Control and Management of Optical Networks

Size: px
Start display at page:

Download "Control and Management of Optical Networks"

Transcription

1 Control and Management of Optical Networks

2 Typical Management Functions! Performance management! Fault management! Configuration management! Security management! Accounting management! Safety management

3 Performance Management! Monitoring and managing performance parameters in the network.! Can be used to provide for QoS provisioning and to monitor whether clients comply with the requirements.! Provides data to administrators, clients and other management functions.

4 Fault Management! Detecting and isolating failures in the network.! Restoring the links for the traffic.! In optical networks most of this function fall into Protection and Restoration.

5 Configuration Management! Managing addition/removal of equipment (rerouting of traffic!) and software upgrades.! Connection management deals with settingup and tearing down connections, can be:! Centralized! Distributed! Adaptation management: incoming optical/electric signals have to be converted into WDM signals accepted by the network.

6 Security Management! Authentication, Encryption, User rights.! Network security can be horizontally and/or vertically partitioned.! Vertical partitioning means that some users may only access some of the network elements.! In horizontal partitioning, some users may access some parameters all across the network. (e.g., user its own lightpath)

7 Accounting Management! Billing! Lifetime history of users! Lifetime history of components! Does not differ much for optical networks compared to other wired networks

8 Safety Management! Optical radiation safety! Eye safety (Class-1 Laser)

9 Management Framework and Protocols

10 Centralized vs. Distributed Management! Centralized management usually relies on hierarchical management systems.! Centralized management is usually slow due to large software path overheads.! Decentralized methods are much faster (e.g., for protection purposes it is necessary), thus some functions should be decentralized.! In large network distributed management enables more than one managers. Especially if different domains are managed by different managers, this is recommended. Managers will have to communicate with other managers to perform certain functions.

11 Management Framework! Network elements have to be managed, e.g., OLTs, OADMs, OXCs, etc. Each of these elements has an associated element management system (EMS).! EMSs have communication interfaces (and software agents) to communicate with.! EMSs in a network are interconnected with a data communication network (e.g., the OSC can be used for that).! An EMS has a good view of the element but not necessarily of the network. Thus EMSs communicate with a network management system (NMS) (or operations support system) (OSS)

12 Management Framework

13 Information Model! EMSs operate on information models (IM).! IMs are usually implemented in an object oriented language, since they have an object-oriented representation themselves.! Inheritance plays an important role.! Connection trails are IMs for example that can represent lightpaths.

14 Management Protocols! Most management systems are master-slave based with get and set operations over IMs.! Additionally, messages can be slave initiated (exception reports, or alarms, traps)! The most well-known IP based management protocol is SNMP. The IM ins SNMP is called MIB (management information base)! Yet most carriers still rely on TL-1 (Transaction Language-1). TL-1 is a simple ASCII command language.

15 Management Protocols! The standardization of a new mg. framework is timely and underway: TMN (Telecommunications Management Network).! TMN s hierarchical management protocol is called: CMIP (Common Management Information Protocol). CMIP runs over OSI but has also been defined for TCP/IP.! In order to be able to manage a network with equipment from various vendors, a common interface is needed. CORBA (common object request broker) can be used to enable communication of software agents.

16 Optical Layer Services and Interfacing

17 Clients of the Optical Layer! Clients of the optical layer should be able to control the optical layer, thus a clearly specified interface is needed.! Management functions are:! Lightpath set-up and tear-down! Lightpath bandwidth requests! Adaptation functions to convert WDM signals to client signals (transponders, supported wavelengths, modulation, bit-rates)! Performance level management (i.e., BER should be below ).

18 Clients of the Optical Layer! Management functions cont d:! Different levels of protection may be supported. Maybe transferring low-priority data on the protection bandwidth. Restoration time specification.! Direction of lightpaths (uni-, or bi-).! Multicasting (drop-and-continue)! Signal jitter requirements of the client layer have to be addressed (with 2R or 3R).! Requirement on maximum delay have to be addressed (e.g., ESCON)! Root-cause alarms. One failure can result in several alarms most of which have to be suppressed.

19 Interface Between OL and Clients! A simple interface is used today, where the clients talk to the optical layer s EMS, and that talks to the equipment s EMS. This works good assuming long holding times.! In future, it would be more appropriate to specify a signaling interface between OL and it s clients. Some carriers yet think this is not necessary.

20 Layers Within the Optical Layer

21 Sub-layers in the Optical Layer! Three sub-layers have been defined by ITU: 1. Optical Channel Layer (OCh-top) responsible for end-to-end routing of lightpaths (optical channels) 2. Between OLTs and OADMs is an optical multiplex section (OMS) 3. Optical Transmissions Sections (OTS), the OTS also consists of the OSC.

22 Sub-layers in the Optical Layer

23 Sub-layers of the OCh! OCh-TS (transparent section) section of the lightpath within an all-optical subnet, no OEO conversions! OCh-S (Channel section) Adds some overhead, e.g., FEC! Och-P (Path) End-to-end lightpaths! The above sub-layering enable division of management functions.

24 Multi-vendor Interoperability

25 Interoperability?! Today there is (almost) no interoperability. It also seems to be utopistic for the near future.! Different vendors may use different modulations, bitrates, wavelengths, even the OSC can be at different wavelengths. Additionally WDM is an analog transmission technique which makes standardization even harder.! Interoperability is usually solved by interconnecting equipment using transponders.! There are attempts to standardize WDM and corresponding signaling protocols

26 Performance and Fault Management

27 Performance and Fault Management! Performance management ensures a lower threshold on the performance metrics.! Fault management generates alerts if some of the performance metrics fall below the threshold. Fault management also includes recovery from failures.

28 Transparency! If the network is transparent it is almost impossible to monitor BER, but optical power levels have to be measured. Yet this depends on the signal format which should be known to the measuring equipment.! Non transparent networks (e.g., for OC-48 SONET) on the other hand are cheap and easily managed (yet not future-proof).! Today most networks are somewhat transparent, where the clients are predefined (e.g., SONET/SDH,ATM,ESCON, Gb Ethernet)

29 BER measurement! BER can only be measured in the E domain.! SONET has built in bits in the frame to communicate about BER measurements.! Estimating BER on optical power is almost impossible.

30 Optical Trace! Traces identify lightpaths inside the network (e.g., the source and destination IP address).! Different sub-paths may have different traces.

31 Alarm Management! A single failure can cause multiple alarms (e.g., a link failure).! Thus single-root alarms are required to not to confuse the management system.! Alarm suppression is accomplished by special signals: 1. Forward defect indicator (FDI) 2. Backward defect indicator (BDI)

32 Forward Defect Indication! When detecting a failure, a node sends out an FDI to the downstream nodes.! FDIs are also passed on to further downstream nodes. If and FDI is received from an upstream node, the current node will suppress its own fault indication.

33 Backward Defect Indication! A BDI signal is also sent to the upstream nodes, if the upstream node did not send out an FDI, then it knows that the error is right between itself and the downstream node.

34 Data Communication Network

35 Data Communication Network! The DCN is used for signalling. It is usually a standard TCP/IP or OSI network.! The DCN should be well connected (e.g., 2-connected), in which case the DCN can survive broken links.

36 Data Communication Network 1. DCN can be a separate network (out of band), outside the optical layer. Simple leased lines can be used for this, but not all elements may be connected (e.g., EDFAs). 2. DCN can be built using the OSC. Yet all optical equipment (all optical OXC) cannot easily accommodate this. 3. In-band, inside the optical layer with superposed channels.

37 Optical Layer Overhead

38 Optical Layer Overheads! Overhead in the optical layer is required to enable the measurement for quality of the link (e.g., BER).! This is implicit with SONET, but not in general true for the optical layer.

39 Pilot Tone/ Subcarrier Multiplexed Overhead! Subcarrier is used to modulate the additional signalling overhead. This channel is relatively low bandwidth and amplitude.! Demultiplexing the pilot tone does not require the demultiplexing of the entire signal.! It is relatively inexpensive, does not depend on the format of the real signal. Yet it cannot be used to measure BER and can only be terminated at the termination points of the real signal.! Trace function is easily accomplished.

40 Optical Supervisory Channel! If optical amps are used, an OSC is employed to monitor those amps. This same signal can be used to establish the DCN.! The wavelength selection for the OSC contains some trade-offs (e.g., should not be close to pumping frequencies). The ITU standardized the OSC at 1510nm. Another good choice is above the L band (1620nm) to avoid collision with pumping sources and the S band.

41 Rate-Preserving Overhead! The existing frame structure of SONET is used to employ not defined bytes for FEC.! It cannot be used in a transparent network. And equipment has to be SONET/SDH enabled. (Some of the unused bits have been already hijacked by different vendors for their own purposes).

42 Digital-Wrapper Overhead! Similar to the subcarrier multiplexing method, where additional bits are added to the ongoing wavelengths. Can be indeed used for BER indication.! It can be used for FEC, and to establish the DCN. The wrapper is somewhat transparent to the signals transmitted.! It does not work well with legacy equipment.

43 Optical Safety

44 Classes of Lasers! Class-I laser cannot emit damaging radiation. Power levels have to be maintained below some given treshold values even in the case of single failures.! Class-IIIa systems allow higher emission powers but are restricted to be handled by trained personnel.! Class-IIIb systems can emit even higher powers and can cause damage even when it is not focused.! Usually long haul networks employ Class-III lasers, while enterprise and metro employ Class-I lasers.

45 Other Safety Considerations! Most equipment connectors have shutters closing when they are disconnected.! Protocols can also be employed to turn off laser sources if failures have been detected, e.g., the open fiber control protocol of Fibre Channel.

46 Network Survivability Based on: Optical Networks, a Practical Perspective (2 nd Edition) Chapter 10, by R.Ramaswami, K.N.Sivarajan

47 Resilience Against Failures! Availability of connection should be better than % (five 9s), corresponding to less than 5 minutes a year downtime.! Survivable or resilient are important properties of optical networks, so they can continue providing service even in the presence of failures.

48 Protection Switching! Protection switching is the key technique used for survivability.! With protection switching, traffic is rerouted between end-points using redundant bandwidth.! Restoration is the process of doing the protection switching (protection is a proactive while restoration is a reactive term).! To ensure fast restoration, management of protection should be distributed not centralized.

49 Sources of Failures! In the largest part of the cases: human triggered failures, e.g., cable cuts (Joe S. with a backhoe), turning the wrong switch, or disconnecting the wrong cable. Cable that is run together with other infrastructure (e.g., gas pipes) is less likely to be cut.! The next most likely cause of failures is equipment failure, e.g., transmitters, receivers, other active elements, thus usually controllers are redundant in equipment.! Since today (and this is the trend) most equipment is software-controlled, software bugs represent another threat of failures.! Additionally entire offices can go down (usually due to Mother Nature).

50 Protection! Protection is also needed to be able to service equipment without down times.! Usually resilience is engineered for a single failure at a time. Large networks are usually subdivided into subnetworks, each of them capable to handle a single failure.! Engineering for a single failure is sufficient if the mean time between failures (MTBF) is significantly larger than the average repair time.! Yet, some schemes can provide protection again multiple failures by their nature.

51 Restoration Times! A rule of thumb (standardized) coming from the requirements of SONET is to restore connections in less than 60ms (10ms of which should be sufficient for fault detection and initiation of restoration).! In data networks this is not a strong requirement, which enables reducing the cost of equipment (yet a downtime of 1 second results in 312MB 1.25GB 5GB lost information on OC-12, OC-48 and OC-192 link respectively)

52 Layers of Survivability! Protection can be performed at: 1. The Physical layer (SONET layers, Optical layer) 2. Link layer (e.g., ATM layer, MPLS layer) 3. Network layer (e.g., IP layer IP routers)! In general, the higher the protection is implemented the slower it gets (but also the more sophisticated it can be)

53 Working Paths vs. Protection Paths! Working paths carry traffic in normal conditions.! Protection paths are used in case of failures on working paths.! Working and protection paths should be routed link (and node) disjoint.! Ring topologies are popular due to their minimal link properties to remain 2- connected. Yet most research today is focused on mesh topologies (future)

54 Dedicated vs. Shared Protection! Dedicated protection assumes the equal (redundant) bandwidth available for each connection over working and protection paths.! In shared protection several protection paths can use the same wavelength, assuming that only one failure happens at a time (and to restore from that failure, only one of the protection paths needs to be established)! Shares protection can reduce the overall bandwidth requirement (but will require higher restoration times)! Redundant bandwidth can be reused to carry best effort traffic as long as protection has higher priority over this traffic).

55 Revertive vs. Nonrevertive Protection! In both revertive and nonrevertive schemes traffic is automatically switched from the working path to the protection path in case of a failure.! In revertive protection as soon as the error has been fixed the system is automatically going to switch back to the working path.! In nonrevertive protection manual reaction is needed to switch back to the working path.! Obviously, shared protection schemes should be revertive too.

56 Unidirectional vs. Bidirectional Protection! In unidirectional protection, protection switching is handled in each direction separately.! In bidirectional protection, protection switching is handled on both directions simultaneously.! Fiber cuts are easily handled with unidirectional protection, but in the case of, e.g., transmitter failure, unidirectional protection only switches the failed direction to another path (or fibre).! Unidirectional protection is used with dedicated protection, since then no signalling is needed.

57 Automatic Protection Switching! APS is a signaling protocol (e.g., to be used with bidirectional switching) for devices to quickly notify each other about the need of restoration.! In a simple APS, a node that encounter loss of signal turns its own transmitter ower to the protection path by which it signals the peer node about the failure.! In shared protection schemes APS is required to coordinate access to the shared protection bandwidth.

58 Rerouting of Traffic! Path Switching: Connection is rerouted end-to end along an alternate path! Span Switching Connection is rerouted on a spare link between the same nodes (where the failure happened)! Ring Switching Connection is rerouted along a ring between adjacent nodes that encountered the failure.

59 Protection in SONET

60 SONET! A major goal of SONET was to have fast restoration times.! The SONET layer includes the path and line sublayers at both of which protection schemes are used (path layer is terminated end-to-end, while line layer is terminated at every TM, ADM, or OXC but not at every regenerator (section)).! A path scheme operates on individual connections (e.g., on individual STS-1 on an OC-12 ring)! A line layer on the other hand would switch the OC- 12 traffic

61 1+1 Protection Between Nodes! 1+1 protection means that there is a dedicated protection fiber and traffic is transmitted over both links simultaneously (e.g., two fiber-pairs between nodes).! The destination simply selects one of the signals (e.g., the strongest) and switches over to the other in case this signal fails very quick restoration.! The two endpoints may use the links on different fiber-pairs, which is not a problem.

62 1:1 Protection Between Nodes! Similar to 1+1, but traffic is transmitted over only one of the fiber-pairs (the working fiber).! Both nodes have to use the same fiber-pair all the times for which APS is needed slower than 1+1 protection switching.! The protection-redundant bandwidth can be used to transfer best-effort traffic as long as protection has priority over it (which is seldom used today)

63 1:N Protection Between Nodes! Generalized version of 1:1 protection, where N working fibers share a single protection fiber.! This scheme can handle the failure of a single fiber but APS has to be used to avoid using the protection fiber simultaneously for more than one failures.

64 Self Healing SONET Rings

65 SONET Rings! Rings are the simplest 2-connected structures (and topologically efficient too).! Today most legacy infrastructures are SONET self-healing rings.! Two main approaches to SONET rings are: 1. Unidirectional rings (traffic is carried in one direction only) 2. Bidirectional rings (traffic is carried in both directions)

66 SONET Self-healing Rings 1. Unidirectional path-switched rings (UPSR) rings have a single fiber pair between adjacent ADMs. 2. Bidirectional line-switched rings with four fibers (BLSR/4) have two fiber pairs between adjacent nodes 3. Bidirectional line-switched rings with two fibers (BLSR/2) have a single fiber pair between adjacent nodes

67 Unidirectional Path-switched Rings (UPSR)! One fiber is used as working fiber and the other as a protection fiber. Similar to the linear 1+1 scheme.! The working fiber s and the protection fiber s directions are different (e.g., one is clockwise while the other is counter clockwise).! Switch over is done on a connection basis thus at the path layer (unlike with 1+1 protection).

68 Unidirectional Path-switched Rings (UPSR)! Can handle link, node, transmitter or receiver failures easily.! No signaling protocol is needed.! The redundant bandwidth is equal to the working bandwidth and cannot be reused for other connections.! UPSR cannot spatially reuse bandwidth!! UPSRs are popular in lower speed access networks (in a hubbed situation there is no need for spatial reuse anyways).! Typical UPSR speeds are below OC-24 speed.! Ring length is limited by the restoration times (and the fact that the propagation delay in the two different directions are different too)

69 Bidirectional Line-switched Rings (BLSR)! More sophisticated than ULSRs! They operate at the line layer.! In BLSR/4 two fibers are used as working and two fibers are used as protection.! Working traffic can be carried in both directions (unlike UPSR) usually with shortest path routing (but not always).! BLSRs support up to 16 nodes (hardware limited by 4 bits). Maximum length is 1200km (corresponding to 6ms). Longer rings are permitted if the 60ms requirement is relaxed (submarine cables)

70 Bidirectional Line-switched Rings (BLSR/4)! BLSR/4 can do two types of protection: span switching and ring switching.! With span switching a defective fiber between adjacent nodes can be rerouted to the protection fiber between those two nodes.! In case of a regular fiber cut, ring switching is used in which all length of the protection fiber is involved.

71 Bidirectional Line-switched Rings (BLSR/2)! In a BLSR/2, the protection fibers are embedded into the working fibers by sharing the bandwidth of a fiber, thus half the capacity of the fibers is reserved for protection purposes.! Span switching is not possible, yet ring switching works similar to that of BLSR/4.! The protection bandwidth in both BLSR cases can be used to carry low-priority traffic.

72 Bidirectional Line-switched Rings (BLSRs)! BLSRs provide with spatial reuse capabilities!, thus they are more efficient than UPSRs (since protection bandwidth is shared among all connections).! BLSRs thus are a good choice for long haul networks. BLSRs can have speeds of up to OC Metro carriers prefer BLSR/2 while long-haul carriers like BLSR/4 (can correct more errors e.g., on each span a transmitter error).! Compared to UPSRs, BLSRs require much more complex signaling (BLSR/4s even more), but the SONET frame structure provides bits for these purposes.

73 Node Failures in BLSRs! Node failures are less likely than link failures (due to redundant equipment).! BLSR restoration is more complicated in the event of a node failure, if each of the adjacent nodes to the failed node assumes that the links have been broken leads to unwanted situations.! To avoid wrongful situations, nodes have to determine what the exact situation is first, and then remove connections to/from the failing node. This requires extensive signaling and is called squelching.! Each node maintains squelch tables to know which connections need to be squelched in the event of a node failure (slower restoration times)

74 Ring Interconnection! Bigger (mesh) networks can be established by the interconnection of rings (or mesh networks can be seen as interconnected rings).! The most simple way to connect rings is to connect the add/drop ports of two ADMs in two different rings (with additional grooming capabilities).! Yet if one of these ADM fails, the two rings become separated.

75 Dual Homing! Two adjacent ADMs in each ring are used as hubs to 2-connect the two rings. Thus one of these hubs can fail and connection would be still available.! Usually the hubs in one ring use a drop-andcontinue approach (where data is not removed from the link).! Dual homing is extensively used in long-haul networks to interconnect BSLRs, and also to interconnect metro BLSRs with access UPSRs.

76 Protection for IP Networks

77 IP Networks! Traditionally IP networks provided best effort services. This is changing (IntServ, Diffserv) and one of the possible vessels to QoS provisioning can be MPLS.! In IP networks, the intradomain IP routing protocols (e.g., OSPF) provide with restoration by updating their routing tables after encountering errors. Usually it takes several tens of seconds to detect failure and several minutes for the networks and the routing tables to converge to a stabile situation.! Another option is to have the underlying layer provide on information of failure which would speed up the recovery process.

78 IP Networks Today! Adjacent router exchange hello messages periodically to detect link failures.! Loss of link is detected by counting the number of missing respective hello packets.! (A typical set-up is 10s periods and 3 missing packets => 30-40s just for detection) Core router typically detect failures in the 10s range.! There is a lower limit on the frequency of hello packets (1s) but that is still too much time spent for error detection

79 The Alternative: Protection at the Optical Layer

80 WDM! WDM can be used to serve the clients, such as SONET or IP or ATM.! Client layers have their own protection mechanisms and do not have to rely on the optical layer s resilience.! Yet resilience in the optical layer can be extremely helpful (if not instrumental) in reducing cost/complexity of client layers as seen next.

81 Reason 1 for Optical Layer Protection! Not all clients (e.g., ATM, ESCON, Fibre Channel, IP) have as sophisticated protection methods as SONET does.! Yet, since the industry seems to converge onto a uniform packet switched approach (likely to be IP), all the above clients are expected to have the same kind of protection SONET is bearing.! This can be done either at each individual clients or down at the OL (is more cost effective).

82 Reason 2 for Optical Layer Protection! Cost savings of OL protection to client layer protection.! Optical layer protection is more efficient since it can share protection bandwidth among different(!) clients (which clients cannot do).! The cost of a router port is significantly higher than the cost of an optical layer port, thus it is better to leave protection switching to the optical layer (less client ports are required).

83 Reason 3 for Optical Layer Protection! A WDM link carries more than one wavelength, a cable carries more than one WDM link.! In case of a cut, each stream has to be restored by the client layer resulting in an extreme amount of alarm management signalling.! If the OL would take care of this, fewer entities would have to be rerouted => faster and simpler with less overhead.

84 Reason 4 for Optical Layer Protection! OL protection introduces an additional degree of resilience to that of the client layer s protection.! Repair of a failed link can take a long time in which additional protection may be available due to the combination of the two protection schemes.

85 Reason 5 for Optical Layer Protection! SONET protection is mainly based on rings (UPSR, BLSRs) which require reserved protection bandwidth.! However in the backbone a mesh topology is more likely, thus distributed shared protection can further save on bandwidth requirements (thus enhance efficiency).! Protection schemes for mesh topologies are currently developed (hot research area).

86 Drawback 1 of Optical Layer Protection Only! OL cannot protect against failures in the client equipment (e.g., transmitters, receivers).

87 Drawback 2 of Optical Layer Protection Only! Decision on when to invoke OL protection is non-trivial.! No BER measurements are available, only the presence or absence of power.! Even power level measurements have to be digital (loss of light), since the OL has no way of knowing what the values are intended to be.

88 Drawback 3 of Optical Layer Protection Only! In the OL only lightpaths can be protected.! If protection of individual flows in the lightpaths is required, then the client layer has to do that.

89 Drawback 4 of Optical Layer Protection Only! Protection paths can be significantly longer that requires optical signal level engineering.

90 Drawback 5 of Optical Layer Protection Only! Interworking of protection schemes is a serious issue to avoid counter actions of different protection initiatives.

91 Protected Service Classes! Different protection schemes can be used for different QoS requirements of streams.! There are no standards defined but there is some consensus on the different classes of protected services.

92 Protected Service Classes! Platinum! Very-high availability very-fast restoration (e.g., dedicated 1+1 SONET like protection)! Gold! High availability, fast restoration (n*100ms, e.g., shared mesh protection)! Silver! Good availability, best effort restoration (e.g., connection is reattempted in case of failure)! Bronze! Unprotected lightpaths, in the case of failure, connection is lost! Lead! No protection or guaranteed bandwidth (e.g., using protection bandwidth to transmit best effort data)

93 Protected Service Classes! Mapping of applications to different service classes is not clear yet.! Today most services are platinum, since infrastructure is yet SONET based.! The trend is towards asynchronous data communications, thus it is likely that all of the previous services will be defined.

94 Optical Layer Protection

95 The Optical Layer (review)! Optical layer consists of:! Optical channel layer - OCh (SONET path layer)! Optical multiplex section layer OMS (SONET line layer)! Optical transmission section OTS (SONET section layer)! OL protection can be done in either OCh or OMS. OCh restores on a lightpath basis endto-end, while OMS restores on a fibre basis locally.

96 OL Protection Alternatives! There is a significant cost difference between OCh and OMS protection.! OMS is general requires less equipment, since it is operating on a set of lightpaths, where OCh handles the lightpaths individually.! OMS protection is independent of the number of channels, while OCh is heavily dependent.

97 OL Equipment! In the OL, OLTs and OADMs can both provide for OCh and OMS protection.! OXCs are likely to perform protection at the OCh level (or even higher if it is a grooming OXC).! Meshed backbones are likely to use OXCs at the OCh level.! Metropolitan networks with a large amount of OLTs and OADMs are likely rely on OCh and OMS protection of the OL.

98 1+1 OMS Protection! Simplest OL protection scheme.! The WDM signal is split onto two diversely routed physical links, and the receiver selects the better signal among the two using either a 2*1 switch or two EDFAs (one off and the other on) and a combiner.! Splitting results in 3dB loss that has to be calculated (and other insertion losses).

99 1:1 (1:N) OMS Protection! Similar to SONET 1:1 (1:N) protection! Typically has a switch at the transmitter (less signal power loss).! APS protocol is needed for protection coordination between endpoints.

100 OMS Dedicated Protection Ring (OMS-DPRing)! Similar to SONET UPSR or more like ULSR.! In a likely implementation it is just two overlaid bus networks (with the ring broken at one node). If a link failes that break point will be moved to a node adjacent to the failed link.

101 OMS Shared Protection Ring (OMS-SPRing)! Similar to BLSR/4.! Two fibers have corresponding WDM equipment while the other two do not (cost and loss saving).! It can either do span or ring switching of fibers (OMSs).! Protection fibers may have to include amps to compensate for longer paths.! Two fiber version is theoretically possible (half the wavelengths for protection while the other for working and vice-versa on the other fibre). Yet, it requires groups of wavelengths to be multiplexed (not OMS level).

102 1:N Transponder Protection! None of the before mentioned schemes are protecting for transponder failures.! 1 transponder can be set aside to protect N transponders. Yet since most of the time fixed wavelength transponders are used, in case of failure a night lightpath has to be set up at the new wavelength (alternative is to use tunable spare transponders)

103 1:1 OCh Dedicated Protection! Two lightpaths on disjoint routes are set up for each client.! Signal is split at the input, destination selects the best signal.! Can be deployed in rings: Och-DPRing.! The protection bandwidth is not shared among different clients, yet can be implemented simply.

104 OCh-Shared Protection Ring (OCh-SPring)! Working lightpaths are set up along the shortest path on the ring. If a lightpath fails, it can be restored either by span or ring switch.! None-overlapping lightpaths can use the same protection lightpath in the ring (spatial reuse).! In case of node failures squelching is needed (signaling overhead).

105 OCh Mesh Protection! Backbone networks are more densely connected and thus are mesh networks.! Mesh protection can be more bandwidth efficient (wavelengths can be shared among rings) than virtual ring topologies. The denser the network in general the higher the gain (20-60%) using mesh protection.

106 Mesh Protection Problems! Standardization is needed (just like in SONET)! Network has to be treated as one entity (unlike with rings, where partitioning is possible), since partitioning the network reduces bandwidth efficiency. Human errors will have a greater impact on the network! Management is significantly more complex than that of rings. New management tools are needed (for working and protection path calculations), but since network does not have to be partitioned in rings, the likely hood for blocking in a shared case is reduced.

107 Mesh Protection Problems! New (network-wide) signaling mechanisms are needed to be able to provide for rapid restoration.! Protection routing tables (topology and protection paths) will have to be maintained at nodes. If the network changes, all the tables have to be updated and have to be always consistent (unlike that for IP routing tables).

108 Online vs. Offline Protection! If protection routes are computed while setting up working paths then protection is offline (pro-active).! If protection routes are calculated after a failure then protection is online (reactive).

109 Offline Protection! The computation can be based on disjoint path routes, but can also involve several protection routes for different errors (has an impact on the signaling and memory overheads).! If routes are computed centrally, then computation is relatively easy but there is a single point of failure, and a bottleneck (both communication and processing wise) can be formed.! If routes are computed in a distributed fashion, then failure notification has to be flooded (or sent one-by-one) in which case all the routers involved have to reconfigure themselves.

110 Online Protection! Will there be enough idle bandwidth to do the calculation? It is possible that not all lightpaths will be restored.! In case of a distributed calculation, lightpaths will have to contend for available bandwidth which requires additional signaling overhead (slower too).! A centralized calculation would handle contentions more easily but communication and processing overheads would be too large.

111 Mesh Protection Requirements! Route computation (Disjkstra)! Topology and table maintenance (OSPF)! Signaling for protection routes (RSVP, PNNI, SS7)! Most of which have already been implemented in IP or ATM networks (but are too slow) see brackets.

112 Interworking between Layers! Since protection can be done at several layers (and their corresponding sub-layers) overall protection must be coordinated to avoid pathological situations of independent but contending protection initiations.! If different layer protections have some well defined behaviors than the above contention can be avoided.

113 Avoiding Contention A Simple Example! If the following conditions are satisfied, then the network will always restore traffic flows: 1. There exists a protection path for each involved protection layer. 2. The server layer s protection does not depend on a failure detection from the client layer. 3. The client layer is revertive (it will always try to switch back to the original working path)

114 Interworking?! Although interworking would be desirable it is not always possible (different entities trigger restoration for different layers).! Yet, if priority between protection schemes could be given, then that would implicitly ensure interworking (e.g., OL restoration is so fast that the IP layer did not have time to detect a failure).! Another approach is to delay restoration at the higher layers waiting for the lower layer to act, but that introduces additional delay (why not have the fastest layer react first?)

9. Control and Management in Optical Networks

9. Control and Management in Optical Networks Lecture 9: Control and Manegement in Optical Networks 1/ 9. Control and Management in Optical Networks Optical Communication Systems and Networks Lecture 9: Control and Manegement in Optical Networks 2/

More information

WDM network management

WDM network management IO2654 Optical Networking WDM network management Paolo Monti Optical Networks Lab (ONLab), Communication Systems Department (COS) http://web.it.kth.se/~pmonti/ For some material in this lecture check the

More information

ECE442 Communications Lecture 4. Optical Networks

ECE442 Communications Lecture 4. Optical Networks ECE442 Communications Lecture 4. Optical Networks Husheng Li Dept. of Electrical Engineering and Computer Science Spring, 2014 Network Elements 1 WDM networks provide circuit switched end-to-end optical

More information

Optical Fiber Communications. Optical Networks- unit 5

Optical Fiber Communications. Optical Networks- unit 5 Optical Fiber Communications Optical Networks- unit 5 Network Terminology Stations are devices that network subscribers use to communicate. A network is a collection of interconnected stations. A node

More information

Optical Network Control Protocols

Optical Network Control Protocols Optical Network Control Protocols Jorge M. Finochietto Córdoba 2012 LCD EFN UNC Laboratorio de Comunicaciones Digitales Facultad de Ciencias Exactas, Físicas y Naturales Universidad Nacional de Córdoba,

More information

REDUCING CAPEX AND OPEX THROUGH CONVERGED OPTICAL INFRASTRUCTURES. Duane Webber Cisco Systems, Inc.

REDUCING CAPEX AND OPEX THROUGH CONVERGED OPTICAL INFRASTRUCTURES. Duane Webber Cisco Systems, Inc. REDUCING CAPEX AND OPEX THROUGH CONVERGED OPTICAL INFRASTRUCTURES Duane Webber Cisco Systems, Inc. Abstract Today's Cable Operator optical infrastructure designs are becoming more important as customers

More information

Network Survivability

Network Survivability Network Survivability Bernard Cousin Outline Introduction to Network Survivability Types of Network Failures Reliability Requirements and Schemes Principles of Network Recovery Performance of Recovery

More information

Optical Communications and Networking 朱祖勍. Nov. 27, 2017

Optical Communications and Networking 朱祖勍. Nov. 27, 2017 Optical Communications and Networking Nov. 27, 2017 1 What is a Core Network? A core network is the central part of a telecommunication network that provides services to customers who are connected by

More information

Protection Schemes and Network Topologies

Protection Schemes and Network Topologies CHAPTER 2 This chapter describes how protection is implemented on the Cisco ONS 15540 ESPx. It also describes the supported network topologies and how protection works in these topologies. This chapter

More information

All-Optical Switches The Evolution of Optical Functionality Roy Appelman, Zeev Zalevsky, Jacob Vertman, Jim Goede, Civcom

All-Optical Switches The Evolution of Optical Functionality Roy Appelman, Zeev Zalevsky, Jacob Vertman, Jim Goede, Civcom All-Optical Switches The Evolution of Optical Functionality Roy Appelman, Zeev Zalevsky, Jacob Vertman, Jim Goede, Civcom Introduction Over the last few years, significant changes in optical networking

More information

Transport is now key for extended SAN applications. Main factors required in SAN interconnect transport solutions are:

Transport is now key for extended SAN applications. Main factors required in SAN interconnect transport solutions are: E Transport is now key for extended SAN applications. Main factors required in SAN interconnect transport solutions are: Native support for all SAN protocols including ESCON, Fibre Channel and Gigabit

More information

Optical networking technology

Optical networking technology 1 Optical networking technology Technological advances in semiconductor products have essentially been the primary driver for the growth of networking that led to improvements and simplification in the

More information

Introduction to Networks

Introduction to Networks Introduction to Networks Network Topology How we interconnect network users Network Hierarchy The connection between network topology and geographical size Telecommunication (Phone Networks) Circuit Switching

More information

Optical Network Control

Optical Network Control Optical Network Control Jorge M. Finochietto Córdoba 2014 LCD EFN UNC Laboratorio de Comunicaciones Digitales Facultad de Ciencias Exactas, Físicas y Naturales Universidad Nacional de Córdoba, Argentina

More information

Survivability Architectures for Service Independent Access Points to Multiwavelength Optical Wide Area Networks

Survivability Architectures for Service Independent Access Points to Multiwavelength Optical Wide Area Networks Survivability Architectures for Service Independent Access Points to Multiwavelength Optical Wide Area Networks Master s Thesis Defense Ananth Nagarajan EECS Department, University of Kansas 10/13/98 Outline

More information

Fault management. Acnowledgements

Fault management. Acnowledgements Fault management Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Computer Networks Design and Management - Acnowledgements Inspired by Davide

More information

Network Topologies & Error Performance Monitoring in SDH Technology

Network Topologies & Error Performance Monitoring in SDH Technology Network Topologies & Error Performance Monitoring in SDH Technology Shiva Sharma Electronics and Communications Department Dronacharya College of Engineering Gurgaon, Haryana Shiva.92@hotmail.com Abstract

More information

SONET Topologies and Upgrades

SONET Topologies and Upgrades 8 CHAPTER Note The terms "Unidirectional Path Switched Ring" and "UPSR" may appear in Cisco literature. These terms do not refer to using Cisco ONS 15xxx products in a unidirectional path switched ring

More information

1. INTRODUCTION light tree First Generation Second Generation Third Generation

1. INTRODUCTION light tree First Generation Second Generation Third Generation 1. INTRODUCTION Today, there is a general consensus that, in the near future, wide area networks (WAN)(such as, a nation wide backbone network) will be based on Wavelength Division Multiplexed (WDM) optical

More information

SYSC 5801 Protection and Restoration

SYSC 5801 Protection and Restoration SYSC 5801 Protection and Restoration Introduction Fact: Networks fail. Types of failures: Link failures Node failures Results: packet losses, waste of resources, and higher delay. What IGP does in the

More information

SFP GBIC XFP. Application Note. Cost Savings. Density. Flexibility. The Pluggables Advantage

SFP GBIC XFP. Application Note. Cost Savings. Density. Flexibility. The Pluggables Advantage SFP GBIC XFP The Pluggables Advantage interfaces in the same general vicinity. For example, most major data centers have large Ethernet (and Gigabit Ethernet) networks with copper, multimode and single-mode

More information

Resilient IP Backbones. Debanjan Saha Tellium, Inc.

Resilient IP Backbones. Debanjan Saha Tellium, Inc. Resilient IP Backbones Debanjan Saha Tellium, Inc. dsaha@tellium.com 1 Outline Industry overview IP backbone alternatives IP-over-DWDM IP-over-OTN Traffic routing & planning Network case studies Research

More information

Multi-layer protection and restoration requirements

Multi-layer protection and restoration requirements Multi-layer protection and restoration requirements Date: July 23 rd, 2001 Source: Sudheer Dharanikota Raj Jain Nayna Networks Yong Xue Erik Sherk WorldCom ABSTRACT: This document provides the necessary

More information

Alcatel-Lucent 1675 LambdaUnite MultiService Switch

Alcatel-Lucent 1675 LambdaUnite MultiService Switch Alcatel-Lucent 1675 LambdaUnite MultiService Switch Versatile switching platform designed to meet today s network requirements and to drive future network trends LambdaUnite MultiService Switch (MSS) is

More information

Internet Traffic Characteristics. How to take care of the Bursty IP traffic in Optical Networks

Internet Traffic Characteristics. How to take care of the Bursty IP traffic in Optical Networks Internet Traffic Characteristics Bursty Internet Traffic Statistical aggregation of the bursty data leads to the efficiency of the Internet. Large Variation in Source Bandwidth 10BaseT (10Mb/s), 100BaseT(100Mb/s),

More information

ARE CONTROL PLANE BENEFITS APPLICABLE TO SUBMARINE NETWORKS?

ARE CONTROL PLANE BENEFITS APPLICABLE TO SUBMARINE NETWORKS? ARE CONTROL PLANE BENEFITS APPLICABLE TO SUBMARINE NETWORKS? Damien Martinet, Julien Meuric, Yann Loussouarn (Orange Labs) Email: Orange Labs, 2 avenue Pierre Marzin,

More information

High Availability Architectures for Ethernet in Manufacturing

High Availability Architectures for Ethernet in Manufacturing High Availability Architectures for Ethernet in Manufacturing Written by: Paul Wacker, Advantech Corporation, Industrial Automation Group Outside of craft manufacture, like blacksmithing, or custom jewelry

More information

MPLS Multi-Protocol Label Switching

MPLS Multi-Protocol Label Switching MPLS Multi-Protocol Label Switching Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Computer Networks Design and Management - 1 MPLS: introduction

More information

Access Networks. Based on: Optical Networks, a Practical Perspective (2 nd Edition) Chapter 11, by R.Ramaswami, K.N.Sivarajan

Access Networks. Based on: Optical Networks, a Practical Perspective (2 nd Edition) Chapter 11, by R.Ramaswami, K.N.Sivarajan Access Networks Based on: Optical Networks, a Practical Perspective (2 nd Edition) Chapter 11, by R.Ramaswami, K.N.Sivarajan Access Network! The network feeding the metro (and core) networks by gathering

More information

DWDM Topologies CHAPTER. This chapter explains Cisco ONS dense wavelength division multiplexing (DWDM) topologies.

DWDM Topologies CHAPTER. This chapter explains Cisco ONS dense wavelength division multiplexing (DWDM) topologies. CHAPTER 12 This chapter explains Cisco ONS 15454 dense wavelength division multiplexing (DWDM) topologies. Note The terms "Unidirectional Path Switched Ring" and "UPSR" may appear in Cisco literature.

More information

Name of Course : E1-E2 CFA. Chapter 14. Topic : NG SDH & MSPP

Name of Course : E1-E2 CFA. Chapter 14. Topic : NG SDH & MSPP Name of Course : E1-E2 CFA Chapter 14 Topic : NG SDH & MSPP Date of Creation : 28.03.2011 NGN SDH and MSPP 1. Introduction: Innovation, the lifeline to survival in the telecommunication market, has spurred

More information

Multi-Protocol Lambda Switching for Packet, Lambda, and Fiber Network

Multi-Protocol Lambda Switching for Packet, Lambda, and Fiber Network Multi-Protocol Lambda Switching for Packet, Lambda, and Fiber Network Jun Kyun Choi Tel) (042) 866-6122 1 Contents Backgrounds for Optical Network Review of SONET/SDH Technologies Motivations for IP over

More information

IS WDM READY FOR LOCAL NETWORKS?

IS WDM READY FOR LOCAL NETWORKS? IS WDM READY FOR LOCAL TWORKS? by Brent Allen and Solomon Wong Nortel Networks, OPTera Metro Solutions KANATA, Canada Wavelength division multiplexing (WDM) technology, in the form of photonic networking,

More information

Multi Protocol Label Switching

Multi Protocol Label Switching MPLS Multi-Protocol Label Switching Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Network Management and QoS Provisioning - 1 MPLS: introduction

More information

OPTICAL NETWORKS. Optical Metro Networks. A. Gençata İTÜ, Dept. Computer Engineering 2005

OPTICAL NETWORKS. Optical Metro Networks. A. Gençata İTÜ, Dept. Computer Engineering 2005 OPTICAL NETWORKS Optical Metro Networks A. Gençata İTÜ, Dept. Computer Engineering 2005 Introduction Telecommunications networks are normally segmented in a three-tier hierarchy: Access, metropolitan,

More information

MPLS in the DCN. Introduction CHAPTER

MPLS in the DCN. Introduction CHAPTER CHAPTER 5 First Published: January 3, 2008 Last Updated: January 3, 2008 Finding Support Information for Platforms and Cisco IOS and Catalyst OS Software Images Use Cisco Feature Navigator to find information

More information

David Tipper Graduate Telecommunications and Networking Program University of Pittsburgh. Motivation

David Tipper Graduate Telecommunications and Networking Program University of Pittsburgh. Motivation Survivable Network Design David Tipper Graduate Telecommunications and Networking Program University of Pittsburgh Telcom 2110 Slides 12 Motivation Communications networks need to be survivable? Communication

More information

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition Chapter Seven Local Area Networks: Part 1 Data Communications and Computer Networks: A Business User s Approach Seventh Edition After reading this chapter, you should be able to: State the definition of

More information

Benefits of Metropolitan Mesh Optical Networks

Benefits of Metropolitan Mesh Optical Networks Tellabs 4951 Indiana Avenue Lisle, Illinois 60532 U.S.A. Tel: +1.630.378.8800 Fax: +1.630.852.7346 www.tellabs.com Benefits of Metropolitan Mesh Optical Networks Bert Buescher, senior product marketing

More information

SONET Topologies and Upgrades

SONET Topologies and Upgrades CHAPTER 9 Note The terms "Unidirectional Path Switched Ring" and "UPSR" may appear in Cisco literature. These terms do not refer to using Cisco ONS 15xxx products in a unidirectional path switched ring

More information

Importance of Interoperability in High Speed Seamless Redundancy (HSR) Communication Networks

Importance of Interoperability in High Speed Seamless Redundancy (HSR) Communication Networks Importance of Interoperability in High Speed Seamless Redundancy (HSR) Communication Networks Richard Harada Product Manager RuggedCom Inc. Introduction Reliable and fault tolerant high speed communication

More information

MODERN RECOVERY MECHANISMS FOR DATA TRANSPORT NETWORKS

MODERN RECOVERY MECHANISMS FOR DATA TRANSPORT NETWORKS MODERN RECOVERY MECHANISMS FOR DATA TRANSPORT NETWORKS IT Specialist Dorina LuminiŃa Copaci Gorj Court IT Expert Constantin Alin Copaci ANRCTI Bucharest Abstract: A large number of recovery mechanisms

More information

System Applications Description

System Applications Description NT7E65DJ 323-1111-150 SONET Transmission Products S/DMS TransportNode / NE TBM System Applications Description Standard Rel 14 February 2001 What s inside... / network element applications Copyright 1992

More information

Multilayer Design. Grooming Layer + Optical Layer

Multilayer Design. Grooming Layer + Optical Layer Multilayer Design Grooming Layer + Optical Layer Raghu Ranganathan, Office of CTO Email: rraghu@ciena.com OFC 2008 Workshop Acknowledgements: Joe Berthold Loudon Blair Michael Frankel Lyndon Ong Harshad

More information

Zero touch photonics. networks with the cost efficiency of WDM. András Kalmár Péter Barta 15. April, Szeged

Zero touch photonics. networks with the cost efficiency of WDM. András Kalmár Péter Barta 15. April, Szeged Zero touch photonics Combining the flexibility of TDM networks with the cost efficiency of WDM András Kalmár Péter Barta 15. April, 2009 - Szeged Outline Drivers Flexibility and transparency benefits Tunable

More information

DWDM Network Transport Systems with Digital Tributaries for Use in Metropolitan Area Applications: Common Generic Criteria

DWDM Network Transport Systems with Digital Tributaries for Use in Metropolitan Area Applications: Common Generic Criteria Issue 6 January 2003 DWDM Network Transport Systems: Common Generic Criteria Contents DWDM Network Transport Systems with Digital Tributaries for Use in Metropolitan Area Applications: Common Generic Criteria

More information

Fault management. Fault management. Acnowledgements. The impact of network failures. Pag. 1. Inspired by

Fault management. Fault management. Acnowledgements. The impact of network failures. Pag. 1. Inspired by Fault management ndrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Network Management and QoS Provisioning - 1 cnowledgements Inspired by Davide

More information

Introduction Metro Area Optical Networks Components of a MAN Metro Service POP Core MAN Services Access Services Metro Optical Services Service POP

Introduction Metro Area Optical Networks Components of a MAN Metro Service POP Core MAN Services Access Services Metro Optical Services Service POP Introduction Metro Area Optical Networks Components of a MAN Metro Service POP Core MAN Services Access Services Metro Optical Services Service POP Services Core Services MAON Physical Topologies Four

More information

Synergies Between Optical and Packet Rings

Synergies Between Optical and Packet Rings Synergies Between Optical and Packet Rings Nasir Ghani Sorrento Networks Inc http://www.sorrentonet.com 50 th IETF Meeting, Minneapolis, MN, March 2001 50 th IETF Meeting, Minneapolis, MN, March 2001 Page

More information

Technology to Operate and Maintain Transport System for Handling Spikes and Variations in Traffic

Technology to Operate and Maintain Transport System for Handling Spikes and Variations in Traffic Technology to Operate and Maintain Transport System for Handling Spikes and Variations in Traffic Hisashi Morikawa Toshimitsu Handa Norio Kamon The amount of mobile data traffic around the world has been

More information

Management of Lightpaths in Optical WDM Networks:

Management of Lightpaths in Optical WDM Networks: Management of Lightpaths in Optical WDM Networks: A Tool for Configuration and Fault Management Jonas Söderqvist Master thesis performed at Department of Teleinformatics, Royal Institute of Technology

More information

VoIP Transport Reliability on 5E-XC OIU-IP

VoIP Transport Reliability on 5E-XC OIU-IP VoIP Transport Reliability on 5E-XC OIU-IP Preserving call stability on the OIU-IP-enabled 5E-XC Switch Reliable network configurations will enable VoIP services on the 5ESS switch to survive node and

More information

Network Systems for Emerging WAN Applications

Network Systems for Emerging WAN Applications Network Systems for Emerging WAN Applications Hitachi Review Vol. 48 (1999), No. 4 169 Akihiko Takase, D.Sc. OVERVIEW: This paper describes wide-area-network architecture from the viewpoints of networking

More information

Protection for Tree-Based EPON-FTTH Architecture Using Combination ACS and OXADM

Protection for Tree-Based EPON-FTTH Architecture Using Combination ACS and OXADM Australian Journal of Basic and Applied Sciences, 4(12): 6260-6268, 2010 ISSN 1991-8178 Protection for Tree-Based EPON-FTTH Architecture Using Combination ACS and OXADM Mohammad Syuhaimi Ab-Rahman Computer

More information

5. Introduction to Optical Networks

5. Introduction to Optical Networks Lecture 5: Introduction to Optical Networks 1/ 5. Introduction to Optical Networks Optical Communication Systems and Networks Lecture 5: Introduction to Optical Networks 2/ 27 BIBLIOGRAPHY Optical Networks.

More information

Chapter 4 NETWORK HARDWARE

Chapter 4 NETWORK HARDWARE Chapter 4 NETWORK HARDWARE 1 Network Devices As Organizations grow, so do their networks Growth in number of users Geographical Growth Network Devices : Are products used to expand or connect networks.

More information

METRO/ENTERPRISE WDM PLATFORM

METRO/ENTERPRISE WDM PLATFORM F L A S H W A V E METRO/ENTERPRISE WDM PLATFORM SCALABLE OPTICAL TRANSPORT Metro optical transport networks are increasingly defined by the unpredictable convergence of voice, data and video technologies.

More information

A Review of Traffic Management in WDM Optical Networks: Progress and Challenges

A Review of Traffic Management in WDM Optical Networks: Progress and Challenges www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 6 Issue 8 August 2017, Page No. 22309-22313 Index Copernicus value (2015): 58.10 DOI: 10.18535/ijecs/v6i8.13

More information

A TRANSPONDER FOR GIGABIT ETHERNET OVER WDM

A TRANSPONDER FOR GIGABIT ETHERNET OVER WDM A TRANSPONDER FOR GIGABIT ETHERNET OVER WDM D.A. Schupkel and S. Weigert l and O. Jahreis 2 1 Munich University of Technology Institute of Communication Networks 80290 Munich, Germany Tel.: +4989289-23511,

More information

Service-centric transport infrastructure

Service-centric transport infrastructure Analyst Day October 10, 2006 Vinay Rathore Director of Marketing Service-centric transport infrastructure Ciena Proprietary Key drivers for the optical infrastructure Services Scalability Cost 2006 Ciena

More information

A Case Study of a WDM Agent

A Case Study of a WDM Agent H. Badt A Case Study of a WDM Agent H. Badt, L. Jousset, X. Letellier, V. Vnit Alcatel Central Research Center 20 E. Campbell Rd. Richardson, Tx U.S.A {badt, xavier.letellier}@aud.alcatel.com C. Drion

More information

Alcatel 1696 Metro Span. Metropolitan DWDM System

Alcatel 1696 Metro Span. Metropolitan DWDM System Alcatel 1696 Metro Span Metropolitan DWDM System In metropolitan areas, the need for higher bandwidth and valueadded services is becoming increasingly critical. Service providers must find flexible and

More information

Optical transport networks

Optical transport networks Optical transport networks Ullas Kumar CS Applications Engineer Zarlink Semiconductor Abstract The advances in optical networking are guiding the world towards an all optical network supporting a broad

More information

SHARED MESH RESTORATION IN OPTICAL NETWORKS

SHARED MESH RESTORATION IN OPTICAL NETWORKS SHARED MESH RESTORATION IN OPTICAL NETWORKS OFC 2004 Jean-Francois Labourdette, Ph.D. labourdette@ieee.org Page: 2 Outline Introduction Network & Restoration Arch Evolution Mesh Routing & Provisioning

More information

Survivability Strategies in all Optical Networks

Survivability Strategies in all Optical Networks Survivability Strategies in all Optical Networks UNIVERSITY OF KWAZULU-NATAL By Sidharta Singh Submitted to the Department of Electrical Engineering in partial fulfilment of the requirements for the degree

More information

New Approaches to Optical Packet Switching in Carrier Networks. Thomas C. McDermott Chiaro Networks Richardson, Texas

New Approaches to Optical Packet Switching in Carrier Networks. Thomas C. McDermott Chiaro Networks Richardson, Texas New Approaches to Optical Packet Switching in Carrier Networks Thomas C. McDermott Chiaro Networks Richardson, Texas Outline Introduction, Vision, Problem statement Approaches to Optical Packet Switching

More information

The Emerging Optical Control Plane

The Emerging Optical Control Plane The Emerging Optical Control Plane Traditional transport networks can be modeled as the interaction of two operating planes: a transport plane and a management plane. In this model, the transport plane

More information

SPARTAN Meeting in Kansas. Naoya Henmi and Satoshi Hasegawa May 10, NEC Corporation

SPARTAN Meeting in Kansas. Naoya Henmi and Satoshi Hasegawa May 10, NEC Corporation SPARTAN Meeting in Kansas Naoya Henmi and Satoshi Hasegawa May 10, 1998 NEC Corporation Contents of Talk 1) Future WDM Based 2) General Issues Network Evolution 3) Protection Architecture Issue NEC s proposal

More information

CH : 15 LOCAL AREA NETWORK OVERVIEW

CH : 15 LOCAL AREA NETWORK OVERVIEW CH : 15 LOCAL AREA NETWORK OVERVIEW P. 447 LAN (Local Area Network) A LAN consists of a shared transmission medium and a set of hardware and software for interfacing devices to the medium and regulating

More information

Networking in DWDM systems. Péter Barta András Kalmár 7-9. of April, Debrecen

Networking in DWDM systems. Péter Barta András Kalmár 7-9. of April, Debrecen Networking in DWDM systems Zero Touch Photonics Péter Barta András Kalmár 7-9. of April, 2010 -Debrecen Outline Drivers Flexibility and transparency benefits Tunable ROADM (Reconfigurable Optical Add/Drop

More information

Module 11 - Fiber Optic Networks and the Internet

Module 11 - Fiber Optic Networks and the Internet Module 11 - Fiber Optic Networks and the Internet Dr. Alan Kost Associate Research Professor Of Sciences, University Of Arizona Dr. Alan Kost is an Associate Research Professor of Sciences in the University

More information

CHAPTER I INTRODUCTION. In Communication Networks, Survivability is an important factor

CHAPTER I INTRODUCTION. In Communication Networks, Survivability is an important factor 1 CHAPTER I INTRODUCTION In Communication Networks, Survivability is an important factor to be considered in planning and designing of Survivable Fiber Optic Networks (SFON). Survivability depicts network

More information

Multipoint Bridged Ethernet Using MPLS Virtual Private LAN Services

Multipoint Bridged Ethernet Using MPLS Virtual Private LAN Services Multipoint Bridged Ethernet Using MPLS Virtual Private LAN Services By Scott Kotrla How VPLS Compares to Existing VPN Technologies Multipoint Bridged Ethernet is a service offering that attempts to recreate

More information

Strategy for SWITCH's next generation optical network

Strategy for SWITCH's next generation optical network Strategy for SWITCH's next generation optical network Terena Network Architecture Workshop 2012 Felix Kugler, Willi Huber felix.kugler@switch.ch willi.huber@switch.ch 21.11.2012 SWITCH 2012 Introduction!

More information

TRANS-OCEANIC OADM NETWORKS: FAULTS AND RECOVERY

TRANS-OCEANIC OADM NETWORKS: FAULTS AND RECOVERY TRANS-OCEANIC OADM NETWORKS: FAULTS AND RECOVERY Ekaterina A. Golovchenko, Alexey V. Turukhin, Adnan Akhtar, and Stuart M. Abbott (Tyco Telecommunications) Email: Tyco Electronics

More information

CE Ethernet Operation

CE Ethernet Operation 25 CHAPTER Note The terms "Unidirectional Path Switched Ring" and "UPSR" may appear in Cisco literature. These terms do not refer to using Cisco ONS 15xxx products in a unidirectional path switched ring

More information

Different network topologies

Different network topologies Network Topology Network topology is the arrangement of the various elements of a communication network. It is the topological structure of a network and may be depicted physically or logically. Physical

More information

E1-E2 (EB) Chapter 4 MSPP

E1-E2 (EB) Chapter 4 MSPP E1-E2 (EB) Chapter 4 MSPP Page: 1 Multi-service Provisioning Platform (M S P P) I) Introduction: MSPP is deployed in the boundary of Access and Metro core backbone. TEC has prepared two different platforms

More information

ITU-T G Gbit/s point-to-point Ethernet-based optical access system

ITU-T G Gbit/s point-to-point Ethernet-based optical access system International Telecommunication Union ITU-T G.986 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (01/2010) SERIES G: TRANSMISSION SYSTEMS AND MEDIA, DIGITAL SYSTEMS AND NETWORKS Digital sections and digital

More information

How Cisco IT Built Local Access Ring at Headquarters

How Cisco IT Built Local Access Ring at Headquarters Cisco IT Case Study April 2012 Local Access Ring How Cisco IT Built Local Access Ring at Headquarters Self-managed DWDM ring lowers long-term costs and shortens wait for circuits. Challenge EXECUTIVE SUMMARY

More information

The Multiple-Path Protection of DWDM Backbone Optical Networks

The Multiple-Path Protection of DWDM Backbone Optical Networks The Multiple-Path Protection of DWDM Backbone Optical Networks Fu-Hung Shih, Wen-Ping Chen, and Wen-Shyang Hwang 施富宏陳文平黃文祥 Department of Electrical Engineering, National Kaohsiung University of Applied

More information

Wide Area Networks :

Wide Area Networks : Wide Area Networks : Backbone Infrastructure Ian Pratt University of Cambridge Computer Laboratory Outline Demands for backbone bandwidth Fibre technology DWDM Long-haul link design Backbone network technology

More information

Global Crossing Optical. Lambdasphere Lambdaline Managed Fibre

Global Crossing Optical. Lambdasphere Lambdaline Managed Fibre Global Crossing Optical Lambdasphere Lambdaline Managed Fibre Global Crossing Optical What are Global Crossing Optical Services? The optical network within and between data centres is the critical fabric

More information

Fundamentals of Networking Types of Topologies

Fundamentals of Networking Types of Topologies Fundamentals of Networking Types of Topologies Kuldeep Sonar 1 Bus Topology Bus topology is a network type in which every computer and network device is connected to single cable. When it has exactly two

More information

Synchronous Optical Networking Service (SONETS)

Synchronous Optical Networking Service (SONETS) Synchronous Optical Networking Service (SONETS) SONET, the U.S. standard for fiber optic synchronous transmission, enables the transport of voice, data, and multimedia information at rates ranging from

More information

Techniques and Protocols for Improving Network Availability

Techniques and Protocols for Improving Network Availability Techniques and Protocols for Improving Network Availability Don Troshynski dtroshynski@avici.com February 26th, 2004 Outline of Talk The Problem Common Convergence Solutions An Advanced Solution: RAPID

More information

The LSP Protection/Restoration Mechanism in GMPLS. Ziying Chen

The LSP Protection/Restoration Mechanism in GMPLS. Ziying Chen The LSP Protection/Restoration Mechanism in GMPLS by Ziying Chen The LSP Protection/Restoration Mechanism in GMPLS by Ziying Chen A graduation project submitted to the Faculty of Graduate and Postdoctoral

More information

Optical Networks. A Practical Perspective. Rajiv Ramaswami Kumar N. Sivarajan MORGAN KAUFMANN PUBLISHERS

Optical Networks. A Practical Perspective. Rajiv Ramaswami Kumar N. Sivarajan MORGAN KAUFMANN PUBLISHERS Optical Networks A Practical Perspective Second Edition Rajiv Ramaswami Kumar N. Sivarajan к MORGAN KAUFMANN PUBLISHERS AN IMPRINT OF ACADEMIC PRESS A Division of Harcourt, Inc. SAN FRANCISCO SAN DIEGO

More information

Complexity in Multi-level Restoration and Protection Strategies in Data Networking

Complexity in Multi-level Restoration and Protection Strategies in Data Networking Complexity in Multi-level Restoration and Protection Strategies in Data Networking mailto:dward@cisco.com October, 2002 NANOG 1 What makes it complex? Multi-technology network viewed as a stack of singlelayered

More information

Lambda Networks DWDM. Vara Varavithya Department of Electrical Engineering King Mongkut s Institute of Technology North Bangkok

Lambda Networks DWDM. Vara Varavithya Department of Electrical Engineering King Mongkut s Institute of Technology North Bangkok Lambda Networks DWDM Vara Varavithya Department of Electrical Engineering King Mongkut s Institute of Technology North Bangkok vara@kmitnb.ac.th Treads in Communication Information: High Speed, Anywhere,

More information

SPARE CAPACITY MODELLING AND ITS APPLICATIONS IN SURVIVABLE IP-OVER-OPTICAL NETWORKS

SPARE CAPACITY MODELLING AND ITS APPLICATIONS IN SURVIVABLE IP-OVER-OPTICAL NETWORKS SPARE CAPACITY MODELLING AND ITS APPLICATIONS IN SURVIVABLE IP-OVER-OPTICAL NETWORKS D. Harle, S. Albarrak, F. Ali Department of Electrical and Electronic Engineering, University of Strathclyde, U. K {d.harle,sbarrak,

More information

CISCO WDM SERIES OF CWDM PASSIVE DEVICES

CISCO WDM SERIES OF CWDM PASSIVE DEVICES DATA SHEET CISCO WDM SERIES OF CWDM PASSIVE DEVICES Cisco Systems introduces its second generation of coarse wavelength-division multiplexing (CWDM) passive devices boasting increased functions and improved

More information

Request for Comments: 3717 Category: Informational Marconi Communications D. Awduche MCI March 2004

Request for Comments: 3717 Category: Informational Marconi Communications D. Awduche MCI March 2004 Network Working Group Request for Comments: 3717 Category: Informational B. Rajagopalan Consultant J. Luciani Marconi Communications D. Awduche MCI March 2004 Status of this Memo IP over Optical Networks:

More information

CWDM CASE STUDY DESIGN GUIDE. Line Systems, Inc. uses iconverter CWDM Multiplexers to overlay Ethernet onto SONET rings

CWDM CASE STUDY DESIGN GUIDE. Line Systems, Inc. uses iconverter CWDM Multiplexers to overlay Ethernet onto SONET rings DESIGN GUIDE CWDM CASE STUDY Line Systems, Inc. uses iconverter CWDM Multiplexers to overlay Ethernet onto SONET rings 140 Technology Drive, Irvine, CA 92618 USA 800-675-8410 +1 949-250-6510 www.omnitron-systems.com

More information

Core Networks Evolution

Core Networks Evolution Core Networks Evolution Prof. Daniel Kofman daniel.kofman@enst.fr Telecom Paris - ENST Content Any Service, Any Time, Everywhere, Everyone Towards the triple play and beyond Main trends in Core Networks

More information

For internal circulation of BSNL only

For internal circulation of BSNL only E3-E4 E4 (CFA) Overview of SDH AGENDA SDH & PDH Hierarchy SDH Network Survivability Synchronous All elements are synchronized with one master clock. DIGITAL Information is in binary. SDH OVERVIEW HIERARCHY

More information

Evolution of Protection Technologies in Metro Core Optical Networks

Evolution of Protection Technologies in Metro Core Optical Networks University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2006 Evolution of Protection Technologies in Metro Core Optical Networks

More information

Multiservice Optical Switching System CoreDirector FS. Offering new services and enhancing service velocity

Multiservice Optical Switching System CoreDirector FS. Offering new services and enhancing service velocity Multiservice Optical Switching System CoreDirector FS Offering new services and enhancing service velocity Transform your network into a programmable set of network resources, fundamentally changing the

More information

Local Area Networks (LANs): Packets, Frames and Technologies Gail Hopkins. Part 3: Packet Switching and. Network Technologies.

Local Area Networks (LANs): Packets, Frames and Technologies Gail Hopkins. Part 3: Packet Switching and. Network Technologies. Part 3: Packet Switching and Gail Hopkins Local Area Networks (LANs): Packets, Frames and Technologies Gail Hopkins Introduction Circuit Switching vs. Packet Switching LANs and shared media Star, bus and

More information

Computer Networks Question Bank

Computer Networks Question Bank Computer Networks Question Bank 1. Describe in detail OSI Model ANS: OSI (Open Systems Interconnection) is reference model for how applications can communicate over a network. A reference model is a conceptual

More information