Path protection
   HOME

TheInfoList



OR:

Path protection in
telecommunication Telecommunication is the transmission of information by various types of technologies over wire, radio, optical, or other electromagnetic systems. It has its origin in the desire of humans for communication over a distance greater than that fe ...
s is an end-to-end protection scheme used in
connection oriented Connection-oriented communication is a network communication mode in telecommunications and computer networking, where a communication session or a semi-permanent connection is established before any useful data can be transferred. The establish ...
circuits in different
network architecture Network architecture is the design of a computer network. It is a framework for the specification of a network's physical components and their functional organization and configuration, its operational principles and procedures, as well as commun ...
s to protect against inevitable failures on
service providers A service provider (SP) is an organization that provides services, such as consulting, legal, real estate, communications, storage, and processing services, to other organizations. Although a service provider can be a sub-unit of the organization t ...
’ network that might affect the services offered to end customers. Any failure occurred at any point along the path of a circuit will cause the end nodes to move/pick the traffic to/from a new route. Finding paths with protection, especially in elastic optical networks, was considered a difficult problem, but an efficient and optimal algorithm was proposed. Other techniques to protect telecommunications networks against failures are: Channel Protection, Link Protection, Segment-Protection, and P-cycle Protection


Path protection in ring-based networks

In ring-based networks topology where the setup is to form a closed loop among the Add Drop Multiplexers, there is basically one path related ring protection scheme available in Unidirectional Path-Switched Ring architecture. In SDH networks, the equivalent of UPSR is Sub-Network Connection Protection (SNCP). Note that SNCP does not assume a ring topology, and can also be used in mesh topologies. In UPSR, the data is transmitted in both directions, clock and counter clock wise, at the source ADM. At the destination then, both signals are compared and the best one of the two is selected. If a failure occurs then the destination just needs to switch to the unaffected path.


Path protection in optical mesh network

Circuits in
optical mesh network An optical mesh network is a type of optical telecommunications network employing wired fiber-optic communication or wireless free-space optical communication in a mesh network architecture. Most optical mesh networks use fiber-optic communicatio ...
s can be unprotected, protected to a single failure, and protected to multiple failures. The end
optical switches An optical transistor, also known as an optical switch or a light valve, is a device that switches or amplifies optical signals. Light occurring on an optical transistor's input changes the intensity of light emitted from the transistor's output wh ...
in protected circuits are in charge of detecting the failure, in some cases requesting digital cross connects or
optical cross-connect {{unreferenced, date=February 2008 An optical cross-connect (OXC) is a device used by telecommunications carriers to switch high-speed optical signals in a fiber optic network, such as an optical mesh network. There are several ways to realize a ...
s in intermediate devices, and switching the traffic to/from the backup path. When the primary and backup paths are calculated, it is important that they are at least link diverse so that a single link failure does not affect both of them at the same time. They can also be node diverse, which offers more protection in case a node failure occurs; depending on the network sometimes the primary and backup path cannot be provisioned to be node diverse at the edges, ingress and egress, node. There are two types of path protection in Optical Mesh Networks: Dedicated Backup Path Protection and Shared Backup Path Protection


Dedicated backup path protection or DBPP (1+1)

In DBPP, both the primary and backup path carry the traffic end to end, then it is up to the receiver to decide which of the two incoming traffic it is going to pick; this is exactly the same concept as in Ring Based Path Protection. Since the
optics Optics is the branch of physics that studies the behaviour and properties of light, including its interactions with matter and the construction of instruments that use or detect it. Optics usually describes the behaviour of visible, ultrav ...
along both paths are already active, DBPP is the fastest protection scheme available, usually in the order of a few tens of milliseconds, because there is no signaling involved in between ingress and egress nodes thus only needing the egress node to detect the failure and switch the traffic over to the unaffected path. Being the fastest protection scheme also makes it the most expensive; normally using more than double of the provisioned capacity for the primary because the backup path is usually longer due to the link and/or node diversity rule of thumb.


Shared backup path protection or SBPP

The concept behind this protection scheme is to share a backup channel among different, link/node diverse, primary paths. In other words, one backup channel can be used to protect various primary paths as shown on the figure below where the link between S and T is used to protect both AB and CD primaries. Under normal operations, assuming no failure on the network, the traffic is carried on the primary paths only; the shared backup path is only used when there is a failure in one of those primary paths. There are two approaches to provision or reserve backups channels. First, there is the failure dependent assignment or approach also known as
restoration Restoration is the act of restoring something to its original state and may refer to: * Conservation and restoration of cultural heritage ** Audio restoration ** Film restoration ** Image restoration ** Textile restoration * Restoration ecology ...
in which the backup path is calculated in real time after the failure occurs. This technique is found in early versions of Mesh networks. However, in today’s
Optical Mesh Network An optical mesh network is a type of optical telecommunications network employing wired fiber-optic communication or wireless free-space optical communication in a mesh network architecture. Most optical mesh networks use fiber-optic communicatio ...
it can be used as a re-provisioning technique to help recover a second failure when the backup resources are already in use. The down side to restoration as a protection technique is that the recovery time is not fast enough. The second approach is to have a predefined backup path computed before the failure. This approach is said to be failure independent and it takes less processing time to recover as compared to the failure dependent approach. Here the backup path is calculated together with the primary at provisioning time. Even though the backup path is calculated, it is not assigned to a specific circuit before a failure occurs; cross connect requests are initiated after the fact on a first-come, first-served basis. Since this approach can only protect from a single failure at a time, if a second primary path fails and at least a portion of its backup path is already in used, this path won't be able to recover unless restoration technique is in place for such cases. There is a general down side to both of the above approaches and is that assuming there is a link failure with several paths running through it, each path in that link is going to be recovered individually. This implies that the total time the last path on that link is going to take to be back in service through the secondary path will be the sum of all other previous recovery times plus its own. This could affect the committed SLA (Service Level Agreement) to the customer.


Path protection in MPLS networks

Multi-Protocol Label Switching Multiprotocol Label Switching (MPLS) is a routing technique in telecommunications networks that directs data from one node to the next based on labels rather than network addresses. Whereas network addresses identify endpoints the labels identi ...
(MPLS) architecture is described in th
RFC-3031
It is a packet-based network technology that provides a framework for recovery through the creation of point to point paths called Label Switched Paths (LSP). These LSPs creation are between a head-end and a tail-end
Label Switch Router Multiprotocol Label Switching (MPLS) is a routing technique in telecommunications networks that directs data from one node to the next based on labels rather than network addresses. Whereas network addresses identify endpoints the labels identif ...
(LSR). In the former case, the head-end router is the input or ingress router. In the latter case the tail-end represents the output or egress router in the path. There are a few protection techniques for MPLS very similar in the general concept to those for Optical Mesh Networks, such as link protection (e.g.,
MPLS local protection MPLS Fast Reroute (also called MPLS local restoration or MPLS local protection) is a local restoration network resiliency mechanism. It is actually a feature of resource reservation protocol (RSVP) traffic engineering (RSVP-TE). In MPLS local pro ...
) and path protection. The path protection schemes for MPLS are as follow:


Packet protection scheme (1+1)

This protection scheme is similar in a sense to Ring-based path protection and Dedicated Backup Path Protection (DBPP) schemes described before. Here, same traffic is transmitted over two, link and/or node disjoint, LSPs; primary and backup. The transmission is done by the head-end LSR. The tail-end LSR then receives and compares both traffics; when a failure occurs, the tail-end detects it and switches the traffic to the secondary LSP. As with DBPP in
Optical Mesh Network An optical mesh network is a type of optical telecommunications network employing wired fiber-optic communication or wireless free-space optical communication in a mesh network architecture. Most optical mesh networks use fiber-optic communicatio ...
, there is no signaling involved in this protection scheme. This technique is the simplest and fastest of all, but as it reserves and transmits packets on both LSP, it takes away
bandwidth Bandwidth commonly refers to: * Bandwidth (signal processing) or ''analog bandwidth'', ''frequency bandwidth'', or ''radio bandwidth'', a measure of the width of a frequency range * Bandwidth (computing), the rate of data transfer, bit rate or thr ...
that could be shared and used by other LSPs.


Global path protection (1:1)

In this protection scheme, a primary and a backup LSP are computed and setup at the provisioning time prior to failures. The backup LSP does not necessarily need to have the same constrain in terms of bandwidth as the primary; it is possible to reserve less bandwidth on the backup LSP and not incur in packet loss when in use. This is because the bandwidth of the link is shared among the different LSPs and the reason why the previous explained protection scheme is not preferred. It is also true that the Backup LSP does not necessarily carry traffic unless the primary LSP fails. When this occurs, a fault indication signal (FIS) is sent back to the head-end LSR that will immediately switch the traffic to the backup LSP. The drawback in this protection scheme is that the longer the LSPs, the longer the recovery time will be because of the travel time of the FIS notification.


See also

*
SONET Synchronous optical networking (SONET) and synchronous digital hierarchy (SDH) are standardized protocols that transfer multiple digital bit streams synchronously over optical fiber using lasers or highly coherent light from light-emitting diode ...
* Add-drop Multiplexer (ADM) * Optical Mesh Networks * Shortest Path Problem *
K Shortest Path Routing The ''k'' shortest path routing problem is a generalization of the shortest path routing problem in a given network. It asks not only about a shortest path but also about next ''k−1'' shortest paths (which may be longer than the shortest path) ...
* Link Protection * Segment Protection * Shared Risk Resource Group *
MPLS Multiprotocol Label Switching (MPLS) is a routing technique in telecommunications networks that directs data from one node to the next based on labels rather than network addresses. Whereas network addresses identify endpoints the labels identif ...
*
Service Level Agreement A service-level agreement (SLA) is a commitment between a service provider and a customer. Particular aspects of the service – quality, availability, responsibilities – are agreed between the service provider and the service user. ...


References


Further reading


An Overview of DWDM Networks
* "Path Routing in Mesh Optical Networks", by Eric Bouillet, Georgios Ellinas, Jean-Francois Labourdette, and Ramu Ramamurth

* "Network Recovery: Protection and Restoration of Optical, SONET-SDH, IP, and MPLS", by Jean-Philippe Vasseur, Mario Pickavet, and Piet Demeester, 200

* "Gmpls Technologies: Broadband Backbone Networks and Systems" by Naoaki Yamanaka, Kohei Shiomoto, and EIJI AUTOR OK

*Jean-Philippe Vasseur, Mario Pickavet, and Piet Demeester. Network Recovery, Protection and Restoration of Optical, SONET-SDH, IP, and MPLS. Morgan Kaufmann Publishers, 2004.
Addressing Transparency in DWDM mesh survivable networks by Sid Chaudhuri, Eric Bouillet, and Georgios Ellinas
{dead link, date=March 2018 , bot=InternetArchiveBot , fix-attempted=yes
Shared Path Protection in DWDM Mesh NetworksThe Multiple Path Protection of DWDM Backbone Optical Networks

RFC-3031

G.841
Telecommunications Network architecture Network protocols