SlideShare a Scribd company logo
1
Protection in SONET
• Path layer protection scheme: operate on
individual connections
• Line layer protection scheme: operate on
the entire set of connections at once
2
Protection in SONET
• Point-to-Point Links
– 1+1 protection
– 1:1 protection
– 1:N protection
• Self-healing rings
– Unidirectional path-switched rings (UPSR)
– Four-fiber bidirectional line-switched rings (BLSR/4)
– Two-fiber bidirectional line-switched rings (BLSR/2)
• Ring interconnection
– Dual homing
3
Point-to-Point Links
• 1+1 protection
– Traffic transmitted simultaneously on two
separate fibers from the source to the
destination
– Destination simply selects one of the two fibers
for reception
– Fast protection
– Require no signaling protocol between the two
ends
4
Point-to-Point Links
• 1:1 protection
– Traffic transmitted over only the working fiber
– If the working fiber is cut, the source and destination
both switch over to the protection fiber
– An APS protocol is required
– Not as fast as 1+1 protection
• Advantages over 1+1 protection
– Under normal operation, the protection fiber can be
used to transmit lower-priority traffic
– Can extend to 1: N protection where N working fibers
share a single protection fiber
5
Self-Healing Rings
• A ring is the simplest topology that is 2-
connectedresilient to failures
• Much of the carrier infrastructure today uses
SONET rings called self-healing rings
– Can automatically detect failures and reroute traffic
away from the failed links/nodes rapidly (within 60ms)
• Three ring architectures: UPSR, BLSR/4, BLSR/2
– Unidirectional ring: carry working traffic in only one
direction of the ring
– Bidirectional ring: carry working traffic in both
directions
6
Unidirectional Path-Switched
Rings (UPSR)
• Two fibers: one working and one protection
• Traffic transmitted simultaneously on the working
fiber in the clockwise direction and on the
protection fiber in the counter clockwise direction
• For each connection, destination node monitors
both the working path and the protection path and
selects the better signal
• Traffic switch-over done on a connection-by-
connection basis
• Essentially path layer 1+1 protection
7
Unidirectional Path-Switched
Rings (UPSR)
• Simple to implement
• Require no communication between the nodes
• Protection capacity = working capacity
• No sharing of the protection bandwidth between
connections
– Each bidirectional connection uses up capacity on every
link in the ring and has dedicated protection bandwidth
• Popular in access networks
8
Bidirectional Line-Switched
Rings (BLSR)
• Working traffic carried on both directions
• Four-fiber BLSR (BLSR/4)
– Two working fibers and two protection fibers
– Employ both span switching and ring switching
• Span switching: when a transmitter or receiver on a working
fiber fails, the traffic is routed onto the protection fiber
between the two nodes on the same link
• Ring switching: in case of a fiber cut, the traffic is rerouted
around the ring on the protection fibers
• Two-fiber BLSR (BLSR/2)
– Two fibers, both carry working traffic, half the capacity
on each fiber reserved for protection purposes
– Employ ring switching, not span switching
9
Bidirectional Line-Switched
Rings (BLSR)
• Operate at the line layer
• Protection bandwidth can be used to carry low-
priority traffic during normal operation
• Allow protection bandwidth to be shared between
non-overlapping connections
• Widely deployed in long-haul and interoffice
networks
– Most metro carriers have deployed BLSR/2s
– Many long-haul carriers have deployed BLSR/4s
10
Bidirectional Line-Switched
Rings (BLSR)
• Handling node failures
– The failure of a node is seen by all its adjacent nodes as
link failures
– Errors can occur if each of the adjacent nodes performs
restoration assuming single link failure
– Solution:
• Nodes adjacent to the failed node exchange messages to
determine if they have both recorded link failures
• If so, don’t restore any traffic that originates or terminates at
the failed node (squelching)
• Slower restoration time
11
Ring Interconnection
• Simple way: connect the drop sides of two ADMs
on different rings back to back
– The interconnection is broken if one of the ADMs fails
or the link between the two ADMs fails
• Solution: dual homing
– Use two hub nodes to perform interconnection
– Connections are setup between the originating node and
both the hub nodes using the drop-and-continue feature
in the ADMs
12
Protection in IP Networks
• Slow failure detection
– Adjacent routers send hello packets every 10 sec and
declare the link down if miss 3 successive hello packets
• Slow failure restoration
– IP uses dynamic, hop-by-hop routing of packets based
on the routing table maintained by the routers
– When a failure occurs, the routing protocol updates the
routing table at each router in a distributed manner
• Routing table convergence time: several seconds
• During convergence, packets could be lost or loop within the
network
13
Protection in IP Networks
• Use Multi-protocol label switching (MPLS) to
achieve faster restoration
• MPLS allows label-switched paths (LSPs) to be
set up between nodes
– Packets can be sent along the LSPs
• Protection schemes can be implemented within the
MPLS layer
– E.g., precompute a backup LSP for each working LSP,
reroute packets onto the backup LSP when a working
LSP fails

More Related Content

Similar to Survivability-2.ppt

Multicast in computer Architecture
Multicast in computer ArchitectureMulticast in computer Architecture
Multicast in computer ArchitectureDinesh Kumar
 
Internetworking devices(networking)
Internetworking devices(networking)Internetworking devices(networking)
Internetworking devices(networking)welcometofacebook
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
deawoo Kim
 
Unit 3_Network Layer_Part II.pptx
Unit 3_Network Layer_Part II.pptxUnit 3_Network Layer_Part II.pptx
Unit 3_Network Layer_Part II.pptx
HODElex
 
Circuit switched network in Optical Fiber Communication
Circuit switched network in Optical Fiber CommunicationCircuit switched network in Optical Fiber Communication
Circuit switched network in Optical Fiber Communication
Tanvir Amin
 
Unit 33-routing protocols for wsn
Unit 33-routing protocols for wsnUnit 33-routing protocols for wsn
Chapter 2 Switches in network.ppt
Chapter 2 Switches in network.pptChapter 2 Switches in network.ppt
Chapter 2 Switches in network.ppt
monikarawat57
 
lect10_interconnect.ppt
lect10_interconnect.pptlect10_interconnect.ppt
lect10_interconnect.ppt
p096309MuhammadIshaq
 
Ec 2401 wireless communication unit 4
Ec 2401 wireless communication   unit 4Ec 2401 wireless communication   unit 4
Ec 2401 wireless communication unit 4
JAIGANESH SEKAR
 
Switch networking
Switch networking Switch networking
Switch networking
MohikaJamadari
 
Unit 4_Network Layer_Part II.pptx
Unit 4_Network Layer_Part II.pptxUnit 4_Network Layer_Part II.pptx
Unit 4_Network Layer_Part II.pptx
HODElex
 
Optical line protection switch and Active Fiber Monitoring System
Optical line protection switch and Active Fiber Monitoring SystemOptical line protection switch and Active Fiber Monitoring System
Optical line protection switch and Active Fiber Monitoring System
Subash Chandra Pakhrin
 
Intro to DTN and routing classification
Intro to DTN and routing classificationIntro to DTN and routing classification
Intro to DTN and routing classification
Shivi Shukla
 
Lecture 7
 Lecture 7 Lecture 7
Switching
SwitchingSwitching
Switching
Rishabh Kushwaha
 
MobileAdHocRoutingProtocols.pptx
MobileAdHocRoutingProtocols.pptxMobileAdHocRoutingProtocols.pptx
MobileAdHocRoutingProtocols.pptx
HirazNor
 

Similar to Survivability-2.ppt (20)

Multicast in computer Architecture
Multicast in computer ArchitectureMulticast in computer Architecture
Multicast in computer Architecture
 
Internetworking devices(networking)
Internetworking devices(networking)Internetworking devices(networking)
Internetworking devices(networking)
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Unit 3_Network Layer_Part II.pptx
Unit 3_Network Layer_Part II.pptxUnit 3_Network Layer_Part II.pptx
Unit 3_Network Layer_Part II.pptx
 
Circuit switched network in Optical Fiber Communication
Circuit switched network in Optical Fiber CommunicationCircuit switched network in Optical Fiber Communication
Circuit switched network in Optical Fiber Communication
 
Unit 33-routing protocols for wsn
Unit 33-routing protocols for wsnUnit 33-routing protocols for wsn
Unit 33-routing protocols for wsn
 
Network
NetworkNetwork
Network
 
Chapter 2 Switches in network.ppt
Chapter 2 Switches in network.pptChapter 2 Switches in network.ppt
Chapter 2 Switches in network.ppt
 
lect10_interconnect.ppt
lect10_interconnect.pptlect10_interconnect.ppt
lect10_interconnect.ppt
 
Ec 2401 wireless communication unit 4
Ec 2401 wireless communication   unit 4Ec 2401 wireless communication   unit 4
Ec 2401 wireless communication unit 4
 
Switch networking
Switch networking Switch networking
Switch networking
 
Unit 4_Network Layer_Part II.pptx
Unit 4_Network Layer_Part II.pptxUnit 4_Network Layer_Part II.pptx
Unit 4_Network Layer_Part II.pptx
 
Optical line protection switch and Active Fiber Monitoring System
Optical line protection switch and Active Fiber Monitoring SystemOptical line protection switch and Active Fiber Monitoring System
Optical line protection switch and Active Fiber Monitoring System
 
Intro to DTN and routing classification
Intro to DTN and routing classificationIntro to DTN and routing classification
Intro to DTN and routing classification
 
Lecture 7
 Lecture 7 Lecture 7
Lecture 7
 
Switching
SwitchingSwitching
Switching
 
Manet
ManetManet
Manet
 
Manet
ManetManet
Manet
 
MobileAdHocRoutingProtocols.pptx
MobileAdHocRoutingProtocols.pptxMobileAdHocRoutingProtocols.pptx
MobileAdHocRoutingProtocols.pptx
 
Sonet
SonetSonet
Sonet
 

Recently uploaded

Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
MuhammadTufail242431
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
PrashantGoswami42
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 

Recently uploaded (20)

Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 

Survivability-2.ppt

  • 1. 1 Protection in SONET • Path layer protection scheme: operate on individual connections • Line layer protection scheme: operate on the entire set of connections at once
  • 2. 2 Protection in SONET • Point-to-Point Links – 1+1 protection – 1:1 protection – 1:N protection • Self-healing rings – Unidirectional path-switched rings (UPSR) – Four-fiber bidirectional line-switched rings (BLSR/4) – Two-fiber bidirectional line-switched rings (BLSR/2) • Ring interconnection – Dual homing
  • 3. 3 Point-to-Point Links • 1+1 protection – Traffic transmitted simultaneously on two separate fibers from the source to the destination – Destination simply selects one of the two fibers for reception – Fast protection – Require no signaling protocol between the two ends
  • 4. 4 Point-to-Point Links • 1:1 protection – Traffic transmitted over only the working fiber – If the working fiber is cut, the source and destination both switch over to the protection fiber – An APS protocol is required – Not as fast as 1+1 protection • Advantages over 1+1 protection – Under normal operation, the protection fiber can be used to transmit lower-priority traffic – Can extend to 1: N protection where N working fibers share a single protection fiber
  • 5. 5 Self-Healing Rings • A ring is the simplest topology that is 2- connectedresilient to failures • Much of the carrier infrastructure today uses SONET rings called self-healing rings – Can automatically detect failures and reroute traffic away from the failed links/nodes rapidly (within 60ms) • Three ring architectures: UPSR, BLSR/4, BLSR/2 – Unidirectional ring: carry working traffic in only one direction of the ring – Bidirectional ring: carry working traffic in both directions
  • 6. 6 Unidirectional Path-Switched Rings (UPSR) • Two fibers: one working and one protection • Traffic transmitted simultaneously on the working fiber in the clockwise direction and on the protection fiber in the counter clockwise direction • For each connection, destination node monitors both the working path and the protection path and selects the better signal • Traffic switch-over done on a connection-by- connection basis • Essentially path layer 1+1 protection
  • 7. 7 Unidirectional Path-Switched Rings (UPSR) • Simple to implement • Require no communication between the nodes • Protection capacity = working capacity • No sharing of the protection bandwidth between connections – Each bidirectional connection uses up capacity on every link in the ring and has dedicated protection bandwidth • Popular in access networks
  • 8. 8 Bidirectional Line-Switched Rings (BLSR) • Working traffic carried on both directions • Four-fiber BLSR (BLSR/4) – Two working fibers and two protection fibers – Employ both span switching and ring switching • Span switching: when a transmitter or receiver on a working fiber fails, the traffic is routed onto the protection fiber between the two nodes on the same link • Ring switching: in case of a fiber cut, the traffic is rerouted around the ring on the protection fibers • Two-fiber BLSR (BLSR/2) – Two fibers, both carry working traffic, half the capacity on each fiber reserved for protection purposes – Employ ring switching, not span switching
  • 9. 9 Bidirectional Line-Switched Rings (BLSR) • Operate at the line layer • Protection bandwidth can be used to carry low- priority traffic during normal operation • Allow protection bandwidth to be shared between non-overlapping connections • Widely deployed in long-haul and interoffice networks – Most metro carriers have deployed BLSR/2s – Many long-haul carriers have deployed BLSR/4s
  • 10. 10 Bidirectional Line-Switched Rings (BLSR) • Handling node failures – The failure of a node is seen by all its adjacent nodes as link failures – Errors can occur if each of the adjacent nodes performs restoration assuming single link failure – Solution: • Nodes adjacent to the failed node exchange messages to determine if they have both recorded link failures • If so, don’t restore any traffic that originates or terminates at the failed node (squelching) • Slower restoration time
  • 11. 11 Ring Interconnection • Simple way: connect the drop sides of two ADMs on different rings back to back – The interconnection is broken if one of the ADMs fails or the link between the two ADMs fails • Solution: dual homing – Use two hub nodes to perform interconnection – Connections are setup between the originating node and both the hub nodes using the drop-and-continue feature in the ADMs
  • 12. 12 Protection in IP Networks • Slow failure detection – Adjacent routers send hello packets every 10 sec and declare the link down if miss 3 successive hello packets • Slow failure restoration – IP uses dynamic, hop-by-hop routing of packets based on the routing table maintained by the routers – When a failure occurs, the routing protocol updates the routing table at each router in a distributed manner • Routing table convergence time: several seconds • During convergence, packets could be lost or loop within the network
  • 13. 13 Protection in IP Networks • Use Multi-protocol label switching (MPLS) to achieve faster restoration • MPLS allows label-switched paths (LSPs) to be set up between nodes – Packets can be sent along the LSPs • Protection schemes can be implemented within the MPLS layer – E.g., precompute a backup LSP for each working LSP, reroute packets onto the backup LSP when a working LSP fails