SDH Protection
OMS 1410 offers a range of different PDH and SDH protection schemes: • Service Module Equipment Protection • 1+1 Multiplex Section Protection (MSP) • 1+1 Linear MSP • Sub Network Connection Protection SNCP

1.1 1+1 Linear MSP
OMS 1410 offers 1+1 linear MSP on all STM-n interfaces. The following rules apply for the 1+1 MSP protection: • • • • Protection can only be enabled between two ports of the same STM-n type Protection can be enabled between two ports on the same module Protection can be enabled between two ports located on different modules of the same type (SC-SC or SM-SM) Protection cannot be enabled between a port on a service module and a port on an SC module

The 1+1 MSP functionality is in accordance with ITU-T G.841, Clause 7.1. The following parameters are configurable on an MSP object: • • • • Enabled/disabled Mode, unidirectional or bidirectional Operation Type, revertive or non-revertive WTR (Wait to Restore) time, configurable from 0-15 minutes, default 5 minutes

The protocol used for K1 and K2 (b1-b5) is defined in ITU-T G.841, Clause The protocol used is 1+1 bidirectional switching, compatible with 1:n bidirectional switching.

1.2 MSP
The MSP function provides protection for the STM-n signal against channel associated failures within a multiplex section. All possible options specified for the Multiplex Section Protection (MSP) Protocol (bytes K1 and K2), as defined in ITUT/G.783, are used. The following criteria may be used at the receive end for switching to the protection path: • Signal Fail (SF) (LOS, LOF, MS-AIS or MS-EXC) at section level • Signal Degrade (SD) - USE (Default) - CDEG - BER (DEG - that is, bit error rate exceeds a pre-set threshold in the range of 10-5 to 10-9) • Command from the LCT or from the network management system

2. .841 Clause 8. The protection algorithm is implemented according to ITU-T G. configurable from 0-10s in 100ms steps. revertive or non-revertive • Hold-off time.1.841 Clause 8. default 5 minutes The application architecture supported is 1+1 unidirectional switching according to ITU-T G.3 SNCP OMS 1410 supports two types of SNCP: • SNC/I (Sub Network Connection Protection with Inherent monitoring) and • SNC/N (Sub Network Connection Protection with Non-intrusive monitoring) SNCP is supported for the following layers: • VC-12 • VC-3 • VC-4 • VC-4-4c The SNCP functionality is in accordance with ITU-T G. The switch initiation criteria are implemented as described in ITU-T G.841 Clause 8. A larger number of SNCP instances may be configured.3. but in that case the switching time may exceed 50ms. configurable from 0-15minutes. It is possible to switch up to 504 (such as 2 x STM-4 structured in VC-12) SNCP instances within 50 ms. default 0s • WTR time.841 Clause 8.4.6. The following parameters are configurable on an SNCP object: • Enabled/disabled • Operation Type.

2. the following are supported: • STP • Rapid Spanning Tree Protocol (RSTP).2.2 Link Aggregation Link Aggregation technology. In OMS 1410.1D • Multiple STP (MSTP). that is. The following behavioral terms are used: • • Manual Platform Link Aggregation. The OMS 1410 uses a load-balancing scheme based on the combination of destination MAC address and VLAN ID.Up to 16 spanning tree instances (MSTIs) are supported. LACPs are supported to allow peering nodes to reach a common agreement automatically on valid LAG link constructs. LACP not supported. LACP allows . Link 2 and Link 3 are defined as a LAG. Multicast traffic and broadcast traffic will always be allocated to only one of the links. LAGs are independently configured at each peering node. which is an integrated link in logic.1 Spanning Tree Protocol Spanning Tree Protocol (STP) is a Layer 2 link management protocol that provides path redundancy while preventing loops in the network. that is. The physical links between switches. The term used for this behavior here is Dynamic Layer 2 Link Aggregation. Accordingly. according to IEEE 802. LAGs are independently configured at each peering node. also called trunking or bonding. this procedure is fast and switches the traffic from the link out of operation in less than one second.3 Link Aggregation Control Protocol (LACP) LACP is used by the nodes on either end of a LAG to automatically monitor and maintain adjoining LAG links between them. according to IEEE 802. Note that traffic for one source will always use one link to prevent the frames being mis-ordered. This group of links is called a Link Aggregation Group (LAG). LACP can be used to dynamically create/delete LAGs and dynamically assign links to LAGs. Link 1. LACP allows you to specify exactly which links in a system may be validly aggregated with other links to form LAGs and LAG links with other peering systems.8032v2.1D . When LAG is used in an aggregation group. It can also switch links between different LAGs. Contrary to STP. Ethernet Protection OMS 1410 supports following Ethernet protection technologies in this release: • Spanning Tree Protocol including RSTP and MSTP • Link Aggregation including LACP • Ethernet Ring protection based on ITU-T G. is essentially combining multiple physical links between two devices into one logical path as shown in the below figure. Manual Layer 2 Link Aggregation. 2. the link members work as backup for each other dynamically and when for instance one link fails the other will take over the traffic. 2. and its internal details are invisible to the upper layer entity.

OMS 1410 nodes can support both LAN and WAN LAGs. Multiple rings are supported with up to 16 nodes per ring at 50ms protection switching performance or up to 256 nodes with longer protection switching. according to each link’s configuration and status. The OMS 1410 architecture supports service modules that provide Ethernet ports. synchronized manner.4 Ethernet Ring Protection OMS 1410 Release 2. The Link Aggregation system can support up to 60 LAGs. Dynamic Layer 2 Link Aggregation. The Ethernet-over-SDH service capability of mapper service modules uses generic GFP and VCAT functionality to deliver Ethernet transport over SDH VCGs. LAG constructs can be configured from link ports across different service modules.• nodes to promote and demote assigned LAG links to and from traffic carrying activity in a controlled. In ERPS there is a central node called the Ring Protection Link (RPL) owner. that is. RPL uses control messages called R-APS to coordinate the activities of switching on/off the RPL link. All of these are LAN native Ethernet Ports. using up to 120 link ports. 2. . however a mix of LAN and WAN ports is not allowed in the same LAG. These functions provide specializations of logical Ethernet ports and are WAN Ports. LACPs are then used to dynamically create/delete valid LAG constructs and dynamically assign valid links to LAGs or even switch links between different LAGs based on the configured parameters. any one LAG instance may support up to eight member ports. The link that gets blocked by the RPL owner is called the Ring Protection Link or RPL. which blocks one of the ports in the ring to make sure that there are no loops formed for the Ethernet traffic.0 manual platform link aggregation and manual Layer 2 Link Aggregation by L2 LACP protocol support.8032v2.0 supports Ethernet Ring Protection Switching (ERPS) based on ITU-T G. allows configuration of link aggregation validation parameters for each link in a LAG. However. ERPS provides protection switching for Ethernet traffic in a ring topology and at the same time making sure that there are no loops formed at the Ethernet layer. OMS 1410 at Release 1.

2 Forced Switch This command forces a protection switch regardless of status of the modules involved. OMS 1410 offers 1:1 protection groups for the following types of modules: • 63xE1 service module • 6xE3/T3 service module • 8xSTM service module in 4xSTM-1 mode The service modules are protected with the help of the expansion modules. both electrical and optical interface modules may be used. In case of a switch request based on a module fail.3 Service Module Equipment Protection OMS 1410 offers 1:1 equipment protection. The protection switch algorithm operates as fast as possible and guarantees a switching time of less than 50ms. The protection switching is controlled from the active SC module. that is in 4xSTM-1 mode.1 Clear This command clears all the externally initiated commands listed in the table above. Note: When the 8xSTM module is equipment protected. Table 2: Switch Request and Priority Switch Request/State Order Of Priority 1 Clear 2 Forced switch 3 Module fail 4 Manual switch The different switch requests and switch states have the following implementation: 3. The working modules are placed in the lower slots and the protection modules are placed in the slots above the working modules. The physical electrical interfaces are mounted on the expansion modules. The protection groups are only valid for 1:1 protection. the protection structure is outlined in the following table. the switching time is less than 50ms. Table 1: Protection Structure Working Module 3 4 Protecting Module 5 6 A protection switch may occur based on a module failure or an activated command from the operator. The protection switching is also performed in the expansion modules. Only non-revertive switching is supported. The electrical interfaces for FE and GE are not protected with equipment protection and must be protected in the same way as for the optical service modules. 3. . The switching criteria and the priority levels are outlined in the following table.

3 Module Fail Module fail is a module state that indicates that the module is not able to carry traffic. .4 Manual Switch A manual switch command forces a protection switch unless the protection module is in a module fail state.3. Such a state under normal conditions causes a protection switch unless one of the following cases is true: • Forced switch command is active • Protection module is in module fail state 3.