Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
COURSE OBJECTIVES
To provide participants with clear understanding and practical knowledge of next generation SDH and ASON At the end of this course participants will be able to:
COURSE OUTLINE
Introduction & Overview NGSDH Components and Protection NGSDH Features Hardware (OSN 3500)
Transport Network
A Transmission Network which has abilities of Manageability, Scalability, have QoS and Fast Protection is called Transport Network Earlier systems up to PDH were considered as Transmission system. SDH introduces the new term Transport Network
Transmission Fundamentals
Some basic concepts in Transmission are:
Telecommunication Bands
Optical telecommunication in the near & short infrared is technically often separated Or
O-band 1,2601,360 nm ---------- Original E-band 1,3601,460 nm ---------- Extended S-band 1,4601,530 nm------------- Short wavelength C-band 1,5301,565 nm----------- Conventional L-band 1,5651,625 nm------------ Long Wavelength U-band 1,6251,675 nm-----------Ultra long wave length
Optical Windows
Limiting Factors
Attenuation Dispersion
10
10
Attenuation
Due to impurities in glass In fabrication Bad connectors Insertion losses pulse can be weaker
11
11
On
Of f
On
On
On
Off On
1 On
On On
Excessive Dispersion
Bit Error
1 Off
Off Off
17
G.653 fiber
1310
1550
13
13
14
SDH
Synchronous Digital Hierarchy SDH is a hierarchical set of digital transport structures, standardized for the transport of suitably adapted payloads over physical transmission networks An integrated transmission network managed by a powerful network management system
15
SDH
A standard developed by the International Telecommunication Union (ITU) It is documented in standard G.707 and its extension G.708 Developed to replace the Plesiochronous Digital Hierarchy (PDH) system Allow interoperability between equipment from different vendors with Strong Network Management capabilities
16
STM-256: 40 Gbps
17
MUX
Regenerator Section
MS MS
Multiplex Section Multiplex Section
MS
Multiplex Section
Sub network
Path Section
18
Term Mux
POH MSOH RSOH Path OH end to end circuit Multiplex Section OH multiplexer to multiplexer Regenerator Section OH repeater to adjacent node or vice versa
19
RSOH, MSOH and POH provide monitoring and management function for different layers/levels of STM-N frame For STM-64 frame: RSOH monitors the overall transmission performance of STM-64 signal MSOH monitors the performance of individual STM-1s POH monitors each low-rate signal (e.g., 2 Mbps)
20
xN
STM-N AUG-4
x1
AU-4
2Mb/s
TU PTR
21
Communication Channel
Data Communication Channel Bytes: D1~D12
These 12 bytes are provided for the transport of monitoring & control data in Network Management System. D1-D3 belongs to RSOH, bandwidth is 3x64 kb/s D4-D12 belongs to MSOH, bandwidth is 9x64 kb/s D1-D12 are transmitted in STM-1#1 of STM-N only.
DCC Channel
NMS
22
APS
Automatic Protection Switching (APS) bytes: K1, K2 (bits:b1-b5) Used for network multiplex protection switch function K1 & K2 only transmitted in STM-1 #1 of STM-N Multiplex Section Remote Defect Indication (MS-RDI): K2 (b6-b8) Return alarm message from Rx to Tx Indicate Rx receiving alarm K2 (b6-b8) value is 110
23
K1 & K2 Bytes
Detect K2 (b6~b8)
Return MSRDI
24
Clock Quality
SSM indicates the status & quality level of SDH signal Value indicates quality level of available clock source (b5-b8) 0010 = G.811 = External Clock (Cesium) 0100 = G.812 = Transit Exchange Clock Signal (Rubidium) 1000 = G.812 = Local Exchange Clock Signal (Rubidium or Crystal) 1011 = G.813 = Internal Clock (SETS) (Crystal) 1111= Not Suitable for synchronization Only transmitted in STM-1 #1 of STM-N
25
E1 Mapping In VC4
TS#
X+ 3 (Y-1)+ 21 (Z-1)
X= TUG-3 Location (1-3) Y= TUG-2 Location (1-7) Z= TU-12 Location (1-3) If E1 location is TU 2 4 3, find TS#
26
27
PRC 1 SEC
20
1 SSU 21
10
SSU
60
28
Normal
b d b c
Holdover
29
Network Protection
30
31
CS
OL
OL
TR
OL
protect route
OL
work or protect
At sending end, the STM-N signal is sent simultaneously over both segments of the work and protect. At receiving side, only one (work or protect) path is selected based on quality. Send Together Receive One
32
Work
OL
OL
OL
OL
Protection Protection The 1:1 structure is the subset of the 1:N (where N=1) structure. It has the capacity to work in the 1+1 structure and to interconnect with the 1+1 structure of the other end.
33
Continue
In Multiplexing segment 1:1 protection The working payload is transmitted through the working path while the protection path can be used to carry extra payload which is of inferior class. When the working path fails, the extra payload on the protection path will be superseded by the working payload according to APS protocol. Thus the working payload is protected.
34
2-fiber Unidirectional Path Protection Ring 2-fiber Bidirectional Protection Ring 4-fiber Bidirectional Protection Ring Multiplex Section
Multiplex
Section
36
switching
CA AC CA AC It adopts 1+1 protection mode, the switching criteria is PATH-AIS, & APS protocol is not needed. At the source NE, the payload is send to the working path and protection path simultaneously. The destination NE detect and compare the coming signal from both paths, then determine to receive the payload of better quality.
37
2 fiber: Two fibers between a pair of nodes Bi-direction: Service between two NEs use the same section of the network and are transmitted by reverse direction Multiplexing Section: Protection based on MS, protect the payload part, use APS protocol for protection.
38
Working Principle
S1/P2 A D C S2/P1 B
Working path
S1 & S2; under normal situations, service are transmitted over working path. The first half of one fiber is working path. Taking STM-16 as an example, 1-8 AU4 are used for working path.
39
Working Principle
Protecting Path
S1/P2 A D C S2/P1 B
P1 & P2; services transmit along protection path after switch over. The last half part of the fiber is used as protecting path. Taking STM-16 as example, 9-16 AU4 are used as protecting path.
40
Working Principle
S1/P2 A D C S2/P1 B
41
Working Principle
CA Rx
AC Tx
S1/P2
A D C
S2/P1 B
CA Tx
AC Rx
42
Switching Conditions
Auto Switch Conditions: LOS, LOF, MS-AIS, Signal Degrade
43
Switching Procedure
SwitchIf the fiber between B and C is broken, switching occurs in B and C B node: service AC crosses from S1 to P1, and sent through A->B->A->D->C C node: service CA crosses from S2 to P2, and sent through C->D->A->B->A
AC Rx
CA Rx
AC Tx S1/P2 A S2/P1 B C
CA Tx
44
Normal state in MS-SPRING. AU4 # 1-8 used for working channels AU4# 9-16 used for protection & can be used for low priority traffic.
45
Time slots can be reused High network capacity *M*STM-N Switching time 25ms
Advantages: Time slots between two nodes can be reused, thus increasing the transmission capacity. Standby path P1 and P2 can be used to transmit extra services of inferior class.
Disadvantages: longer switching time due to APS protocol. Numbers of maximum nodes supported by APS is limited to 16.
Transmission capacity: (k/2) x STM-N nodes). (k=no. of
46
47
48
50
51
SNCP
52
SNCP Vs MSSPRING
53
54
SONET can be thought of as the North American version of SDH The main differences are in the basic SDH and SONET frame formats, but SDH and SONET are essentially identical beyond the STS-3 signal level The base signal for SONET is STS-1 and the base signal for SDH is STM-1. STS-3c is equivalent to STM-1 and the lower tributaries can be mapped interchangeably between the two formats from that point on.
55
Continue
In SDH, both electrical and optical signals are referred to as STM signals. In SONET, however, electrical signals are called STS and optical signals are referred to as OC.
56
SDH / SONET
ADVANTAGES:
Strong Management capabilities
Provide guaranteed bandwidth Provide fast recovery time from faults smaller than 50ms
DISADVANTAGES:
No support for Data services Fixed circuits ( circuit-based)
Bandwidth inefficiency
Only one node can transmit at a time
57
57
NGSDH Features
58
SDH Problems
The traffic type is changing Challenge How to use bandwidth efficiently for both voice and data traffic Lack of fine granularity to accommodate all potential clients stream rates
59
WHY NGSDH
Data traffic is growing exponentially Accommodating this traffic is must Data traffic handling is limitation of SDH Need for new system which can support data
60
WHY NGSDH
The data packet transport (Ethernet, PPP) is a challenge for SDH This is because they are connectionless, use statistical multiplexing, and can be best-effort technologies This is the opposite of SDH which is predictable and based on time division multiplexing (TDM)
61
Continue.
First option will save investment already made in SDH No need for major modification
62
63
SDH
SDH
SDH
Ring-2
64
NG SDH Drivers
The drive to SDH Next Generation development was: The desire to find one simple encapsulation method that was capable of accommodating any data packet protocols Secondly, the need to use bandwidth accurately Solution A new adaptation protocol layer is required and a new mapping mechanism for controlling bandwidth use
65
What is NGSDH
Next-generation SDH is the evolution and enhancement of existing SDH networks It improves network efficiency and broadband service potential SDH Next Generation enables transporting data efficiently, without needing to replace the installed equipment base
The only change needed to update the network is to replace the edge nodes
66
What is NGSDH
SDH with Data handling capability Simply addition of 3 functions to accommodate Data traffic (to encapsulate Ethernet frame) Generic Framing Protocol (GFP) Virtual Concatenation (VCAT) Link Capacity Adjustment Scheme (LCAS)
67
Continue.
These functions are implemented on the new MSSP nodes which are located at the edges of the network They interact with the client data packets that are aggregated over the SDH/SONET backplane that continues unchanged This means that the MSSPs represent the SDH Next Generation embedded in the legacy SDH network
68
The architectures are increasingly demanding long haul transport that today can only be provided by SDH/DWDM having a massive installed base, developed over recent decades
69
NG SDH Network
PDH PDH Ethernet VPN
*MSSP
Ethernet VPN
MSSP
NG SDH
GFP VCAT
Paths, Section
LCAS
SDH
SDH
SDH
SDH
Client
SDH NG
Existing SDH
SDH NG
Client
70
NG-SDH Features
NG SDH enables operators to provide more data transport services while increasing the efficiency of installed SDH base The technology is implemented in the edge nodes only, no need to install an overlap network or migrating all the nodes This reduces the cost per bit delivered, and will attract new customers while keeping legacy services
71
NG SDH Nodes
72
NG SDH Nodes
73
74
In any case GFP adds a very low overhead to increase the efficiency of the optical layer
The client signals can be protocol data unit (PDU) oriented (like IP/PPP or Ethernet Media Access Control) or can be block-code oriented
75
GFP Frame
76
GFP-F Modes
Currently, two modes of client signal adaptation are defined for GFP: Frame-Mapped GFP (GFP-F)
Its a layer 2 encapsulation PDU-oriented adaptation mode GFP-F entirely maps one complete client frame into a single GFP frame Idle packets are not transmitted resulting in more efficient transport GFP-F is used where the client signal is framed or packetized by the client protocol e.g., Ethernet, PPP/IP and HDLC-like protocols To perform the encapsulation process it is necessary to receive the complete client packet, but this procedure increases the latency Specific mechanisms are required to transport each type of protocol
77
GFP-T
78
Efficiency Delay-sensitive protocols Encapsulation Protocol Level Optimized for Statistical multiplexing of several client signals SAN transport Ethernet transport
Optimum
Possible
79
Concatenation
Concatenation is the process of summing the bandwidth of X containers into a larger container It is well indicated for the transport of big payloads requiring a container greater than VC-4 But it is also possible to concatenate low-capacity containers, such as VC-11 or VC-12
80
Contiguous Concatenation
It creates big containers that cannot split into smaller pieces during transmission For this, each NE must have a concatenation functionality
81
Contiguous Concatenation
82
Virtual concatenation
It transports the individual VCs and aggregates them at the end point of the transmission path For this, concatenation functionality is only needed at the path termination equipment
83
Virtual Concatenation
84
Virtual Concatenation
No Concatenation
1050 Mbps
Data
2.5 Gbps OC48/STM-16 low efficiency 622 Mbps OC 23/STM-4 low efficiency 155 Mbps STM-1 high efficiency
196 Mbps
TDM
VCAT
Gig Ethernet Data (1.0/1.2 Gbps) ESCON (160/200 Mbps) SAN OC-3/STM-1 (155 Mbps)
STS-3c-7v/VC-4-7v (1050 Mbps) STS-1-4v/VC-3-4v (196 Mbps) STS-3/STM-1 (150 Mbps)
TDM
85
VCAT Efficiency
86
Contiguous concatenation is less bandwidthefficient than virtual concatenation Virtual concatenation (VCAT) is a solution that allows granular increments of bandwidth in single VC-n units
87
Virtual Concatenation
VC-11-7v (89%)
Ethernet
10 Mbps
Fast Ethernet
100 Mbps
VC-4 (67%)
VC-3-2v (99%)
Gigabit Ethernet
1000 Mbps
VC-4-16c(42%)
VC-4-7v (95%)
Fiber Channel
1700 Mbps
VC-4-16c(42%)
VC-4-12v (90%)
88
It is standardized by the ITU-T as G.7042 LCAS is a signaling protocol for sizing virtually concatenated paths With LCAS, VCG can be resized at any time without disturbing network traffic LCAS can add and remove members of a VCG to match the variable bit rate patterns and the burst nature of most data networks
89
LCAS signaling messages are exchanged to change the number of VC between the source and the destination of the path The number of VC can be increased or decreased without any frames lost therefore increasing or decreasing the capacity of the VCG link
90
Transmission Of Frames
91
92
NGSDH Limitations
Engineered for voice not for data Static bandwidth allocation Inefficient bandwidth utilization Complicated service provisioning. Creating an end-to-end circuit takes many steps Ethernet rates do not match SDH rates High cost of bandwidth change
93
Practical Considerations
Inclusion of one Card (ETF Board in Huawei Optix 2500+) in traditional SDH Sub-rack Up-gradation of Software at NMS (if Ethernet Functinality not included in T2000) Pure NGSDH Systems (like Huawei OSN series) some differences include: No need to delete Traffic for deleting Protection Optical Interfaces are plug-able, no need to replace full card Support ASON
94
95
OSN3500
Huawei OSN
NGSDH series
Intelligent
96
Service level agreement (SLA) Topology automatic discovery function Automatic end-to-end service configuration Support mesh networking and protection Traffic engineering Supports RPR
97
98
Cabinet Indicators
99
Subrack
100
101
Continue
102
Continue
103
System Architecture
104
105
Functions of SL64
106
107
SDH Boards
108
Continue
109
110
111
Indicators
112
Indicators
Board Hardware_ STAT Indicator
113
114
Continue
115
116
Alarms
117
Ethernet Boards
118
119
Functions
120
Features of EFS4
Supports bandwidth auto-sensing Supports MPLS Supports LCAS Supports Port based flow control Supports receiving and transmitting Ethernet testing frame Supports inloop at Ethernet port and inloop and outloop at VC3 level Supports port level Ethernet performance monitoring Supports EPL/EPLAN/EVPL/EVPLAN services and QoS
121
Indicators
122
Continue
123
124
125
126
127
128
Alarms
129
GSCC
130
Support NE ID setting by software Supports 1+1 hot backup Supports 40 DCC Processes Order-wire bytes Controls cabinet indicators and intelligent fans Collects and monitors alarms and performance events Monitors power supply Supports ASON intelligent function Inserted in slot 18 (Active) and/or Slot 17 (Standby
131
SCC Databases
132
Alarms
133
134
DCU
135
Summary
136
Continue
137
Continue
138
Equipment Protection
139
TPS Protection
140
141
142
143
144
145
Ethernet
IEEE 802.3 Ethernet is the most widespread layer 2 frame based computer networking technology for LANs Ethernet transport services can run over almost any infrastructure like SDH,WDM, wireless and even copper facilities
146
147
Basic Concepts
Port
External physical port of Ethernet unit, the common rates of external port are 10M, FE, GE and 10GE; VC Trunk Virtual Container Trunk, VC Trunk is built by VC. It is the internal port of Ethernet unit.
148
Continue
149
Tag Attributes
Tag flag is used to identify the type of frames. Three types of Tag attributes are available: Tag aware Access Hybrid
150
Continue
Tag Aware: When the port is set to be Tag aware, the port transmits the packets with the Tag flag transparently and discards those without the Tag flag; Access: When the port is set to be Access, the port attaches a Tag flag to the packets without Tag flag according to its VLAN ID and discards those with the Tag flag; Hybrid: When the port is set to be Hybrid, the port can process packets regardless of the Tag flag and attach a Tag flag to the packets without the Tag flag according to its VLAN ID.
151
Continue
152
Ethernet Services
153
E-Line
Ethernet service that is based on a Point-to-Point Ethernet Connection An E-Line Service type can be used to create a broad range of point-to-point services E-Line Service type may be between two different speed Customers Service Multiplexing (sharing) MAY occur at Ports and/or VC Trunks
154
Continue
E-Line Service used to create Ethernet Private Lines Virtual Private Lines
155
EPL
Bandwidth exclusive Services isolated No sharing Replaces a TDM Private line Dedicated VCTrunks and Ports for Point-to-Point connections The most popular Ethernet service due to its simplicity
156
Continue
157
EVPL
Ethernet Virtual Private Line (EVPL)
Ports
Allows
single
physical
connection/Port
to
158
159
160
Challenge!
What
161
MPLS Basics
162
MPLS
Multi-protocol Label Switching, standard routing and switching platform; Tunnel/VC: Two labels in MPLS, range of value is 16(220-1) LSP: Label switching path, different value labels will be given in different nodes, data can be sent forward according these labels P/PE: P (Provider) internal node of MPLS network, PE (Provider Edge) the edge of MPLS network
163
EVPL (MPLS)
164
Q in Q
QinQ technology is a VLAN stacking technology C-VLAN S-VLAN Advantages of QinQ technology: Expands VLAN and alleviates VLAN resource insufficiency; Extends LAN service to WAN, connecting the client network to the carrier network and supporting transparent transmission
165
EVPL (Qin Q)
166
Multipoint to Multipoint Transparent LAN Service Foundation for IPTV and Multicast networks etc.
Carrier Ethernet Network
167
Multipoint-to-Multipoint Ethernet Virtual Connection Service Multiplexing sharing MAY occur at none, one or more of the VC Trunks/Ports
168
Ethernet Private LAN (EP-LAN) Ethernet Virtual Private LAN (EVP-LAN) Supports dedicated or Shared services Supports transparent LAN services multipoint Layer 2 VPNs
and
169
EPLAN
170
VB/LP
171
EVPLAN
Bandwidth
Services
172
173
174
NG-SDH Summary
ADVANTAGES:
Interfaces for multiple packet technologies (PPP, Ethernet, SAN)
DISADVANTAGES:
Optimized for Voice, not for Data
Complicated service provisioning. (Creating an end-to-end circuit takes many steps) Ether rates do not match SDH Bandwidth inefficiency
175
175
ETHERNET CONFIGURATION
176
177
178
Implementation
179
180
Creating Board Configuring Ethernet Board Interfaces External (Port): Access or Tag Aware Internal (VC Trunk): Tag aware Binding Path Configuration Creating EPL Service
Configuring Cross connects From Ethernet board to Line Board
181
182
Implementation
183
184
a board Configuring Ethernet interfaces Configuring bound paths Creating the PORT shared EPL service Configuring the cross-connect from Ethernet boards to SDH line boards
185
186
Implementation
187
188
Implementation
189
190
Configuration Steps
Creating
a board Configuring Ethernet interfaces Configuring bound paths Creating the EPLn service Configuring the VLAN forwarding filter table Configuring the cross-connect from Ethernet boards to SDH line boards
191
ASON
192
Expensive/Difficult to manage Many layers for Optical Network Lot of efforts to expand network Static end to end service configuration and protection Poor real-time management function
193
194
Why ASON
195
ASON?
High reliability new generation optical transmission network with automatic topology & resource discovery, end to end service management and end to end service management and multiple SLA provision functions
196
ASON Features
automatic topology discovery point-and-click connection provisioning automatic user-initiated setup end-to-end Performance Management across an SDH circuit network-wide end-to-end path protection and restoration
197
Continue..
High service availability beyond five 9s with enhanced protection schemes Improved resiliency coexistence of dynamic restoration in mesh networks with superior SDH protection mechanisms Lower OPEX plug-and-play auto-discovery topology allows dynamic allocation of network resources to routes, as needed Lower CAPEX leverages the existing XDM installed base with add-on ASON capabilities
198
199
Control Plane
Consists
Responsible
connection control, including automatic setting up, releasing, monitoring, and maintaining
connections
Automatically
200
Transport Plane
The
traditional
SDH/WDM
network
is
the
transport plane
It
optical signals.
201
Management Plane
Complement It
202
ASON Software
203
Continue
204
uses the LMP protocol to perform the following functions. Creates and maintains the control channels Checks TE links
205
Signaling Module
It
206
Routing Module
It
following functions:
207
Creates/Deletes cross-connections
Reports link state and alarms
208
209
210
ASON NE
One
of the topology components in the ASON with traditional NEs, ASON NEs can
Compared
routing functions
NE
211
TE link
It
The
212
213
Inter-operability Demonstration
214
GMPLS- ASON
215
ASON Protocols
OSPF-TE (routing)
Flood and gather topology for calculating service path
RSVP-TE (Signaling)
Establish and maintain the service path
216
LMP
217
OSPF-TE
Floods
trail computation
218
RSVP-TE
Protocol
for resource reservation It is a type of signaling. RSVP-TE supports creation, deletion change of LSPs. Supports the following functions: LSP creation LSP deletion LSP attribute modification LSP rerouting LSP trail optimization
219
and
220
221
222
Continue
223
Service Characteristics
Diamond Service Gold Service Silver Service Copper Service Iron Service
224
Diamond Service
225
Gold Service
226
Silver Service
227
Copper Service
228
Iron Service
229
SLA
230
Tunnels
Tunnels
are mainly used to carry VC-12 or VC-3 services. Tunnels are also called as ASON server trails When lower order services are to be created, first create a VC-4 tunnel The protection level for the tunnel can be gold, silver or copper. Then, use the management system to complete the configuration of the lower order service
231
Service Tunnel
232
Routing Policy
Diamond
and silver services all support the three rerouting polices: Overlapping policy: During rerouting, the route of the new LSP overlaps the original route whenever possible. Separating policy: During rerouting, the route of the new LSP is separated from the original route whenever possible. Best route policy: During rerouting, the best route is computed for the new LSP.
233
Re-routing Strategies
234
Continue
235
236
Service Association
The
service association can be used to associate the same service accessed from different points into the ASON network Service association involves associating two ASON services that have different routes During the rerouting or optimization of either service, the rerouting service avoids the route of the associated service. Service association is mainly used for services accessed from two points.
237
Services Supported
Supports
the association of two silver services. Supports association of two copper services. Supports the association of a silver service and a copper service. Supports the association of two silver tunnels. Supports the association of two copper tunnels. Supports the association of a silver tunnel and a copper tunnel.
238
Service Migration
Conversion
between
ASON
services,
and
239
Service Optimization
Frequent
topology
changes
result
in
less
satisfactory routes
Service
optimization involves creating a new LSP the optimized service to the new LSP
service
240
SRLG
The
ASON
service rerouting
241
Summary
ASON-GMPLS is a future technology which helps to minimize OPEX and realize fast service provisioning Efficient utilization of bandwidth It requires more resources/infrastructure to realize mesh network topology
242
Thank You
243