Hitless Protection Switching Method for Passive Optical Network

Similar documents
Construction of High-speed and High-reliability Optical Networks for Social Infrastructure

OPTICAL NETWORKS. Optical Access Networks. A. Gençata İTÜ, Dept. Computer Engineering 2005

EPON Technology White Paper

Ultra High-Speed SONET Fiber-Optic Transmission System

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Based on Computer Networking, 4 th Edition by Kurose and Ross

GPON - EPON Comparison

IPv6 Broadband Access Network Systems

White Paper Testing Ethernet Passive Optical Networks

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

WAN Data Link Protocols

Ethernet Passive Optical Networks EPON

By: Mohsen Aminifar Fall 2014

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

CONTROL MICROSYSTEMS DNP3. User and Reference Manual

Fast Ethernet and Gigabit Ethernet. Networks: Fast Ethernet 1

How To Communicate With A Token Ring Network (Dihon)

Network Categories. Network Types for the Local Range. Ethernet. Carrier Sense Multiple Access

Fast Ethernet and Gigabit Ethernet. Computer Networks: Fast and Gigabit Ethernet

Making Money With Affiliate Marketing - How to Do It

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

Ring Local Area Network. Ring LANs

SERVICE DESCRIPTION INTERNET TRANSIT / 2.6.4

Token Ring and. Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1

Switch Fabric Implementation Using Shared Memory

Improvement in Maintenance and Operation of 10G-EPON System

- Hubs vs. Switches vs. Routers -

GIGABIT PASSIVE OPTICAL NETWORK

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

Data Link Layer. Page 1. Ethernet

BROADBAND AND HIGH SPEED NETWORKS

Example: Multiple OFDM Downstream Channels and Examining Backwards Compatibility. Mark Laubach, Avi Kliger Broadcom

SDH and WDM: a look at the physical layer

RFC 2544 Testing of Ethernet Services in Telecom Networks

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK

Making Ethernet Over SONET Fit a Transport Network Operations Model

(Refer Slide Time: 2:10)

FURTHER READING: As a preview for further reading, the following reference has been provided from the pages of the book below:

Algorithms for Interference Sensing in Optical CDMA Networks

CSMA/CA. Information Networks p. 1

SDH and WDM A look at the physical layer

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

GEPON & GPON Comparison. James Young, Technical Director, APAC

Gigabit-capable Passive Optical Networks (GPON): General characteristics

Course 12 Synchronous transmission multiplexing systems used in digital telephone networks

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl

Interfaces and Payload Testing

Performance Management and Fault Management. 1 Dept. of ECE, SRM University

WDM-PON: A VIABLE ALTERNATIVE FOR NEXT GENERATION FTTP

PART II. OPS-based metro area networks

Fig.1 PON Market View Architecture. Fig.2 EPON Bandwidth Access Methods

Passive Optical Networks: Recent Developments and Issues

H-NW-1 H-NW-2 H-NW-3 H-NW-4 H-NW-5 H-NW-6. Reliability Management of Telecommunication Networks by Analyzing Outage Data

Multiplexing. Multiplexing is the set of techniques that allows the simultaneous transmission of multiple signals across a single physical medium.

Chapter 11: WAN. Abdullah Konak School of Information Sciences and Technology Penn State Berks. Wide Area Networks (WAN)

High Speed Ethernet. Dr. Sanjay P. Ahuja, Ph.D. Professor School of Computing, UNF

PMD Burst Mode Dynamic Performance Requirement

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

FTTP Networks: Topology and Competition

Performance Evaluation of Dynamic Bandwidth Allocation Algorithm for XG-PON Using Traffic Monitoring and Intra- Scheduling

BroadbandSoHo. Verizon MDU FTTP Overview. Document Description:

Digital Subscriber Line (DSL) Requirements

Process Control and Automation using Modbus Protocol

LIN (Local Interconnect Network):

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS

High-Level Data Link Control

INTERNATIONAL TELECOMMUNICATION UNION SERIES L: CONSTRUCTION, INSTALLATION AND PROTECTION OF CABLES AND OTHER ELEMENTS OF OUTSIDE PLANT

A Hierarchical Weighted Round Robin EPON DBA Scheme and Its Comparison with Cyclic Water-Filling Algorithm

Schedule 2t. Additional terms for Fast Trade - Online Ordering

Fundamentals of Telecommunications

It explains the differences between the Plesiochronous Digital Hierarchy and the Synchronous Digital Hierarchy.

Schedule 2e. Additional terms for Ethernet services

COMPUTER HARDWARE. Input- Output and Communication Memory Systems

Local Area Networks. Guest Instructor Elaine Wong. Elaine_06_I-1

How To Monitor And Test An Ethernet Network On A Computer Or Network Card

PON Technology A Shift in Building Network Infrastructure. Bob Matthews Technical Manager CommScope Canada

11/22/

Passive Optical Networks Beneficial to Cloud Computing

Tutorial.

Gigabit Ethernet: Architectural Design and Issues

Gigabit Ethernet. Abstract. 1. Introduction. 2. Benefits of Gigabit Ethernet

Objectives. Lecture 4. How do computers communicate? How do computers communicate? Local asynchronous communication. How do computers communicate?

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

10 Gigabit Ethernet MAC Core for Altera CPLDs. 1 Introduction. Product Brief Version February 2002

Ethernet Service OAM. Standards and Functionality. Connectivity Fault Management (CFM) Fault Detection. White Paper

Protocols and Architecture. Protocol Architecture.

Timing over Packet. Technical Brief

: Instructor

Bandwidth Allocation DBA (BA-DBA) Algorithm for xpon Networks

How To Test For 10 Gigabit Ethernet At 10 Gb/S

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

RTT 60.5 msec receiver window size: 32 KB

Introduction. Background

Operator s Requirements for G-PON:

Joint ITU-T/IEEE Workshop on Next Generation Optical Access Systems. DBA & QoS on the PON - Commonalities with Switching & Routing

GPON in Mobile Backhaul

Application Note Fiber Optic Standards Reference Guide

Final for ECE374 05/06/13 Solution!!

TCOM 370 NOTES LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

Carrier Ethernet: New Game Plan for Media Converters

Transcription:

Hitless Protection Switching Method for Passive Optical Network Hiromi UEDA Toshinori TSUBOI Hiroyuki KASAI School of Computer Science, Tokyo University of Technology 1404-1 Katakura-cho, Hachioji-shi, 192-0982 Japan Phone/FAX: +81-42-637-2679, E-mail: ueda@cs.teu.ac.jp Abstract - The Passive Optical Network (PON) shares transmission facilities to provide broadband services economically. To enhance network survivability, ITU-T Rec. G.983.5 defines some protection switching methods. These methods, however, always bring about signal loss when switching is performed. Moreover, a network operator often has to replace one optical fiber cable with another that takes a different route due to constructions like social infrastructure renewal. If hitless switching is available, the operator can carry out that activity anytime without impacting users, and can also offer higher-grade broadband services. Thus the hitless protection technology for PON systems is very attractive and useful. This paper proposes hitless switching methods for PON systems based on the PON s unique features. We also present a specific hitless protection method for GE-PON as a design example. Index Terms - Network reliability, Network survivability, Network protection, Hitless switching, PON, GE-PON I. INTRODUCTTION The Passive Optical network (PON) provides economic broadband services because PON shares its transmission facilities among multiple users. A PON is now providing Fiber-to-the-Home (FTTH) services and leased line services in Japan. Each PON consists of Optical Line Terminal (), Optical Network Units (s), and optical splitters. In the downstream direction, from to s, transmits multiplexed packets to all s, and each acquires packets destined to itself, and discards all other packets. In the upstream direction, from to, arbitrates to prevent the collision of packets from s at optical splitters based on the round trip time (RTT) between and ; always ranges its s before starting services. Enhancement of PON reliability will become a more important issue in the near feature. ITU-T Rec. G.983.5 was issued to improve the survivability of the Broadband PON (B-PON) [1]; its protection switching methods are based on those of Synchronous Digital Hierarchy (SDH) transmission systems, ITU-T Rec. G.783 [2]. Particularly in PON needs to measure the RTT of the link to ensure transmission control to the using the link, when the link is switched to. Even though the POPUP procedure, a fast ranging scheme, is used, signal loss occurs and service is interrupted. If PON protection switching could be hitless, i.e. without signal loss, network operators could offer higher-grade, no outage, services in FTTH and, more importantly, leased line services. In addition, network operators often experience situations in which fiber cables must be changed to other routes when the original route undergoes construction, for example a bridge change and social infrastructure renewal. At that time, hitless protection switching would permit them to change the fiber cable route at any time without affecting users at all. Thus the hitless protection switching function is essential for network operators. Hitless protection switching methods for the Asynchronous Transfer Mode (ATM) technology have been studied [3], [4], [5]: One method newly defines the Operation and Maintenance (OAM) cell, and the length difference between Sides 0 and 1 is measured by using the OAM cell as a delimiter to align ATM cell sequences of Sides 0 and 1 with each other [3], [4]. Another method aligns data cells between Sides 0 and 1 by comparing data cells cell by cell without any OAM cell [3], [4]. Other methods have also been proposed [5]. These methods, designed for ATM systems, are not suitable for PON systems due to their unique features. is the master and is the slave in a PON; each is connected to multiple s, and controls and keeps surveillance over all s; ranges s to prevent collision at optical splitters; signals from/to multiple s are multiplexed on the link between splitters and. Hence we need to consider these characteristics when establishing a hitless protection mechanism for PON. This paper proposes PON hitless switching methods based on the unique features of PON. The rest of this paper is structured as follows. Section II describes the backgrounds of this study; conventional PON protection switching and a Gigabit Ethernet PON (GE-PON) system [6]. Section III proposes PON hitless protection methods; we introduce two alignment methods between and 1 links for a fully protected PON. Section IV presents a design example for GE-PON. Section V concludes the paper. II. PRELIMINARIES A. Conventional PON protection switching The PON configuration discussed here is shown in Fig. 1. It consists of an Optical Line Terminal () located in a central office, multiple Optical Network Units (s) located in user premises, optical splitters between and s, and optical fiber connected to each other. Wavelength division multiplexing (WDM) technology is used 1

on one fiber to realize upstream and downstream direction transmissions; 1490 nm wavelength downstream, and 1310 nm upstream. B-PON protection configurations and switching methods are specified in ITU-T Rec. G.983.5 [1]. One of the configurations, a fully protected PON, is shown in Fig. 2(a). and s have Sides 0 and 1 for each duplicated PON line terminal (PON LT). of PON LT in is connected to of PON LT in via optical splitters and optical fibers (this is called the link); similarly, the link connects the redundant equipment. If the link is being used and then fails, traffic is switched to the link by and. Before switching, needs to start ranging the s on the Side 1 link to control transmission based on the RTT of Side 1. During this process, services are interrupted. More specifically, this is shown in Fig. 2(b), which is taken from ITU-T G.983.5. detects LOS i in the link after 1 2 n : User Network Interface NNI: Network Node Interface WDM: Wavelength Division Multiplexing #1 ON LOSi OFF ON Service OFF #N Fig. 1. 1 n Optical Splitter One fiber WDM Downstream: 1490 nm Upstream: 1310 nm PON configuration detection time invalid link Optical Splitter(0) (a) PON system with (1+1) configuration POP UP procedure POPUP guard time NNI : Optical Network Unit : Optical Line Terminal Optical Splitter(1) link Ranging success Figure 11/G.983.5 Protection switching typical model (With POPUP procedure) Fig. 2. (b) Timing chart in protection switching[1] PON protection configuration and switching method some time-out period, and enters the POPUP procedure to range the i on the link. After completing the ranging process, switches the link to. As a result, as shown in Fig. 2(b), services are interrupted for the period given by the time sum of LOS i detection time, POPUP guard time, and POPUP completion time; POPUP is defined as a fast ranging method in ITU-T G.983.5. B. GE-PON System [6] In preparation for Section IV, the GE-PON system is outlined here. Its actual bit rate is 1.0 Gbit/s; line bit rate is 1.25 Gbit/s due to the use of the 8B/10B coding. Its transmission unit is an Ethernet frame whose preamble field contains Logical Link Identifier (LLID) together with error protection, Cyclic Redundancy Check - 8 (CRC-8). LLID is set by the to indicate destination; each acquires only its frames according to LLID. To make it possible to control transmission in the upstream direction, first ranges each and assigns a unique LLID to it. This procedure, called the discovery process, is shown in Fig. 3; Fig. 3(a) shows overall discovery sequences, and Fig. 3(b) shows ranging in the discovery process. In the discovery process, sends a discovery message whose LLID indicates broadcast to all s. In general, a message contains time stamp which means message send time based on s clock (counter), grant start time and grant length, which indicates time and duration, respectively, when the is permitted to send based on s clock. Upon receiving a discovery message, the unregistered first sets into its clock (counter) to synchronize its clock to that of where the time difference corresponds to the distance between and ; then sends a REGISTER_REQ message to request registration. REGISTER_REQ messages from multiple s may collide at the optical splitter, and thus the message is sent at ( = random time d plus clock value). receives a REGISTER_REQ message at t 3 based on s clock, extracts its time stamp from it, and thus obtains RTT as t 3 -. Next, assigns an LLID to the via a REGISTER message, and then sends a message with the assigned LLID to the to confirm the assignment. The replies by sending a REGISTER_ACK message. That completes the discovery process. The controls s transmission after the discovery process as shown in Fig. 4. A message, which indicates the destination 's LLID, contains time stamp, send start time, and duration for the. The updates its clock using, and sends Ethernet frames at for period based on s clock. Since the clocks of and are synchronized, can receive Ethernet frames from the at the intended time t 3 by setting to t 3 - RTT in a message. 2

Random time d Discovery message Grant start time Discovery : Time stamp : Grant start time : Grant length REGISTER_REQ message REGISTER message message Unicast LLID REGISTER_ACK message Unicast LLID Discovery handshake completed LLID: Logical Link Identifier : Optical Line Terminal : Optical Network Unit (a) Discovery sequence [6] Discovery RTT=t 3 t 3 Discovery window REGISTER _REQ REGISTER _REQ d d: Random time (b) ranging in discovery Fig. 3. Discovery process III. PROPOSED HITLESS PRORECTION SWITCHING A. Basic concept To realize hitless switching, the (1+1) configuration is adopted so the same packets always are transmitted over Side 0 and 1 links. The (1+1) configuration discussed below is shown in Fig. 2(a). Hitless protection switching is made possible by making the same packets arrive simultaneously at the -1 link selector in and, and selecting valid packets packet by packet. Inserting a fixed alignment delay into the shorter link of Sides 0 and 1 allows the same packets to arrive at the selector simultaneously. We now consider whether it is possible to realize hitless protection switching if the packets arriving simultaneously at the -1 link selector in and are not the same. An example of this case is shown in Fig.5. Fig. 5(a) shows two packet sequences that are offset by two packets at the selector. If a buffer is not used before the selector, the selected packet sequence is shown in Fig. 5(b); the order of Packets B and C are changed after the selection and Packet D is lost due to the selection of overlapped Packet B. That is not obviously hitless. The use of a buffer yields Fig. 5(c); Packet B(0) with error is discarded, and then correct Packet C(0) is stored in a buffer. When Packet B(1) comes and is judged as correct, Packet B(1) is selected. Then correct Packet C(0) is read from the buffer. Packet D(0) is once stored in a buffer, and is read after Packet C(0). It follows that Packet C(0) is delayed by the and 1 difference in time. Thus, the method shown in Fig. 5(c) needs not only the same buffer size as the above alignment delay inserting method, but also complex buffer control. Moreover, it causes packet delay variations that are not desirable for traffic sensitive to packet jitter. Thus, we adopt the above alignment delay inserting method. We next consider the position to insert the alignment delay and the delay value to align the Ethernet frames on Side 0 and 1 links. : Time stamp : Grant start time : Grant length =t 3 -RTT RTT t 3 Ethernet Frames A B C D E F A B C D (a) Non-alignment packet sequence before the selector A C B E (b) Selected packets without buffer F Ethernet Frames A B C D (c) Selected packets with buffer : Correct packet : Packet with errors Fig. 4. s transmission control to Fig. 5. Switching without aligning Sides 0 and 1 3

B. Position of and 1 alignment delay Inserting a fixed alignment delay into the shorter link of Sides 0 and 1 allows the same packets to arrive at the selector simultaneously. If the delay is given in, the burden of will be decreased, and shared effects will be obtained. We, however, find out that the delay must be inserted in each as described below. are located in different distances from. Even and 1 links of the same are also different in length. Packets to all s are consecutively and densely multiplexed over Sides 0 and 1 feeders. An example is shown in Fig. 6. link of _A and _C is longer than by one packet for simplicity; link of _B is longer than by one packet as shown in Fig. 6(a). Downstream multiplexed packet sequence is shown in Fig. 6(b). If the alignment delay is given in, the original packet sequence shown in Fig. 6(b) must be converted to the sequence shown in Fig. 6(c) after the alignment delay is given to each shorter link. This conversion decreases link utilization quite a lot. We need to maximize the link utilization of the feeder to operate PON effectively and efficiently. Therefore, to provide the appropriate alignment delay to each shorter link, we must set it in each. Namely the delay is set at the receive side so that the same packets are aligned on and 1 at the selector. Similarly the delay is set at the send side so that the same packets from are aligned on and 1 at the selector. C. Acquisition of and 1 alignment delay We need to obtain the alignment delay value δ i for i. Fig. 7 shows that δ i equals 50% of the difference between RTT0 and RTT1 for i. Next we propose two methods for obtaining δ i based on the PON s ranging functionality. [Method 1] ranges i via and 1 links, and gets RTT0 and RTT1. next informs i of δ i (= /2 = RTT1 - RTT0 /2) and the shorter link indication, or 1 using a suitable packet. i receives the packet, and inserts the delay of δ i into the indicated link on both receive and send sides. [Method 2] i measures the time difference, δ i, in the arrival times of the same control packet sent simultaneously by the for ranging over and 1 links, and then inserts δ i into both receive and send sides of the link that delivered the control packet first. Note that δ i should update continually in both methods. Methods 1 and 2 are both effective and the selection of which to use depends on the intention of the PON system implementer. Method 1, unlike Method 2, ensures that control of upstream transmission timing is retained by the. However, Method 1 requires some packet modification to transfer the delay value δ i and shorter link indication. RTT1 RTT0 t 3_0 t 3_1 _A =RTT1 RTT0 _B _C Optical Splitter(0) Optical Splitter(1) distance δ i =2δ i δ i time (a) PON with different link length of Sides 0 and 1 A-1 B-1 C-1 A-2 B-2 C-2 t A-1 B-1 C-1 A-2 B-2 C-2 t (b) Downstream packet sequence of Sides 0 and 1 before setting delay at A-1 B-1 C-1 t A-1 B-1 C-1 t (c) Downstream packet sequence of Sides 0 and 1 after setting delay at Fig. 6. Problem caused by delay given in Fig. 7. Control packet flow between and i via and 1 links IV. DESIGN EXAMPLE OF GE-PON A. Items for Method 1 (1) Setting alignment delay In GE-PON, ranges and gives it the logical link identifier (LLID) in the discovery process as shown in Fig. 3. In the process, it obtains RTT0 and RTT1, calculates δ i as RTT0 - RTT1 /2, and then informs i of δ i and the shorter link indication. We propose that messages be used to carry this information. 4

We next consider the number of bytes required for a new field in the message. 1 bit is used to indicate the shorter link. The use of 7 bits of one byte allows δ i values of up to 2.03 µs (=(2 7-1) 16 ns), because the clock count unit is 16 ns in both and [4]. This represents a fiber length difference of about 400 m, and thus one byte is not sufficient. If two bytes are used, δ i values of up to 524.3 µs (=(2 15-1) 16 ns) are supported which corresponds to approximately 100 km, and so the use of two bytes is proper. i first obtains the delay value δ i and shorter link indication from the new two byte field of the message just after the REGISTER message shown in Fig. 3(a) and then inserts the delay of δ i into the indicated shorter link in both receive and send side. (2) Updating alignment delay After the discovery process, continually updates RTT0 and RTT1 by sending the message and receiving the responded REPORT message. From the latest RTT0 and RTT1, obtains the alignment delay value δ i (= RTT1 - RTT0 /2) and the shorter link, and sends them to i in the next message. i receives the message, and reflects the new δ i. (3) Time management For Method 1, always measures RTT0 and RTT1. Hence, i needs to have independent clocks, or counters in PON LT Sides 0 and 1, to allow to range i via and 1 links separately. B. Items for Method 2 (1) Setting alignment delay The discovery message is used for measuring the alignment delay value δ i. It is sent simultaneously via Side 0 and 1 links from to i. It arrives at PON LT Sides 0 and 1 of i at different times due to different link lengths as shown in the left hand side of Fig. 7. i measures time difference δ i by starting the counter the moment the first discovery message of one side arrives and by stopping it the moment the same message arrives on the other side. i then inserts the delay of δ i into both receive and send sides of the link over which the first message arrived. (2) Updating alignment delay We consider how to update the alignment delay value δ i after the discovery process. i receives normal messages from to get to transmit Ethernet frames. i can use these messages to measure δ i. Thus it reflects the new δ i. (3) Time management As described before, i sets time carried by the timestamp of the latest message to its clock or counter. For Method 2, i distance is taken to be that of the longer link, and thus its clock is set by the timestamp of the message that arrived at i last. i needs to have one clock shared by and 1 links, and one counter for measuring δ i. C. Common items for Methods 1 and 2 (1) Detection of invalid Ethernet frames and selectors must determine the validity of frames one by one to pass packets with no errors. Invalidity is indicated by detection of clock loss, 8B/10B code violation, LLID s CRC-8 error, Frame Check Sequence (CRC-32) error, and frame length of less than 64 bytes or longer than 1518 bytes (1522 bytes if IEEE802.1Q is used). (2) LLID management There are two LLID approaches; one per link (i.e. two per ) or one per. Though measures RTT separately on Sides 0 and 1, we use the latter approach since it minimizes the management overhead; LLIDs are assigned as follows. During the discovery process, after obtains RTT0 and RTT1, it sends the same REGISTER message that contains the assigned LLID value in the information field over and 1 links to the that sent a REGISTER_REQ message, as shown in Fig. 3(a). The extracts the same LLID of Sides 0 and 1, and uses it. V. CONCLUSION We proposed two hitless protection switching methods for PON based on the PON s ranging functionalty. To realize simple hitless protection switching, we adopted the approach of aligning the packets of Sides 0 with those of at the and selectors, and selecting valid packets one by one. We clarified that alignment delay must be set in the s, not the. We introduced two methods for determining the value of alignment delay; one determines the delay from the difference in RTTs over and 1 links based on the ranging mechanism that PON inherently possesses, and the other measures the time difference when the same ranging packet arrives at an from and 1. For each method, we presented a method for updating the alignment delay. In addition, we applied the proposals to GE-PON as a design example. This method is also applicable to G-PON, but due to space constraints we will present it in another paper. REFERENCES [1] ITU-T Recommendation G.983.5, A broadband optical access system with enhanced survivability, 01/2002. [2] ITU-T Recommendation G.783, Characteristics of synchronous digital hierarchy (SDH) equipment functional blocks, 04/1997. [3] H. Ohta, and H. Ueda, Hitless line protection switching method for ATM network, IEEE ICC '93, pp.272-276, Geneva, Switzerland, May 1993. [4] H. Ohta, and H. Ueda, ATM hitless line protection switching method on forced switch command, IEICE Trans. Commun., vol.j78-b-i, no.11, pp.652-663, November 1995 (in Japanese). [5] H. Tatsuno, and N. Tokura, Hitless path protection switching techniques for ATM networks, IEICE Trans. Commun., vol.j76-b-i, no.6, pp.421-430, June 1993 (in Japanese). [6] IEEE Std 802.3, Part 3: Carrier sense multiple access with collision detection (CSMA/CD) access method and physical layer specifications, section 5, December 9, 2005. 5