You are on page 1of 34

PTN Protection Subject

V1.0
Contents

 PTN Protection Type


 PTN Protection Principle and Application
 PTN Protection Summary
PTN Protection Classification
PTN
Protection

Network-Level Port-Level Card-Level


Protection Protection Protection
Linear protection

PW dual-homing

LAG protection
Ring network

TPS protection
IMA protection
protection

protection

protection
protection

Card 1+1
Subnet

Note: The network-level protection here can be nested to meet more


complicated networking protection demands.
Contents

 PTN Protection Type


 PTN Protection Principle and Application
 PTN Protection Summary
PTN Protection Principle and Application

 Card-Level Protection
 Card 1+1 protection
 TPS protection
 Port-Level Protection
 LAG protection
 IMA protection
 Network-Level Protection
 Linear protection
 Subnet protection
 Ring network protection
 PW dual-homing protection
Card-Level Protection
 Card protection application

Redundant Convergence
Core node Access node
unit node
Switching n+1/1+1 1+1 N/A or 1+1

Main control 1+1 1+1 N/A or 1+1

Clock 1+1 1+1 N/A or 1+1

Power 1+1 1+1 N/A or 1+1

Fan 1+1 1+1 N/A or 1+1


Card-Level Protection
 Card protection description
 Currently, the main control of 6200/6300/9000 is in a
1+1 protection mode.
 The power of 6000 is in a 1+1 protection mode.
 The AC power of 9000 is in a 2+1 protection mode.
The DC power is in a 1+1 protection mode.
 The TPS on 6300 is in a 1:2 protection mode which is
achieved on Slot1 and Slot2. Two cards inserted in the
slots are E1 interface cards. In the low-speed slot is
the E1 processign card whose protection will be
provided in 6300 version 2.0.
PTN Protection Principle and Application

 Card-Level Protection
 Card 1+1 protection
 TPS protection
 Port-Level Protection
 LAG protection
 IMA protection
 Network-Level Protection
 Linear protection
 Subnet protection
 Ring network protection
 PW dual-homing protection
Port-Level Protection - LAG Protection
SR RNC

 LAG Protection Scenario GE/FE : LAG protection


STM-1: MSP protection
LAG
Application protection
Protection type
Scenario
core layer
LAG protection
PTN and RNC 10GE
(Active/standby/load sharing)
MSTP
PTN and SR/Switch LAG protection (load sharing)
ADM

Interconnection
between PTN and MSP protection/LAG protection GE/FE : LAG protection
STM-1: MSP protection
MSTP Convergence
layer
10GE
The LAG port protection provides the port
LAG
redundancy protection of the Ethernet protection

service between the PE node of the PTN and Access layer


GE
Protection path
the service node. This protection mode is
commonly used for the user side port. Work path
Port-Level Protection - LAG Protection
Mode1: Active/standby mode; when the
active/standby LAG mode is adopted, traffic is
transmitted only on one port, namely on the
active port rather than the standby port.

Wave
Wave division
division

Mode2: Load sharing mode; in this case, traffic is uniformly


allocated on two ports for transmission.The way of
distinguishing the traffic can be based on the destination IP
address or the destination MAC address, and the source
MAC address. The load sharing mode can support 2 - 16
ports. Currently, the load sharing mode is commonly used
for protection on the UNI port.
Port-Level LAG Protection Switchover
Principle
 The LAG protection can be divided into two
modes: Static and Dynamic.
 In the static mode you need to manually assigns
the physical ports to be aggregated. The dynamic
mode is based on the IEEE802.3ad protocol,
determining ports to be aggregated according to
the protocol.
 Generally, we use the static mode.
Port-Level LAG Protection Switchover
Principle
 When shall we configure the static or dynamic
mode?
 Depends on the mode supported by the opposite end.
 If the opposite end is configured as the static mode,
the ZTE equipment must also be configured as the
static mode.
 If the opposite end is configured as the dynamic
mode, the ZTE equipment must also be configured as
the dynamic mode.
Port-Level Protection - IMA Protection
 What is IMA?
 Inverse Multiplexing for ATM
 Based on cells, the ATM cell stream is inversely
multiplexed to multiple low-speed links for
transmission; then on the remote end, the cell streams
of multiple low-speed links are joined to restore the
ATM cell stream same as the orignal one.
Port-Level Protection - IMA Protection
 What characteristics of the IMA technology are?
 IMA can multiplex multiple low-speed links, achieving
the transmission of the ATM cell stream on the high-
speed broard, and improving the link efficiency and
transmission reliability through the statistical
multiplexing.
Port-Level Protection - IMA Protection
 What is IMA protection?
 The IMA protection means: If a link in an IMA group is
invalid, the cells will be shared by other normal links
for transmission, thus to achieve the service protecion.
Port-Level Protection - IMA Protection
 IMA Transmission Diagram
IMA group IMA group
E1 interface E1 interface

E1 interface E1 interface

ATM cell stream ATM cell stream


E1 interface E1 interface

Node A Node Z

IMA virtual link

 The IMA group ends at the end of each IMA virtual connection. In the sending
direction, the cell stream received from the ATM layer, based on cells, is distributed to
multiple physical links in the IMA group. However, at the receiving end, the cells
received from different physical links, based on cells, are re-joined to a cell stream
same as the original cell stream.
PTN Protection Principle and Application

 Card-Level Protection
 Card 1+1 protection
 TPS protection
 Port-Level Protection
 LAG protection
 IMA protection
 Network-Level Protection
 Linear protection
 Subnet protection
 Ring network protection
 PW dual-homing protection
Network-Level Protection: 1+1/1:1 Linear
Protection Switcehr
ov e
d
no
BRAS
Residential

Business SR

BSC/RNC
BTS/NodeB

aGW
E-NB
itch
Sw er
ov e Work path
d
no Protection path
 Switchover principle: The PE node detects the TMP-layer OAM packet and sends the OAM detection frame every 3.3ms. If
the remote CC packet fails to be received in 3.5 cycles at the local end, the tunnel protection switchover is triggered.
 The switchover point and the bridge point are both PE node.
 In 1:1 single-send-single-receive mode, the APS protocol is applied for bi-directional switchover, supporting any service
types; commonly used in current network
 In 1+1 dual-send-dual-receive mode, the selective receiving port is the default work port. Both the local port and the remote
port support the uni-directional switchover and the P2P services.
Network-Level Protection: 1+1/1:1 SNC
Subnet Protection Switcehr
ov e
d
no

BRAS
Residential

Business SR

BSC/RNC
BTS/NodeB

aGW
E-NB

i tch
Sw e r Work path
ov e
d Protection path
no
 Most of the characteristics are the same as those of the linear protection.
 The difference is that the switchover point and the bridge point can be P node or PE node.
 Commonly used in interconnection with other manufacturers' equipment and only protects ZTE equipment.
 Also applied in a rign-chain networking mode; configures subnet protection at the connection point of the ring-chain
network.
Linear and Subnet Protection Switchover
Principle
 Prerequisite: Continuously sending CC packet
detection should be ensured and the tunnel
connectivity should be protected.
If the 1+1 protection of the APS When the 1:1 protection of the APS
protocol is not enabled, the APS protocol is enabled,
packets between switchover nodes The APS packets are to be transmitted
are not transmitted, namely, the between the service switchover nodes,
remote end does not trigger the advising the opposite party of its own
switchover at the local end through switchover status.
the APS packet. Switchover is divided as Locally
The local end performs switchover Triggered Switchover, and Remotely
only on the receiving port. The Triggered Switchover.
switchover is performed based on the The switchover basis and the priorities
received alarms and the related are the same as those in 1+1 protection
commands. mode.

Switchover priority of linear protection:


LP (Lock Protection) >SF-P (Signal Failure-Protection)>FS (Force Switchover)>SF
(Signal Failure) >SD (Signal Deterioration) >MS (Manual Switchover)
Note: The above situation describes that when the signalof the protection channel fails, and the protection lock
command is not executed previously, the system may trigger the selective receiving channel to switch over to
the work channel.
Linear APS Packet Details

Type (Hex) Name


01 CV
02 FDI
Byte segment format of the linear
20 LBR APS information
21 LBM
23 LCK
25 TST
27 APS
28 SCC
29 MCC
LMR
2B LMM
2D 1DM
2E DMR
DMM
30 EXR
31 EXM
32 VSR
33 VSM
35 SSM
37 CSF
Linear APS Packet Details First byte b1 - b4 request/state
1111
LP
1110
SF-P
1101
FS
1100
SF
1010
SD
1000
MS
0110
WTR
0100
EXER
0010
RR
0001
DNR
0000
NR
Others Reserved

First byte: b5 - b8 Protection type


b5 0 indicates no APS channel; 1 indicates the
APS channel
b6 0 indicates 1+1 protection; 1 indicates 1:1
protection
b7 0 indicates uni-directional protection; 1
indicates bi-directional protection
b8 0 indicates no return; 1 indicates return
Second and third byte b1 - b8 indicate request signal and bridge signal respectively
0 indicates no signal
1-254 indicates normal service
255 indicates no protection signal
Fourth byte b1 - b8 reserved
Network-Level Protection: Ring Network
Protection

NE1 NE2 NE3 OAM


OAM service
service flow
flow
(TMP)
(TMP)
of
of LSP1:1
LSP1:1
Work tunnel: TMP1
Protection tunnel:
TMP2 OAM
OAM service
service flow
flow
(TMS)
(TMS)
Protection route: ---- of
of ring
ring network
network
protection
NE6 NE5 NE4 protection

Switchover Switchover The node where failure is detected


node node sends a request through APS to the
adjacent node. When a node detects
failure or receives an APS request
from other nodes, the service sent to
NE1 NE2 NE3 the failed Span is switched over to a
reverse direction (away from the
defect). The service reaches another
switchover node along the longer
path, and then re-switched over to the
work direction.

NE6 NE5 NE4


Ring Network Protection Switchover Principle
 Switchover principle analysis: The OAM packet of TMS is
detected. The switchover node is the connection point
where failures occur. To switch over the faulty point is to
switch over the service tunnel to the ring protection
tunnel.
 Ring Netwok protection needs to allocate an APS-ID to
each node. Similar to the multiplexed segment protection
in SDH, the sent APS packet contents include the faulty
point, launching point, the detailed switchover request,
and the switchover status at this point.
 OAM saves costs and bandwidth. The device load is less
heavy. When LSP>=1000, OAM adopts the LSP1+1
protection mode. The total bandwidth of OAM is
1000*0.2=200M. If OAM adopts the ring network
protection mode, the OAM bandwidth is 1*0.2=0.2M.
Ring Network Protection Switchover Principle
Prerequisite for ring network Correponding methods for
protection achievement

A fault detection system should


exist between every two nodes on Enable the CC detection function
the ring.
Each station on the ring is alloted with an
The node on the ring responds to the APS ID, considering the fault originating
fault timely, advising the opposite node and the destination adjacent node
end of the fault. when connecting the APS packets. The
destination node responds to the request
and performs the switchover.
1. TMPLS OAM performs protection on the neighbors on the ring network.
2. When TMPLS OAM finds a failure between neighbors, it advises the APS module on this node to send the APS
switchover packets simultaneously in two directions of the ring.
3. When the node on the ring receives the APS switchover packets and finds that the destination node is not itself, it
forwards the packets directly to its neighbor; When the node finds that the destination node is itself, and that the
source node is its neighboring node, it knows that the link between itself and the source node is down. Therefore,
the APS module advises the TMPLS OAM module to perform switchover.
4. In some special case that the singal on some middle node fails, switchover is performed on both ends of the
disconnected services according to SF.
Ring Protection Packet Description
Byte segment format of the ring APS
information :

Byte segment format of the ring APS information

Request codes of ring protection


Bridge Request

Switchover priorities of ring network


protection: LP>FS>SF>MS
Network-Level Protection: PW Dual-Homing
Protection
RNC
Dual-homing protection is a protection Broken
fiber2
mechanism that combines the LSP 1:1/1+1 path Work tunnel path Protection tunnel path

protection and PW protection. Protection PW

Description for nesting protection mode: 10 GE


The work PW is borne on a tunnel protection group (to convergence
protect the internal network fault); The protection PW is ring
borne on a tunnel.

:Work tunnel of the work PW

GE a
:Protection tunnel of the work PW

ring
ccess
:Bearer tunnel of the protection PW

Note: At this moment, if RNC adopts the active/standby


mode, the ZTE equipment PW chooses the 1:1 Broken
configuration mode. fiber1
If RNC adopts the load sharing mode, the ZTE equipment
PW chooses the dual-receive-singel-send mode.

Broken fiber1: belongs to an internal failure of the PTN network; TMP-LOC


triggers the tunnel switchover.

Broken fiber2: belongs to a failure between PTN and the service-side


network layer; TMC-CSF triggers the PW switchover.
Specific Descriptions for PW Dual-Homing
Protection Switchover
 Key knowledge points on PW dual-homing
protection
Key knowledge point 1:
For the case that RNC adopts the LAG active/standby mode:
The active PW and the tunnel protection should exist at the same time to prevent the broken fiber inside the PTN network,
however, at this moment, RNC does not perform switchover. The internal PTN network still can switch the service over to
the active receiving node, ensuring that the service is not interrupted.
Key knowledge point 2:
For the case that RNC adopts the LAG load-sharing mode:
The node that selectively receives PW adopts the dual-receive-single-send mode. For a base station, the LAG load
sharing of RNC is branched out based on the BS IP addresses. Therefore, the node also adopts the singel-receive mode
for a BS service stream. In this case, do not adopt the tunnel protection.
Key knowledge point 3:
The PW dual-homing protection switchover does not depends on APS for switchover other than the LOC and CSF
switchover on the local end. The difference between 1:1 and 1+1 only lies in single receiving or dual receiving.
Key knowledge point 4:
The dual-send-dual-receive mode is an earlier application which is no longer adopted. The dual-receive-single-send mode
is temporarily not much used on site.
Key knowledge point 5:
If the active PW of the PW dual-home is to bind the tunnel protection group, this protection group must be configured as
1:1 LSP protection.
Contents

 PTN Protection Type


 PTN Protection Principle and Application
 PTN Protection Summary
PTN Protection Summary
 Protection Status Description
 Key-Point Summary for Protection Configuration
 Protection Switchover Status Query
Protection Status Description
 SF: SF in the PTN network is detected by the OAM packet. Therefore, when
LOC or the mismerged, defective and mismatched MEP occurs on the local
device, it is considered that the service signal received by the device fails.
 SD: The SD in the PTN network is achieved by the pre-activated LM that
detects the service packet loss rate either on the TMS layer or on the TMP
layer. The near-end packet loss rate and the remote-end packet loss rate are
used to compute ES/SES/UAS. If the packet loss rate is greater than 0,
compute ES. If the packet loss rate is greater than 30%, compute SES.
 Hold-off switchover: In some cases, the switchover is not expected to be
performed once a fault occurs. Instead, we need to wait a while to confirm
whether the fault is still there before performing switchover. This process is
called the hold-off switchover. The waiting time is called the switchover hold-
off time. This situation is commonly used for the PW protection to configure
the hold-off time (step length: 100ms) when the tunnel protection and the
PW protection co-exist.
 Lock protection: No matter whether the active/standby channel is normal, the
data are sent or received on the active channel regularly.
 Force switch: When the stanby channel is normal, no matter whether the
active channel is normal, switch over to the active channel to receive data.
Key-Point Summary for Protection
Configuration
PW dual-homing protection Ring network protection configuration
Linear/subnet protection

TMP OAM configuration of work OAM configuration of the TMS configuration


protection active/standby TMC (select
CSF Insert and Extract)

TMS OAM MEG configuration


Configuration of tunnel linear
protection group Configure PW protection group
on the protected node
TMRP configuration (enable APS)
Note: Currently, these two
procedures of the linear
protection and the subnet Ring tunnel configuration (one work
protection are conbined. LAG port protection tunnel corresponds to one ring
Here the difference of the linear tunnel)
and subnet configuration lies in
Configure smartgroup.
the configuration in OAM and
the protection group. Select the running status (static Ring protection group configuration
The MEG mode of the tunnel in or dynamic) and the bound Configure PE node once (one
the linear configuration is END. physial port of the smartgroup;
The MEG mode of the tunnel in
direction on protection ring)
configure the smartgroup type Configure P node twice (two
the subnet protection group is
TCM.
(active/standby, or load sharing). directions on protection ring)
Protection Switchover Status Query
 Commonly used query command for the  Commonly used query command for the ring
linear protection switchover: protection switchover:
 ZXR10(config)#show aps protect-config 1  ZXR10(config)#show aps mepg-config 1
 TMRP id:1
 Protect group id: 1
 Active state: active
 Active state: active
 running mode: network <- Default: network;
 Running mode: network
If it is local, it indicates that the APS packets
 APS current state: SIGNAL_FAIL_P <- are not to be sent.
indicating that the SF alarm occurs on the  Aps-id: 1, east-aps-id: 2, west-aps-id: 3
protection tunnel.  East-tms:1, switch: null
 request bridge type: no switched  West-tms: 2, switch: null
 Protect mode:revertive, WTR time:1(min)  Ring switch mode: standard <- Default:

 Protect switch:clear standard; other other values


 Ring APS state: SWITCHING_SF of east tms
 Hold-off time:0(ms)
<- The red part indicates that the SF alarm
occurs on the eastward TMS.
 request bridge type: switched
 WTR time:1(min)
 Hold-off time:0(ms)

You might also like