UNDERSTANDING ETHERNET RING PROTECTION SWITCHING FOR CARRIER NETWORKS

Similar documents
WIRELESS IN THE METRO PACKET MICROWAVE EXPLAINED

G.8032 Ethernet Ring Protection Overview. March, 2008 ITU-T Q9 SG 15

Ethernet Ring Protection for Carrier Ethernet Networks

APPLICATION-AWARE ROUTING IN SOFTWARE-DEFINED NETWORKS

Data Communication Networks and Converged Networks

CONTROL LEVEL NETWORK RESILIENCY USING RING TOPOLOGIES. Joseph C. Lee, Product Manager Jessica Forguites, Product Specialist

Ethernet Fabrics: An Architecture for Cloud Networking

Failsafe Protection for Utility Critical Infrastructure

EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE

Industrial Ethernet How to Keep Your Network Up and Running A Beginner s Guide to Redundancy Standards

Systems Integration Track: Network Topology

Virtual PortChannels: Building Networks without Spanning Tree Protocol

CHAPTER 10 LAN REDUNDANCY. Scaling Networks

Chapter 3. Enterprise Campus Network Design

How To. Configure Multiple Spanning Tree Protocol (MSTP) Introduction. Overview of MSTP. Extension of RSTP

Solutions Guide. High Availability IPv6

Leveraging the Industrial Internet of Things (IOT) to Optimize Renewable Energy

Adapting MPLS Fast Reroute to Create Resilient Rings

Network Structure or Topology

Redundant Serial-to-Ethernet Data Connections for Mission-critical Devices

Resiliency in Ethernet Based Transport Networks

Infrastructure Components: Hub & Repeater. Network Infrastructure. Switch: Realization. Infrastructure Components: Switch

The functionality and advantages of a high-availability file server system

OAM Operations Administration and Maintenance

TRILL for Service Provider Data Center and IXP. Francois Tallet, Cisco Systems

Data Center Networking Designing Today s Data Center

Switching in an Enterprise Network

Solutions Guide. Resilient Networking with EPSR

Dell PowerVault MD Series Storage Arrays: IP SAN Best Practices

Multi-Chassis Trunking for Resilient and High-Performance Network Architectures

VMware Virtual SAN Network Design Guide TECHNICAL WHITE PAPER

WHITE PAPER. Copyright 2011, Juniper Networks, Inc. 1

DEMYSTIFYING ROUTING SERVICES IN SOFTWAREDEFINED NETWORKING

Objectives. Explain the Role of Redundancy in a Converged Switched Network. Explain the Role of Redundancy in a Converged Switched Network

The Economics of Cisco s nlight Multilayer Control Plane Architecture

Reducing the Risk, Cost and Frequency of Production Stoppages Using Network Redundancy

SAN Conceptual and Design Basics

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops

IP SAN BEST PRACTICES

Fiber Distributed Data Interface

Voice Over IP. MultiFlow IP Phone # 3071 Subnet # Subnet Mask IP address Telephone.

EMC Data Domain Boost and Dynamic Interface Groups

Non-blocking Switching in the Cloud Computing Era

APPLICATION NOTE 210 PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW

Expert Reference Series of White Papers. Planning for the Redeployment of Technical Personnel in the Modern Data Center

Broadband Networks. Prof. Karandikar. Department of Electrical Engineering. Indian Institute of Technology, Bombay. Lecture - 26

H3C SR8800 RPR Technology White Paper

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Juniper Networks EX Series/ Cisco Catalyst Interoperability Test Results. May 1, 2009

Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB

Introduction to Ethernet

Solutions Focus: IPTV

Optimizing Data Center Networks for Cloud Computing

State of Texas. TEX-AN Next Generation. NNI Plan

Contents. Load balancing and high availability

AT-S60 Version Management Software for the AT-8400 Series Switch. Software Release Notes

Cisco Active Network Abstraction Gateway High Availability Solution

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

How To Understand The Benefits Of An Mpls Network

Provider Backbone Bridging Traffic Engineering of Carrier Ethernet Services

Juniper / Cisco Interoperability Tests. August 2014

Brocade VCS Fabrics: The Foundation for Software-Defined Networks

Linear Motion and Assembly Technologies Pneumatics Service. Industrial Ethernet: The key advantages of SERCOS III

TRILL for Data Center Networks

Using & Offering Wholesale Ethernet Network and Operational Considerations

White paper. Reliable and Scalable TETRA networks

HARTING Ha-VIS Management Software

Network Virtualization

VMware ESX Server Q VLAN Solutions W H I T E P A P E R

Abstract. MEP; Reviewed: GAK 10/17/2005. Solution & Interoperability Test Lab Application Notes 2005 Avaya Inc. All Rights Reserved.

A dual redundant SIP service. White paper

Overview of Routing between Virtual LANs

Redundant Gigabit Backbone Adds Speed and Reliability to Industrial Networks

Cisco Virtual SAN Advantages and Use Cases

Ring Protection: Wrapping vs. Steering

TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS

Course Contents CCNP (CISco certified network professional)

FlexNetwork Architecture Delivers Higher Speed, Lower Downtime With HP IRF Technology. August 2011

The Keys for Campus Networking: Integration, Integration, and Integration

Broadband Networks. Prof. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Mumbai.

Whitepaper n The Next Generation in Wireless Technology

IT Data Communication and Networks (Optional)

ITU-T G.8032 Ethernet Ring Protection Switching

How To. Configure Ethernet Protection Switching Ring (EPSR) to Protect a Ring from Loops. Introduction

WDM Passive Optical Networks: Protection and Restoration

STATE OF THE ART OF DATA CENTRE NETWORK TECHNOLOGIES CASE: COMPARISON BETWEEN ETHERNET FABRIC SOLUTIONS

Contents. Foreword. Acknowledgments

Network Design. Yiannos Mylonas

How to Monitor a FabricPath Network

MRV EMPOWERS THE OPTICAL EDGE.

CORPORATE NETWORKING

Course 12 Synchronous transmission multiplexing systems used in digital telephone networks

RESILIENT NETWORK DESIGN

How To Understand and Configure Your Network for IntraVUE

Transcription:

UNERSTNING ETHERNET RING PROTETION SWITHING FOR RRIER NETWORKS RMSTRONG MTHIYLGN ssistant Vice President, Technology, ricent RJESH KUMR SUNRRJN ssistant Vice President, Product Management, ricent EMREEN F. XVIER Technical Leader, ricent YRLG KISHORE KUMR Principal Systems Engineer, ricent

UNERSTNING ETHERNET RING PROTETION SWITHING FOR RRIER NETWORKS Ethernet Ring Protection Switching (ERPS), as defined in the G.8032 recommendation, is an effort from the ITU-T to provide a highly reliable and stable protection mechanism for Ethernet ring networks. It helps transport-network operators design resilient networks with very high quality of service (QoS) characteristics and service level agreements (SLs). Link failures are a common occurrence in networking, so many methods exist to improve network reliability in the event of connectivity loss between network elements. SONET (Synchronous Optical Network) or SH (Synchronous igital Hierarchy) ring is an example of a self-healing network technology that provides a high level of protection in data broadband networks. RPR (Resilient Packet Ring), defined in IEEE 802.17, is another technology for the optimized transport of data traffic over optical fiber ring networks that provides a resilience similar to that of SONET/SH rings. With the increasing use of Ethernet in carrier networks, as an alternative to SONET/SH, it is necessary to define similar resiliency mechanisms tailored to Ethernet. The G.8032 recommendation from the ITU-T is a practical and economical mechanism to meet this objective. INTROUTION TO ERPS The ring is a popular topology employed in networks to provide redundant path connectivity between nodes. t the same time, because the ring provides an alternative path between nodes, loops exist in the network. Therefore, the key to using the ring topology in networks has been to harness the redundancy when required while avoiding loops. These very same principles lie at the core of the ITU-T G.8032 Ethernet Ring Protection Switching (ERPS) recommendation. n Ethernet ring consists of ring nodes that form a closed physical loop. Each ring node is connected to two adjacent Ethernet ring nodes via a duplex communications facility. Loop formation in the ring is avoided by ensuring that, at any time, traffic may flow through all but one of the links in the ring. This particular link, through which traffic is normally not allowed to flow, is called the Ring Protection Link (RPL). Under normal conditions, when there are no failures in the ring, the RPL is blocked and therefore does not allow any traffic flow. The node where the RPL is configured is called the RPL owner. The port on the RPL owner, to which the RPL is connected, is called the RPL port. The node, adjacent to the RPL owner node and connected to the RPL owner node through the RPL, is called the RPL neighbor. The RPL owner blocks or unblocks the port connected to the RPL. The RPL neighbor may also participate in blocking or unblocking its end of the RPL. 1

Figure 1 shows the converged ring under normal conditions with traffic blocked on the RPL. Figure 1: Loop avoidance by blocking RPL under normal conditions In Figure 1, nodes,,, and form a ring. Node is the RPL owner, and the RPL port is Port of Node, and is blocked to avoid the traffic flow. Figure 2 shows the converged ring under normal conditions with both the RPL owner and the RPL neighbor blocking traffic to the RPL. RPL Neighbor Figure 2: Loop avoidance by RPL owner and RPL neighbor blocking RPL under normal conditions In Figure 2, nodes,,, and form a ring. Node is the RPL owner, and the RPL port in node is. Node is the RPL neighbor and port in Node is the RPL neighbor port. Under normal condition, of node and of Node go to a blocking state. allowing traffic flow into it, upon failure of any of the other links or nodes, constitutes protection switching and provides protection to the traffic between the nodes. This mechanism for protection switching being handled by the nodes with no administrator or operator intervention, like with the techniques described in this paper, is known as utomatic Protection Switching (PS). When applied to a ring, it becomes Ring-PS (R-PS) Each node monitors connectivity to its neighbor through the link connecting them. The messages for monitoring and coordination of the PS actions use a dedicated VLN called the R-PS VLN. node triggers the protection switching when it encounters one of the following conditions: > The node detects loss of connectivity on one of the links connected to it > n administrator issues an explicit command to block another link and to move the traffic to the RPL (there are 2 different variations of this situation, called Forced Switch and Manual Switch, which will be covered later in this whitepaper) > When a previous condition of connectivity loss is corrected and connectivity is re-established PROTETION SWITHING ON ETETION OF ONNETIVITY LOSS The nodes on either end of each link send periodic connectivity check messages to each other. The nodes use the lack of reception of such connectivity check messages to detect loss of connectivity. Such a failure of a link, or node, in the ring, results in traffic being switched (protection switched) into the RPL. The RPL owner is responsible for unblocking the RPL, thereby allowing the RPL to be used for traffic. The failed link is blocked in order to avoid loop formation in the event that the failed link becomes functional at any time. In Figure 3, failure of the link between nodes and results in unblocking of the RPL while the ring converges, as shown below. PROTETION SWITHING In Figure 1 and Figure 2, traffic can flow from any of the nodes to any other node through any of the links other than the RPL. The RPL alone does not have any traffic flow. loop is avoided by preventing traffic flow to the RPL. The RPL is maintained ready to be brought into service if any of the other links fail. In the event that one of the other links fails, or if a node fails and the connectivity between two other nodes is thereby lost, the RPL owner and RPL neighbor, after following a protocol, start allowing traffic flow into the RPL. This action of activating the RPL and Figure 3: In the event of failure, RPL link opened up to provide connectivity 2

MINISTRTOR-INITITE PROTETION SWITHING network operator can manually trigger the traffic redirection instead of it being triggered by a connectivity failure. This is done by a forced switch or manual switch command, which is useful in situations like maintenance operations or repair. When the administrator issues a forced switch or manual switch command on a specific port at a given node, the node places the administrator-specified port into a blocked state. ased on the protocol working, the RPL owner then unblocks the RPL to allow it thereby allowing the RPL to be used for traffic flow. pplying a force switch in of Switch results in the unblocking of the RPL and the ring converging as shown below. Non-Revertive Mode In the non-revertive mode of operation, when the failed link recovers, the RPL link remains unblocked and one of the failed ports remains in a blocked state. In situations where there is no advantage in immediately reverting to the normal working transport entities, such a mode is preferred. In this case, a second traffic interruption is avoided by not reverting the protection switching. Figure 5: Protection switching on signal recovery in non-revertive mode In the figure above, Nodes,,, and form a ring. Node is the RPL owner and the RPL port in node is. When the link between and fails and then recovers, one of the failed ports (the highest priority port) remains in a blocked state. The RPL port remains in an unblocked state. Figure 4: On initiation of force switch by operator, RPL link opens up to provide connectivity In the figure above, Nodes,,, and form a ring. Node is the RPL owner, and the RPL port in node is. When the forced switch is applied on port of Node, the port is moved to a blocked state and the RPL port ( of Node ) moves to an unblocked state. PROTETION SWITHING ON REOVERY FROM LOSS OF ONNETIVITY fter a protection switching action, when the failed link has been repaired, there is once again a potential loop in the network. This is avoided by the nodes detecting the recovery, and blocking either the repaired link or the RPL, resulting in two possible modes of operation for the ring: > Revertive Mode > Non-Revertive Mode Revertive Mode In the revertive mode of operation, when a failed link recovers, the RPL is blocked and the failed link is unblocked to start carrying traffic. espite it causing an additional momentary traffic interruption, the revertive mode may be desirable in situations where the working transport entity resources can be more optimized. ERPS IN SUTENE (INTERONNETE) RINGS ERPS also supports the protection of services that traverse through interconnected rings. Interconnected rings can be formed using single or dual ring nodes, or a multi-ring/ladder network that consists of conjoined Ethernet rings. For interconnected rings, the protection mechanism ensures that no super loop is formed when there is a link failure between the ring nodes. The protection mechanism specified in the G.8032/Y.1344 standard protects interconnected rings according to the following principles: > R-PS VLNs are not shared across ring interconnections > Traffic and R-PS channel of each link should be controlled (for blocking or flushing) by the ERP control process of only one ring > Each ring or sub-ring must have its own RPL The following figure represents an example of a topology composed of interconnected rings: Ring 1 and Ring 2. The link between the two interconnected nodes is under the control of the ERP control processes of the ring that it is configured to be a part of. In the example below, the ring link between nodes and is under the control of Ring 1. Failure of the link between the interconnected nodes triggers the protection switching event on the ring that contains this link. The sub-ring is not aware of the failure. 3

E P3 Ring 1 Ring 2 P3 F Figure 6: In the figure above, Nodes,,, and form the main ring. Node is the RPL owner and the RPL port in node is. Ring 2 is the sub-ring and consists of ring links ->E->F->. The RPL port of Ring 2 is of Node E and Node E is the RPL owner. ETHERNET RING PROTETION USING RING INSTNES FOR LO LNING Multiple logical ERP ring instances may be supported over a single physical ring. For example, traffic belonging to one VLN may be routed in one direction while traffic belonging to a second VLN may be routed in the opposite direction. When multiple ring instances are configured in a ring, some traffic can pass through one path while other traffic can choose a different path. This division of ring traffic supports load balancing in the system. When ring instances are configured for the ring, each ring instance should have its own RPL owner, RPL neighbor, and R-PS VLN. ERPS VERSION 1 N VERSION 2 The ITU-T first standardized the G.8032 in 2006. Today it is known as v1 or version 1 of the standard. Subsequently, more facilities have been incorporated based on feedback from network operators and designers. n updated version of the G.8032 was standardized in 2010, which is now known as v2 or version 2 of the standard. Key improvements and enhancements in ERPS version 2 from version 1 include: > Non-revertive mode of operation (version 1 specifies only the revertive mode of operation) > Forced Switch command for administrators > Manual Switch command for administrators > Increased support for ERP instances to protect multiple logical rings > dditional methods for minimizing segmentation of interconnected rings ERPS N RSTP The Rapid Spanning Tree Protocol (RSTP) and its multipleinstance version Multiple Spanning Tree Protocol (MSTP) are similar protocols to the ERPS and have been serving enterprise networks satisfactorily for many years now. From a protocol perspective, at their core, RSTP and MSTP are based on the same underlying principles as ERPS: (a) providing alternative redundant paths in a network and (b) loop avoidance. So how necessary is ERPS, and can RSTP or MSTP be used instead because they are already widely deployed? oth ERPS and STP are loop-avoidance protocols, but the protection switching performance of ERPS is much better when compared to STP. RSTP and MSTP were developed for a more generic topology than a simple ring. The protocol, therefore, has overheads to deal with complex topologies, and are unnecessary in a simple ring topology. For these reasons, RSTP or MSTP need more time to re-build network topology because they each use various parameters to re-calculate alternate paths. ecause the G.8032 does away with these overheads, and is specifically optimized for ring topologies, the ERPS protocol provides better protection switching performance and much greater levels of availability in carrier networks. ERPS can efficiently and predictably deliver sub- 50-millisecond protection switching, which is not the case with RSTP or MSTP. RIENT ERPS s part of its comprehensive portfolio of networking products, ricent offers a licensable software implementation of the G.8032 specification for ERPS. ricent ERPS is available for licensing as an individual component that can be easily integrated into networking products. It is also available as an integrated part of ricent s industry leading Intelligent 4

Element Management Redundancy Framework onnectivity/ Fault Management Example Multi-board System Framework ricent ERPS OS bstraction Layer Hardware bstraction Layer OS Switching Silicon river or ata Path Figure 7: ricent s ERPS in a Switch Stack rchitecture Switching Solution (ISS) for a variety of networking products catering to arrier Ethernet and Metro Ethernet applications. The software is implemented with clearly defined interfaces to other components in the switch, including abstraction layers to the operating system and switching silicon interfaces, allowing a developer or system integrator to integrate it easily. In addition to the mechanism in the G.8032 standard, ricent ERPS implements multiple additional features and extensions to build highly scalable, resilient, and fault-tolerant networks. These include: > Extensive support for configuration and management > Extensions to the protocol for highly available redundancy > Extensions for working on systems composed of multiple individual switching units > Extensions for functioning in a distributed environment, harnessing processing power from multiple PUs View http://www.aricent.com/software/g8032-ethernetring-protection-switching-erps.html for an overview of ricent ERPS. Network equipment manufacturers can use proven and tested components like ricent ERPS to reduce technology complexity and to optimize product development cycles, thereby accelerating time to market with reduced costs, ONLUSION Implementation of protection switching allows carrier Ethernet networks to meet higher levels of fault tolerance, resilience, and service-level agreement satisfaction. Protection switching in Ethernet networks with ring topologies can be efficiently implemented based on the ITU-T G.8032 specification. 5

RMSTRONG MTHIYLGN is ssistant Vice President, Technology, for ata ommunication products at ricent, focusing on routing and switching solutions, including ricent s ISS. He has over 18 years of experience in architecting software for switching, routing, arrier and Metro Ethernet. armstrong.m@aricent.com EMREEN F. XVIER is a Technical Leader for ata ommunication products at ricent, focusing on ricent s ISS. She has over 6 years of experience in the datacom domain including development and implementation of networking protocols. emreen.xavier@aricent.com RJESH KUMR SUNRRJN is ssistant Vice President for ata ommunication products at ricent, focusing on routing and switching solutions including ricent s ISS. He has over 16 years of industry experience in strategizing and managing software for communications. rajeshkumar.sundararajan @aricent.com YRLG KISHORE KUMR is a Principle Systems Engineer for ata ommunication products at ricent, focusing on routing and switching solutions including ricent s ISS. He has over 11 years of experience in developing software for switching, routing, security, arrier and Metro Ethernet. yarlagadda.kumar@aricent.com 6

INNOVTION SERVIES FOR THE ONNETE WORL The ricent Group is a global innovation and technology services company that helps clients imagine, commercialize, and evolve products and services for the connected world. ringing together the communications technology expertise of ricent with the creative vision and user experience prowess of frog, the ricent Group provides a unique portfolio of innovation capabilities that seamlessly combines consumer insights, strategy, design, software engineering, and systems integration. The client base includes communications service providers, equipment manufacturers, independent software vendors, device makers, and many other Fortune 500 brands. The company s investors are Kohlberg Kravis Roberts & o., Sequoia apital, The Family Office, elta Partners, and The anadian Pension Plan Investment oard.

aricent.com 2012 ricent Group. ll rights reserved. ll ricent brand and product names are service marks, trademarks, or registered marks of ricent Inc. in the United States and other countries.