1 / 34

PTN Protection Subject

PTN Protection Subject. V1.0. Contents. PTN Protection Type PTN Protection Principle and Application PTN Protection Summary. PTN Protection Classification. PTN Protection. Port-Level Protection. Network-Level Protection. Card-Level Protection. PW dual-homing protection.

espen
Télécharger la présentation

PTN Protection Subject

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. PTN Protection Subject V1.0

  2. Contents • PTN Protection Type • PTN Protection Principle and Application • PTN Protection Summary

  3. PTN Protection Classification PTN Protection Port-Level Protection Network-Level Protection Card-Level Protection PW dual-homing protection Linear protection Subnet protection Ring network protection LAG protection IMA protection TPS protection Card 1+1 protection Note: The network-level protection here can be nested to meet more complicated networking protection demands.

  4. Contents • PTN Protection Type • PTN Protection Principle and Application • PTN Protection Summary

  5. Card-Level Protection Card 1+1 protection TPS protection Port-Level Protection LAG protection IMA protection Network-Level Protection Linear protection Subnet protection Ring network protection PW dual-homing protection PTN Protection Principle and Application

  6. Card-Level Protection • Card protection application

  7. Card-Level Protection • Card protection description • Currently, the main control of 6200/6300/9000 is in a 1+1 protection mode. • The power of 6000 is in a 1+1 protection mode. • The AC power of 9000 is in a 2+1 protection mode. The DC power is in a 1+1 protection mode. • The TPS on 6300 is in a 1:2 protection mode which is achieved on Slot1 and Slot2. Two cards inserted in the slots are E1 interface cards. In the low-speed slot is the E1 processign card whose protection will be provided in 6300 version 2.0.

  8. PTN Protection Principle and Application • Card-Level Protection • Card 1+1 protection • TPS protection • Port-Level Protection • LAG protection • IMA protection • Network-Level Protection • Linear protection • Subnet protection • Ring network protection • PW dual-homing protection

  9. SR RNC GE/FE:LAG protection STM-1: MSP protection LAG protection core layer 10GE MSTP GE/FE:LAG protection STM-1: MSP protection Convergence layer 10GE LAG protection Access layer GE Protection path Work path Port-Level Protection - LAG Protection • LAG Protection Scenario The LAG port protection provides the port redundancy protection of the Ethernet service between the PE node of the PTN and the service node. This protection mode is commonly used for the user side port.

  10. Port-Level Protection - LAG Protection Mode1: Active/standby mode; when the active/standby LAG mode is adopted, traffic is transmitted only on one port, namely on the active port rather than the standby port. Wave division Mode2: Load sharing mode; in this case, traffic is uniformly allocated on two ports for transmission.The way of distinguishing the traffic can be based on the destination IP address or the destination MAC address, and the source MAC address. The load sharing mode can support 2 - 16 ports. Currently, the load sharing mode is commonly used for protection on the UNI port.

  11. Port-Level LAG Protection Switchover Principle • The LAG protection can be divided into two modes: Static and Dynamic. • In the static mode you need to manually assigns the physical ports to be aggregated. The dynamic mode is based on the IEEE802.3ad protocol, determining ports to be aggregated according to the protocol. • Generally, we use the static mode.

  12. When shall we configure the static or dynamic mode? Depends on the mode supported by the opposite end. If the opposite end is configured as the static mode, the ZTE equipment must also be configured as the static mode. If the opposite end is configured as the dynamic mode, the ZTE equipment must also be configured as the dynamic mode. Port-Level LAG Protection Switchover Principle

  13. What is IMA? Inverse Multiplexing for ATM Based on cells, the ATM cell stream is inversely multiplexed to multiple low-speed links for transmission; then on the remote end, the cell streams of multiple low-speed links are joined to restore the ATM cell stream same as the orignal one. Port-Level Protection - IMA Protection

  14. What characteristics of the IMA technology are? IMA can multiplex multiple low-speed links, achieving the transmission of the ATM cell stream on the high-speed broard, and improving the link efficiency and transmission reliability through the statistical multiplexing. Port-Level Protection - IMA Protection

  15. What is IMA protection? The IMA protection means: If a link in an IMA group is invalid, the cells will be shared by other normal links for transmission, thus to achieve the service protecion. Port-Level Protection - IMA Protection

  16. Port-Level Protection - IMA Protection • IMA Transmission Diagram • The IMA group ends at the end of each IMA virtual connection. In the sending direction, the cell stream received from the ATM layer, based on cells, is distributed to multiple physical links in the IMA group. However, at the receiving end, the cells received from different physical links, based on cells, are re-joined to a cell stream same as the original cell stream. IMA group IMA group E1 interface E1 interface E1 interface E1 interface ATM cell stream ATM cell stream E1 interface E1 interface Node A Node Z IMA virtual link

  17. PTN Protection Principle and Application • Card-Level Protection • Card 1+1 protection • TPS protection • Port-Level Protection • LAG protection • IMA protection • Network-Level Protection • Linear protection • Subnet protection • Ring network protection • PW dual-homing protection

  18. Switchover node BRAS Residential SR Business BSC/RNC BTS/NodeB aGW E-NB Work path Protection path Network-Level Protection: 1+1/1:1 Linear Protection Switchover node • Switchover principle: The PE node detects the TMP-layer OAM packet and sends the OAM detection frame every 3.3ms. If the remote CC packet fails to be received in 3.5 cycles at the local end, the tunnel protection switchover is triggered. • The switchover point and the bridge point are both PE node. • In 1:1 single-send-single-receive mode, the APS protocol is applied for bi-directional switchover, supporting any service types; commonly used in current network • In 1+1 dual-send-dual-receive mode, the selective receiving port is the default work port. Both the local port and the remote port support the uni-directional switchover and the P2P services.

  19. Network-Level Protection: 1+1/1:1 SNC Subnet Protection Switchover node BRAS Residential SR Business BSC/RNC BTS/NodeB aGW E-NB Switchover node Work path Protection path • Most of the characteristics are the same as those of the linear protection. • The difference is that the switchover point and the bridge point can be P node or PE node. • Commonly used in interconnection with other manufacturers' equipment and only protects ZTE equipment. • Also applied in a rign-chain networking mode; configures subnet protection at the connection point of the ring-chain network.

  20. Linear and Subnet Protection Switchover Principle • Prerequisite: Continuously sending CC packet detection should be ensured and the tunnel connectivity should be protected. If the 1+1 protection of the APS protocol is not enabled, the APS packets between switchover nodes are not transmitted, namely, the remote end does not trigger the switchover at the local end through the APS packet. The local end performs switchover only on the receiving port. The switchover is performed based on the received alarms and the related commands. When the 1:1 protection of the APS protocol is enabled, The APS packets are to be transmitted between the service switchover nodes, advising the opposite party of its own switchover status. Switchover is divided as Locally Triggered Switchover, and Remotely Triggered Switchover. The switchover basis and the priorities are the same as those in 1+1 protection mode. Switchover priority of linear protection: LP (Lock Protection) >SF-P (Signal Failure-Protection)>FS (Force Switchover)>SF (Signal Failure) >SD (Signal Deterioration) >MS (Manual Switchover) Note: The above situation describes that when the signalof the protection channel fails, and the protection lock command is not executed previously, the system may trigger the selective receiving channel to switch over to the work channel.

  21. Linear APS Packet Details Byte segment format of the linear APS information

  22. Linear APS Packet Details First byte b1 - b4 request/state 1111 LP 1110 SF-P 1101 FS 1100 SF 1010 SD 1000 MS 0110 WTR 0100 EXER 0010 RR 0001 DNR 0000 NR Others Reserved First byte: b5 - b8 Protection type b5 0 indicates no APS channel; 1 indicates the APS channel b6 0 indicates 1+1 protection; 1 indicates 1:1 protection b7 0 indicates uni-directional protection; 1 indicates bi-directional protection b8 0 indicates no return; 1 indicates return Second and third byte b1 - b8 indicate request signal and bridge signal respectively 0 indicates no signal 1-254 indicates normal service 255 indicates no protection signal Fourth byte b1 - b8 reserved

  23. OAM service flow (TMP) of LSP1:1 Work tunnel: TMP1 Protection tunnel: TMP2 Protection route: ---- OAM service flow (TMS) of ring network protection NE1 NE2 NE3 Switchover node Switchover node The node where failure is detected sends a request through APS to the adjacent node. When a node detects failure or receives an APS request from other nodes, the service sent to the failed Span is switched over to a reverse direction (away from the defect). The service reaches another switchover node along the longer path, and then re-switched over to the work direction. NE6 NE5 NE4 NE1 NE2 NE3 NE6 NE5 NE4 Network-Level Protection: Ring Network Protection

  24. Switchover principle analysis: The OAM packet of TMS is detected. The switchover node is the connection point where failures occur. To switch over the faulty point is to switch over the service tunnel to the ring protection tunnel. Ring Netwok protection needs to allocate an APS-ID to each node. Similar to the multiplexed segment protection in SDH, the sent APS packet contents include the faulty point, launching point, the detailed switchover request, and the switchover status at this point. OAM saves costs and bandwidth. The device load is less heavy. When LSP>=1000, OAM adopts the LSP1+1 protection mode. The total bandwidth of OAM is 1000*0.2=200M. If OAM adopts the ring network protection mode, the OAM bandwidth is 1*0.2=0.2M. Ring Network Protection Switchover Principle

  25. Ring Network Protection Switchover Principle Prerequisite for ring network protection Correponding methods for achievement A fault detection system should exist between every two nodes on the ring. Enable the CC detection function Each station on the ring is alloted with an APS ID, considering the fault originating node and the destination adjacent node when connecting the APS packets. The destination node responds to the request and performs the switchover. The node on the ring responds to the fault timely, advising the opposite end of the fault. TMPLS OAM performs protection on the neighbors on the ring network. When TMPLS OAM finds a failure between neighbors, it advises the APS module on this node to send the APS switchover packets simultaneously in two directions of the ring. When the node on the ring receives the APS switchover packets and finds that the destination node is not itself, it forwards the packets directly to its neighbor; When the node finds that the destination node is itself, and that the source node is its neighboring node, it knows that the link between itself and the source node is down. Therefore, the APS module advises the TMPLS OAM module to perform switchover. In some special case that the singal on some middle node fails, switchover is performed on both ends of the disconnected services according to SF.

  26. Ring Protection Packet Description Byte segment format of the ring APS information: Byte segment format of the ring APS information Request codes of ring protection Bridge Request Switchover priorities of ring network protection: LP>FS>SF>MS

  27. RNC Network-Level Protection: PW Dual-Homing Protection Dual-homing protection is a protection mechanism that combines the LSP 1:1/1+1 path protection and PW protection. Broken fiber2 Protection tunnel path Work tunnel path Protection PW 10 GE convergence ring Description for nesting protection mode: The work PW is borne on a tunnel protection group (to protect the internal network fault); The protection PW is borne on a tunnel. :Work tunnel of the work PW :Protection tunnel of the work PW GE access ring :Bearer tunnel of the protection PW Note: At this moment, if RNC adopts the active/standby mode, the ZTE equipment PW chooses the 1:1 configuration mode. If RNC adopts the load sharing mode, the ZTE equipment PW chooses the dual-receive-singel-send mode. Broken fiber1 Broken fiber1: belongs to an internal failure of the PTN network; TMP-LOC triggers the tunnel switchover. Broken fiber2: belongs to a failure between PTN and the service-side network layer; TMC-CSF triggers the PW switchover.

  28. Specific Descriptions for PW Dual-Homing Protection Switchover • Key knowledge points on PW dual-homing protection • Key knowledge point 1: • For the case that RNC adopts the LAG active/standby mode: • The active PW and the tunnel protection should exist at the same time to prevent the broken fiber inside the PTN network, however, at this moment, RNC does not perform switchover. The internal PTN network still can switch the service over to the active receiving node, ensuring that the service is not interrupted. • Key knowledge point 2: • For the case that RNC adopts the LAG load-sharing mode: • The node that selectively receives PW adopts the dual-receive-single-send mode. For a base station, the LAG load sharing of RNC is branched out based on the BS IP addresses. Therefore, the node also adopts the singel-receive mode for a BS service stream. In this case, do not adopt the tunnel protection. • Key knowledge point 3: • The PW dual-homing protection switchover does not depends on APS for switchover other than the LOC and CSF switchover on the local end. The difference between 1:1 and 1+1 only lies in single receiving or dual receiving. • Key knowledge point 4: • The dual-send-dual-receive mode is an earlier application which is no longer adopted. The dual-receive-single-send mode is temporarily not much used on site. • Key knowledge point 5: • If the active PW of the PW dual-home is to bind the tunnel protection group, this protection group must be configured as 1:1 LSP protection.

  29. Contents • PTN Protection Type • PTN Protection Principle and Application • PTN Protection Summary

  30. PTN Protection Summary • Protection Status Description • Key-Point Summary for Protection Configuration • Protection Switchover Status Query

  31. SF: SF in the PTN network is detected by the OAM packet. Therefore, when LOC or the mismerged, defective and mismatched MEP occurs on the local device, it is considered that the service signal received by the device fails. SD: The SD in the PTN network is achieved by the pre-activated LM that detects the service packet loss rate either on the TMS layer or on the TMP layer. The near-end packet loss rate and the remote-end packet loss rate are used to compute ES/SES/UAS. If the packet loss rate is greater than 0, compute ES. If the packet loss rate is greater than 30%, compute SES. Hold-off switchover: In some cases, the switchover is not expected to be performed once a fault occurs. Instead, we need to wait a while to confirm whether the fault is still there before performing switchover. This process is called the hold-off switchover. The waiting time is called the switchover hold-off time. This situation is commonly used for the PW protection to configure the hold-off time (step length: 100ms) when the tunnel protection and the PW protection co-exist. Lock protection: No matter whether the active/standby channel is normal, the data are sent or received on the active channel regularly. Force switch: When the stanby channel is normal, no matter whether the active channel is normal, switch over to the active channel to receive data. Protection Status Description

  32. Key-Point Summary for Protection Configuration Ring network protection configuration TMS configuration TMS OAM MEG configuration TMRP configuration (enable APS) Ring tunnel configuration (one work tunnel corresponds to one ring tunnel) Ring protection group configuration Configure PE node once (one direction on protection ring) Configure P node twice (two directions on protection ring) PW dual-homing protection OAM configuration of the active/standby TMC (select CSF Insert and Extract) Configure PW protection group on the protected node Linear/subnet protection TMP OAM configuration of work protection Configuration of tunnel linear protection group Note: Currently, these two procedures of the linear protection and the subnet protection are conbined. Here the difference of the linear and subnet configuration lies in the configuration in OAM and the protection group. The MEG mode of the tunnel in the linear configuration is END. The MEG mode of the tunnel in the subnet protection group is TCM. LAG port protection Configure smartgroup. Select the running status (static or dynamic) and the bound physial port of the smartgroup; configure the smartgroup type (active/standby, or load sharing).

  33. Commonly used query command for the linear protection switchover: ZXR10(config)#show aps protect-config 1 Protect group id: 1 Active state: active Running mode: network APS current state: SIGNAL_FAIL_P <- indicating that the SF alarm occurs on the protection tunnel. request bridge type: no switched Protect mode:revertive, WTR time:1(min) Protect switch:clear Hold-off time:0(ms) • Commonly used query command for the ring protection switchover: • ZXR10(config)#show aps mepg-config 1 • TMRP id:1 • Active state: active • running mode: network <- Default: network; If it is local, it indicates that the APS packets are not to be sent. • Aps-id: 1, east-aps-id: 2, west-aps-id: 3 • East-tms:1, switch: null • West-tms: 2, switch: null • Ring switch mode: standard <- Default: standard; other other values • Ring APS state: SWITCHING_SF of east tms <- The red part indicates that the SF alarm occurs on the eastward TMS. • request bridge type: switched • WTR time:1(min) • Hold-off time:0(ms) Protection Switchover Status Query

More Related