P1 B

CA Tx

AC Rx

42

Switching Conditions
Auto Switch Conditions: LOS, LOF, MS-AIS, Signal Degrade

43

Switching Procedure
SwitchIf the fiber between B and C is broken, switching occurs in B and C B node: service AC crosses from S1 to P1, and sent through A->B->A->D->C C node: service CA crosses from S2 to P2, and sent through C->D->A->B->A
AC Rx

CA Rx

AC Tx S1/P2 A S2/P1 B C

CA Tx
44

Multiplex Section Shared Protection Ring

Normal state in MS-SPRING. AU4 # 1-8 used for working channels AU4# 9-16 used for protection & can be used for low priority traffic.
45

Time slots can be reused High network capacity *M*STM-N Switching time 25ms

Features Of 2 Fiber Bidirectional MSP Ring

Advantages: Time slots between two nodes can be reused, thus increasing the transmission capacity. Standby path P1 and P2 can be used to transmit extra services of inferior class.

Disadvantages: longer switching time due to APS protocol. Numbers of maximum nodes supported by APS is limited to 16.
Transmission capacity: (k/2) x STM-N nodes). (k=no. of

46

4 Fiber Bidirectional MSP Ring

47

4 Fiber Bidirectional MSP Ring

48

4 Fiber Bidirectional MSP Ring


Advantages: Time slots can be reused High network capacity: M*STM-N Disadvantages: Maximum number of nodes on one ring is limited to 16 Mechanism is complicated Expensive Application: Mainly STM-16 or above system Scattered traffic distribution Backbone system
49

Comparison Of Protection Schemes


Protection Type No. of Nodes Line Speed Transmission Capacity APS Protocol Switching Time Cost System Complexity Field of Application 2f Unidirectional PP Ring K STM-N STM-N No <30ms Low Simple Relay Networks (Centralized Services) 2f Bidirectional MSP Ring K STM-N K/2*STM-N Yes 50-200ms Medium Complex Long Distance Networks (Distribution Services) 4f Bidirectional MSP Ring K STM-N k*STM-N Yes 50-200ms High Complex Long Distance Networks (Distribution Services)

50

Node Protection (SNCP)


Protection features: Traffic transmit end sends concurrently, receive end receives selectively 2 fiber unidirectional traffic (Diversely routed) 1 + 1 single-ended protection Protection switching criteria: Signal fail (SF) Signal degrade (SD) Externally initiated command

51

SNCP

52

SNCP Vs MSSPRING

53

Network Protection Summary

54

SDH vs. SONET

SONET can be thought of as the North American version of SDH The main differences are in the basic SDH and SONET frame formats, but SDH and SONET are essentially identical beyond the STS-3 signal level The base signal for SONET is STS-1 and the base signal for SDH is STM-1. STS-3c is equivalent to STM-1 and the lower tributaries can be mapped interchangeably between the two formats from that point on.

55

Continue

In SDH, both electrical and optical signals are referred to as STM signals. In SONET, however, electrical signals are called STS and optical signals are referred to as OC.

56

SDH / SONET

ADVANTAGES:
Strong Management capabilities
Provide guaranteed bandwidth Provide fast recovery time from faults smaller than 50ms

DISADVANTAGES:
No support for Data services Fixed circuits ( circuit-based)

Bandwidth inefficiency
Only one node can transmit at a time
57

57

NGSDH Features

58

SDH Problems

The traffic type is changing Challenge How to use bandwidth efficiently for both voice and data traffic Lack of fine granularity to accommodate all potential clients stream rates

59

WHY NGSDH

Data traffic is growing exponentially Accommodating this traffic is must Data traffic handling is limitation of SDH Need for new system which can support data

60

WHY NGSDH

The data packet transport (Ethernet, PPP) is a challenge for SDH This is because they are connectionless, use statistical multiplexing, and can be best-effort technologies This is the opposite of SDH which is predictable and based on time division multiplexing (TDM)

61

Continue.

Two options Some modification to existing SDH Metro Ethernet

First option will save investment already made in SDH No need for major modification

62

NGSDH- Ethernet Over SDH

63

Ethernet Over SDH

SDH SDH METRO NETWORK SDH


SDH Ring-1

SDH

SDH

SDH
Ring-2

SDH SDH SDH

64

NG SDH Drivers

The drive to SDH Next Generation development was: The desire to find one simple encapsulation method that was capable of accommodating any data packet protocols Secondly, the need to use bandwidth accurately Solution A new adaptation protocol layer is required and a new mapping mechanism for controlling bandwidth use

65

What is NGSDH

Next-generation SDH is the evolution and enhancement of existing SDH networks It improves network efficiency and broadband service potential SDH Next Generation enables transporting data efficiently, without needing to replace the installed equipment base

The only change needed to update the network is to replace the edge nodes

66

The network is then ready to transport Ethernet

What is NGSDH

SDH with Data handling capability Simply addition of 3 functions to accommodate Data traffic (to encapsulate Ethernet frame) Generic Framing Protocol (GFP) Virtual Concatenation (VCAT) Link Capacity Adjustment Scheme (LCAS)

67

Continue.

These functions are implemented on the new MSSP nodes which are located at the edges of the network They interact with the client data packets that are aggregated over the SDH/SONET backplane that continues unchanged This means that the MSSPs represent the SDH Next Generation embedded in the legacy SDH network

68

Next Generation SDH

The architectures are increasingly demanding long haul transport that today can only be provided by SDH/DWDM having a massive installed base, developed over recent decades

69

NG SDH Network
PDH PDH Ethernet VPN

*MSSP
Ethernet VPN

MSSP

NG SDH

GFP VCAT LCAS

Mapping in Frames Virtual containers Transport Bandwidth management Paths, Section

GFP VCAT
Paths, Section

LCAS

SDH

SDH

SDH

SDH

Client

SDH NG

Existing SDH

SDH NG

Client

70

NG-SDH Features

NG SDH enables operators to provide more data transport services while increasing the efficiency of installed SDH base The technology is implemented in the edge nodes only, no need to install an overlap network or migrating all the nodes This reduces the cost per bit delivered, and will attract new customers while keeping legacy services

71

NG SDH Nodes

Multiservice Provisioning Platform (MSPP)


Includes SDH multiplexing, sometimes with add-drop, plus Ethernet ports, sometimes packet multiplexing and switching, sometimes WDM

Multiservice Switching Platform (MSSP)


MSPP with a large capacity for TDM switching

Optical Edge Device (OED)


An MSSP with no WDM functions

72

NG SDH Nodes

Multiservice Transport Node (MSTN)


An MSPP with feature-rich packet switching

Multiservice Access Node (MSAN)


An MSPP designed for customer access, largely via copper pairs carrying Digital-Subscriber Line (DSL) services

73

GENERIC FRAMING PROTOCOL

Defined in ITU-T G.7041

Its a mechanism for mapping constant and


variable bit rate data over a transport network like synchronous SDH frames

GFP support many types of protocols

74

GENERIC FRAMING PROTOCOL

In any case GFP adds a very low overhead to increase the efficiency of the optical layer

The client signals can be protocol data unit (PDU) oriented (like IP/PPP or Ethernet Media Access Control) or can be block-code oriented

75

GFP Frame

76

GFP-F Modes

Currently, two modes of client signal adaptation are defined for GFP: Frame-Mapped GFP (GFP-F)
Its a layer 2 encapsulation PDU-oriented adaptation mode GFP-F entirely maps one complete client frame into a single GFP frame Idle packets are not transmitted resulting in more efficient transport GFP-F is used where the client signal is framed or packetized by the client protocol e.g., Ethernet, PPP/IP and HDLC-like protocols To perform the encapsulation process it is necessary to receive the complete client packet, but this procedure increases the latency Specific mechanisms are required to transport each type of protocol

77

GFP-T

Transparent GFP (GFP-T)


Its a layer 1 encapsulation or block-code oriented adaptation mode Transparent GFP (GFP-T) is a protocol-independent encapsulation method in which all client code words are decoded and mapped into GFP frames The frames are transmitted immediately without waiting for the entire client data packet to be received It is used to adapt block-oriented client data (Gigabit Ethernet, Fiber Channel and Digital Video Broadcast (DVB)) GFP-T can adapt multiple protocols as long as they are based on 8B/10B line coding This line codes are transcoded to 64B/65B and then encapsulated into fixed size GFP-T frames

78

GFP-F and GFP-T Comparison


Byte Protocol Transparency GFP-F Low GFP-T High

Efficiency Delay-sensitive protocols Encapsulation Protocol Level Optimized for Statistical multiplexing of several client signals SAN transport Ethernet transport

High No Layer 2 Ethernet Yes


No

Low Yes Layer 1 SAN, DVB No


Yes

Optimum

Possible

79

Concatenation

Concatenation is the process of summing the bandwidth of X containers into a larger container It is well indicated for the transport of big payloads requiring a container greater than VC-4 But it is also possible to concatenate low-capacity containers, such as VC-11 or VC-12

There are two concatenation methods


Contiguous concatenation Virtual concatenation

80

Contiguous Concatenation

It creates big containers that cannot split into smaller pieces during transmission For this, each NE must have a concatenation functionality

81

Contiguous Concatenation

82

Virtual concatenation

It transports the individual VCs and aggregates them at the end point of the transmission path For this, concatenation functionality is only needed at the path termination equipment

83

Virtual Concatenation

84

Virtual Concatenation
No Concatenation
1050 Mbps

Gig Ethernet (1.0/1.2 Gbps)

Data

2.5 Gbps OC48/STM-16 low efficiency 622 Mbps OC 23/STM-4 low efficiency 155 Mbps STM-1 high efficiency

196 Mbps

ESCON SAN (160/200 Mbps)


150 Mbps

OC-3/STM-1 (155 Mbps)

TDM

VCAT
Gig Ethernet Data (1.0/1.2 Gbps) ESCON (160/200 Mbps) SAN OC-3/STM-1 (155 Mbps)
STS-3c-7v/VC-4-7v (1050 Mbps) STS-1-4v/VC-3-4v (196 Mbps) STS-3/STM-1 (150 Mbps)

2.5 Gbps OC48/STM-16 packed at nearly 88% efficiency

TDM

85

VCAT Efficiency

86

Contiguous and Virtual Concatenation Comparison

Contiguous concatenation is less bandwidthefficient than virtual concatenation Virtual concatenation (VCAT) is a solution that allows granular increments of bandwidth in single VC-n units

87

Contiguous and Virtual Concatenation Comparison


Service Bit Rate Contiguous Concatenation
VC-3 (20%)

Virtual Concatenation
VC-11-7v (89%)

Ethernet

10 Mbps

Fast Ethernet

100 Mbps

VC-4 (67%)

VC-3-2v (99%)

Gigabit Ethernet

1000 Mbps

VC-4-16c(42%)

VC-4-7v (95%)

Fiber Channel

1700 Mbps

VC-4-16c(42%)

VC-4-12v (90%)

88

Link Capacity Adjustment Scheme

It is standardized by the ITU-T as G.7042 LCAS is a signaling protocol for sizing virtually concatenated paths With LCAS, VCG can be resized at any time without disturbing network traffic LCAS can add and remove members of a VCG to match the variable bit rate patterns and the burst nature of most data networks

89

Link Capacity Adjustment Scheme

LCAS signaling messages are exchanged to change the number of VC between the source and the destination of the path The number of VC can be increased or decreased without any frames lost therefore increasing or decreasing the capacity of the VCG link

90

Transmission Of Frames

91

Protection Through LCAS

92

NGSDH Limitations

Engineered for voice not for data Static bandwidth allocation Inefficient bandwidth utilization Complicated service provisioning. Creating an end-to-end circuit takes many steps Ethernet rates do not match SDH rates High cost of bandwidth change

93

Practical Considerations

Inclusion of one Card (ETF Board in Huawei Optix 2500+) in traditional SDH Sub-rack Up-gradation of Software at NMS (if Ethernet Functinality not included in T2000) Pure NGSDH Systems (like Huawei OSN series) some differences include: No need to delete Traffic for deleting Protection Optical Interfaces are plug-able, no need to replace full card Support ASON

94

Hardware (OSN 3500)

95

OSN3500
Huawei OSN

NGSDH series

stands for Optical Switch Node (support ASON)

Intelligent

96

OSN 3500 Intelligent Features


Service level agreement (SLA) Topology automatic discovery function Automatic end-to-end service configuration Support mesh networking and protection Traffic engineering Supports RPR

97

Sub rack with Boards (OSN3500)

98

Cabinet Indicators

99

Subrack

100

Slot Access Capacity

101

Continue

102

Continue

103

System Architecture

104

Board Appearance and Dimensions

105

Functions of SL64

106

Optical Port Parameters

107

SDH Boards

108

Continue

109

Slots for SL64 & SF64

110

Functional Block Diagram SL64

111

Indicators

112

Indicators
Board Hardware_ STAT Indicator

Service Activation_ ACT Indicator

113

PDH Boards with Slot Allocation

114

Continue

115

PDH Board Function

116

Alarms

117

Ethernet Boards

118

Ethernet Boards Slots

119

Functions

120

Features of EFS4

Supports bandwidth auto-sensing Supports MPLS Supports LCAS Supports Port based flow control Supports receiving and transmitting Ethernet testing frame Supports inloop at Ethernet port and inloop and outloop at VC3 level Supports port level Ethernet performance monitoring Supports EPL/EPLAN/EVPL/EVPLAN services and QoS

121

Indicators

122

Continue

123

Ethernet Board Indicators

124

Ethernet Unit Alarms

125

Cross Connect & SCC Boards

126

Capacity of Cross Connect Boards

127

Cross Connect Unit Functions

128

Alarms

129

GSCC

130

Support NE ID setting by software Supports 1+1 hot backup Supports 40 DCC Processes Order-wire bytes Controls cabinet indicators and intelligent fans Collects and monitors alarms and performance events Monitors power supply Supports ASON intelligent function Inserted in slot 18 (Active) and/or Slot 17 (Standby

SCC Unit Functions

131

SCC Databases

132

Alarms

133

AMP & Dispersion Compensation Boards

134

DCU

135

Summary

136

Continue

137

Continue

138

Equipment Protection

139

TPS Protection

140

Working Protection Relationship

141

Ethernet Board Protection

142

Equipment Protection Slots

143

Equipment Protection Summary

144

ETHERNET SERVICES OVER NGSDH

145

Ethernet

IEEE 802.3 Ethernet is the most widespread layer 2 frame based computer networking technology for LANs Ethernet transport services can run over almost any infrastructure like SDH,WDM, wireless and even copper facilities

146

Ethernet And Transport Rate Convergence

147

Basic Concepts
Port

External physical port of Ethernet unit, the common rates of external port are 10M, FE, GE and 10GE; VC Trunk Virtual Container Trunk, VC Trunk is built by VC. It is the internal port of Ethernet unit.

148

Continue

149

Tag Attributes

Tag flag is used to identify the type of frames. Three types of Tag attributes are available: Tag aware Access Hybrid

150

Continue

Tag Aware: When the port is set to be Tag aware, the port transmits the packets with the Tag flag transparently and discards those without the Tag flag; Access: When the port is set to be Access, the port attaches a Tag flag to the packets without Tag flag according to its VLAN ID and discards those with the Tag flag; Hybrid: When the port is set to be Hybrid, the port can process packets regardless of the Tag flag and attach a Tag flag to the packets without the Tag flag according to its VLAN ID.
151

Continue

152

Ethernet Services

E-Line EPL EVPL ELAN

153

E-Line

Ethernet service that is based on a Point-to-Point Ethernet Connection An E-Line Service type can be used to create a broad range of point-to-point services E-Line Service type may be between two different speed Customers Service Multiplexing (sharing) MAY occur at Ports and/or VC Trunks

154

Continue

E-Line Service used to create Ethernet Private Lines Virtual Private Lines

Carrier Ethernet Network

155

EPL

Bandwidth exclusive Services isolated No sharing Replaces a TDM Private line Dedicated VCTrunks and Ports for Point-to-Point connections The most popular Ethernet service due to its simplicity

156

Continue

157

EVPL
Ethernet Virtual Private Line (EVPL)

Supports sharing of multiple VC Trunks and/or

Ports

Allows

single

physical

connection/Port

to

accommodate different customer traffic

ISP Improve the bandwidth utilization ratio and save POP

the ports resource of Ethernet Unit

158

Port Shared EVPL

159

VC Trunk Shared EVPL

160

Challenge!
What

about if Different customers data with same VLANID?

161

MPLS Basics

162

MPLS

Multi-protocol Label Switching, standard routing and switching platform; Tunnel/VC: Two labels in MPLS, range of value is 16(220-1) LSP: Label switching path, different value labels will be given in different nodes, data can be sent forward according these labels P/PE: P (Provider) internal node of MPLS network, PE (Provider Edge) the edge of MPLS network
163

EVPL (MPLS)

164

Q in Q

QinQ technology is a VLAN stacking technology C-VLAN S-VLAN Advantages of QinQ technology: Expands VLAN and alleviates VLAN resource insufficiency; Extends LAN service to WAN, connecting the client network to the carrier network and supporting transparent transmission

165

EVPL (Qin Q)

166

Ethernet Service Types : E-LAN


E-LAN Service used to create

Multipoint to Multipoint Transparent LAN Service Foundation for IPTV and Multicast networks etc.
Carrier Ethernet Network

167

Ethernet LAN (E-LAN) Service Type

Multipoint-to-Multipoint Ethernet Virtual Connection Service Multiplexing sharing MAY occur at none, one or more of the VC Trunks/Ports

168

Services Using E-LAN Service Type

Ethernet Private LAN (EP-LAN) Ethernet Virtual Private LAN (EVP-LAN) Supports dedicated or Shared services Supports transparent LAN services multipoint Layer 2 VPNs

and

169

EPLAN

170

VB/LP

171

EVPLAN
Bandwidth

Services

sharing by different users are differentiated by different

schemes IEEE 802.1q Bridge IEEE 802.1ad Bridge

172

IEEE 802.1q Bridge


Performs Layer 2 Switching According to Destination MAC address and VLANIDs

173

IEEE 802.1ad Bridge


Performs Layer 2 Switching According to Destination MAC address and S-VLANIDs

174

NG-SDH Summary

ADVANTAGES:
Interfaces for multiple packet technologies (PPP, Ethernet, SAN)

More Effectively bandwidth utilization through VC & LCAS


Requires changes only at edge nodes

DISADVANTAGES:
Optimized for Voice, not for Data
Complicated service provisioning. (Creating an end-to-end circuit takes many steps) Ether rates do not match SDH Bandwidth inefficiency

175

175

ETHERNET CONFIGURATION

176

EPL Service Configuration

177

Service Configuration Diagram

178

Implementation

179

Time Slot Allocation

180

EPL Configuration Steps


Creating Board Configuring Ethernet Board Interfaces External (Port): Access or Tag Aware Internal (VC Trunk): Tag aware Binding Path Configuration Creating EPL Service
Configuring Cross connects From Ethernet board to Line Board

181

EPL Port Shared Service Configuration Diagram

182

Implementation

183

Time Slot Allocation

184

Port-Shared EPL Service Steps


Creating

a board Configuring Ethernet interfaces Configuring bound paths Creating the PORT shared EPL service Configuring the cross-connect from Ethernet boards to SDH line boards

185

Configuration of VCTRUNK Shared EPL Service

186

Implementation

187

Configuring the EPLn Service

188

Implementation

189

SDH T.S. Allocation

190

Configuration Steps
Creating

a board Configuring Ethernet interfaces Configuring bound paths Creating the EPLn service Configuring the VLAN forwarding filter table Configuring the cross-connect from Ethernet boards to SDH line boards

191

ASON

192

Challenges with Legacy ON

Expensive/Difficult to manage Many layers for Optical Network Lot of efforts to expand network Static end to end service configuration and protection Poor real-time management function

193

Complex Reconfiguration W/O ASON

194

Why ASON

195

ASON?

Automatic Switched Optical Network

High reliability new generation optical transmission network with automatic topology & resource discovery, end to end service management and end to end service management and multiple SLA provision functions

196

ASON Features

automatic topology discovery point-and-click connection provisioning automatic user-initiated setup end-to-end Performance Management across an SDH circuit network-wide end-to-end path protection and restoration

197

Continue..

High service availability beyond five 9s with enhanced protection schemes Improved resiliency coexistence of dynamic restoration in mesh networks with superior SDH protection mechanisms Lower OPEX plug-and-play auto-discovery topology allows dynamic allocation of network resources to routes, as needed Lower CAPEX leverages the existing XDM installed base with add-on ASON capabilities

198

ASON Logical Structure

199

Control Plane
Consists

of a group of communication entities for the calling control and

Responsible

connection control, including automatic setting up, releasing, monitoring, and maintaining

connections
Automatically

restores the failed connections

through signaling exchange

200

Transport Plane
The

traditional

SDH/WDM

network

is

the

transport plane
It

transmits optical signals, configures cross-

connection and protection switching for optical


signals, and guarantees the reliability of all

optical signals.

201

Management Plane
Complement It

to the control plane

maintains the transport plane, the control plane

and the whole system


Its

functions include performance management,

fault management, configuration management

and security management

202

ASON Software

203

Continue

204

Link Management Module


It

uses the LMP protocol to perform the following functions. Creates and maintains the control channels Checks TE links

205

Signaling Module
It

uses the RSVP-TE protocol to create or

remove services according to the requests from users


Synchronizes

and restores services as needed

206

Routing Module
It

uses the OSPF-TE protocol to perform the

following functions:

Collects and floods TE link information

Collects and floods control link information


Calculates service route and control route

207

Cross-Connection Management zmodule


It

performs the following functions:

Creates/Deletes cross-connections
Reports link state and alarms

208

ASON Service Types

SC: Switched Connection is a service connection requested by a


terminal user and then created in the ASON control plane through signaling

PC: Permanent Connection is a service connection calculated


beforehand and then created through the NM by issuing a command to NE

SPC: Soft Permanent Connection, the connection between the user


and the transmission network is configured directly by the NM. The connection within the transmission network is requested by the NM and then created by the NEs control plane through signaling

209

Function Structure of ASON

210

ASON NE
One

of the topology components in the ASON with traditional NEs, ASON NEs can

Compared

support the link management, signaling, and

routing functions
NE

ID has the same meaning regarding an ASON NE and a traditional NE

211

TE link
It

is a traffic engineering link ASON NE sends its bandwidth information

The

to other ASON NEs through the TE link to

provide data for route comutation

212

Distributed Vs Centralized ASON

213

ASON Standard Bodies


Focus on requirements and architecture

Inter-operability Demonstration

214

GMPLS- ASON

215

ASON Protocols

GMPLS (Routing, Signaling, Link Management)

OSPF-TE (routing)
Flood and gather topology for calculating service path

RSVP-TE (Signaling)
Establish and maintain the service path

LMP (Link Management)


Discover the neighbors and links

216

LMP

217

OSPF-TE
Floods

and collects the information about the

control links on the control plane


Floods

and collects the information about the TE

links on the transport plane.


The

protocol then generates the information

about the network service topologies for service

trail computation

218

RSVP-TE
Protocol

for resource reservation It is a type of signaling. RSVP-TE supports creation, deletion change of LSPs. Supports the following functions: LSP creation LSP deletion LSP attribute modification LSP rerouting LSP trail optimization
219

and

Automatic Resource Discovery


Each NE can search for the Neighboring NEs and can build Topology map of whole network

220

Automatic Discovery of Control Links

221

End-End Service Configuration

222

Continue

223

Service Characteristics

Diamond Service Gold Service Silver Service Copper Service Iron Service

224

Diamond Service

225

Gold Service

226

Silver Service

Real Time Restoration. 100ms to 2s recovery time

227

Copper Service

228

Iron Service

229

SLA

230

Tunnels
Tunnels

are mainly used to carry VC-12 or VC-3 services. Tunnels are also called as ASON server trails When lower order services are to be created, first create a VC-4 tunnel The protection level for the tunnel can be gold, silver or copper. Then, use the management system to complete the configuration of the lower order service

231

Service Tunnel

232

Routing Policy
Diamond

and silver services all support the three rerouting polices: Overlapping policy: During rerouting, the route of the new LSP overlaps the original route whenever possible. Separating policy: During rerouting, the route of the new LSP is separated from the original route whenever possible. Best route policy: During rerouting, the best route is computed for the new LSP.

233

Re-routing Strategies

234

Continue

235

Revertive ASON Trail

236

Service Association
The

service association can be used to associate the same service accessed from different points into the ASON network Service association involves associating two ASON services that have different routes During the rerouting or optimization of either service, the rerouting service avoids the route of the associated service. Service association is mainly used for services accessed from two points.

237

Services Supported
Supports

the association of two silver services. Supports association of two copper services. Supports the association of a silver service and a copper service. Supports the association of two silver tunnels. Supports the association of two copper tunnels. Supports the association of a silver tunnel and a copper tunnel.

238

Service Migration
Conversion

between

ASON

services,

and

between ASON services and traditional services.


The

service conversion is in-service conversion,

which would not interrupt the services

239

Service Optimization
Frequent

topology

changes

result

in

less

satisfactory routes
Service

optimization involves creating a new LSP the optimized service to the new LSP

Switching Deleting Optimize

the original LSP the service without disrupting the

service
240

SRLG
The

SRLG is the shared risk link group

Fibers in the same optical cable have the same


risks

ASON

service should not be rerouted to another

link that has the same risk.


Shorten

the service restoration time during ASON

service rerouting
241

Summary

ASON-GMPLS is a future technology which helps to minimize OPEX and realize fast service provisioning Efficient utilization of bandwidth It requires more resources/infrastructure to realize mesh network topology

242

Thank You

243

Potrebbero piacerti anche