Next Generation Transmission- Wray Castle course.pdf
January 11, 2017 | Author: Dany Iulian | Category: N/A
Short Description
Download Next Generation Transmission- Wray Castle course.pdf...
Description
Next Generation Transmission Course Code: TY2702
Duration: 3 days
Technical Level: 3
Transport and Signalling coursesinclude:
Broadband Access Technologies
SS7 Engineering
www.wraycastle.com
NEXT GENERATION TRANSMISSION
First published 2008 Last updated March 2012 WRAY CASTLE LIMITED BRIDGE MILLS STRAMONGATE KENDAL LA9 4UB UK
Yours to have and to hold but not to copy The manual you are reading is protected by copyright law. This means that Wray Castle Limited could take you and your employer to court and claim heavy legal damages. Apart from fair dealing for the purposes of research or private study, as permitted under the Copyright, Designs and Patents Act 1988, this manual may only be reproduced or transmitted in any form or by any means with the prior permission in writing of Wray Castle Limited. All of our paper is sourced from FSC (Forest Stewardship Council) approved suppliers.
© Wray Castle Limited
Next Generation Transmission
II
© Wray Castle Limited
NEXT GENERATION TRANSMISSION
CONTENTS Section 1
Introduction to Transmission Networks
Section 2
Options for Layer 2 Virtual Circuits
Section 3
Carrier Based Ethernet and Transmission Systems
Section 4
Synchronous Digital Hierarchy (SDH)
Section 5
Next Generation SDH
Section 6
Wavelength Division Multiplexing (WDM)
Section 7
Optical Transport Network (OTN)
Section 8
MPLS in Optical Networks
Section 9
Pseudo Wires
© Wray Castle Limited
III
Next Generation Transmission
IV
© Wray Castle Limited
Next Generation Transmission
SECTION 1
INTRODUCTION TO TRANSMISSION NETWORKS
© Wray Castle Limited
I
Next Generation Transmission
II
© Wray Castle Limited
Introduction to Transmission Networks
CONTENTS Modern Network Evolution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.1 Transmission Networks
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.2
Early Transmission Systems
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.3
SDH (Synchronous Digital Hierarchy)
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.4
SDH Line Signals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5 Traditional Legacy Networks and Transmission . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.6 NGNs (Next Generation Networks) and Transmission . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.7 NGNs and Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.8 Competing Core Technologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.9 Carrier-Based Ethernet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.10 Pseudo Wires . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.11
© Wray Castle Limited
III
Next Generation Transmission
IV
© Wray Castle Limited
Introduction to Transmission Networks
OBJECTIVES At the end of this section you will be able to:
describe the evolution of digital transmission networks in support of modern services
identify the key transmission technologies available for use in modern core network design
describe where and when different transmission techniques could be used
© Wray Castle Limited
V
Next Generation Transmission
VI
© Wray Castle Limited
Introduction to Transmission Networks
Modern Network Evolution The modern telecommunications age began in the 1980s with the introduction of digital switching systems. These early systems supported a limited set of bearer services and teleservices – the primary service was 64 kbit/s voice. The bearer was centred on the 64 kbit/s timeslot, or primary multiplexer rates of 2.048 Mbit/s (E1). Although it was possible to support data using the telephony model, the line rates available were sub-64 kbit/s; realistically, around 20–36 kbit/s. Advances in the 1990s, in particular the V.90 series (56k Flex in the USA), promised speeds of up to 56 kbit/s. In 1991, the first GSM (Global System for Mobile Communications) telephony and data services became available in western Europe. GSM is now the predominant family of technologies supporting mobiletelephone users worldwide. GSM launched with voice, fax, emergency calls and a limited data service (up to 9,600 bit/s). During the late 1990s this was enhanced with the introduction of GPRS (General Packet Radio Service), which provided a suitable bearer service for access to IP (Internet Protocol)-based services. In the late 1990s and the early part of the new millennium, multi-megabit cable and DSL (Digital Subscriber Line) services have provided broadband services to business and residential users, offering multiple services down one medium, i.e. coaxial cable or twisted pair. This led to an explosionin terms of the internet/world wide web. Service demand has extended far beyond the initial voice-centric offerings and now adds such varied elements as VoD (Video on Demand), social networking, IPTV (IP Television), HDTV (High Definition Television), digital radio, online gaming, web services, e-mail, application sharing, mobile/portable services, home security and remote storage/backup. This all has to be carried around the network, providing access to customers worldwide. Transmission networks have traditionally provided the high bandwidth backhaul and long-haul pipes that can carry these services efficiently. However, these networks have to change to meet the new requirements, which do not match the old voice-centric, timeslot-based service model.
TY2702/v3.1
© Wray Castle Limited
1.1
Next Generation Transmission
Input User Data ‘A’
Output Data
Information Pipe
User ‘B’
Transmission Network
Tributary Interfaces
Multiplexing Equipment
Line Systems
Add/Drop Facility
Digital Transmission Networks 1. PDH 2. SDH 3. WDM 4. OTN
Transmission Networks Transmission systems are designed to transfer information over any distance from one point to another. To the user, the ideal transmission system would be error free and available at all times. From an operator’s perspective a modern transmission network should enable ease of circuit provisioning, be resilient to failures and reduce the cost per bit transmitted. Transmission systems can be said to provide a simple information pipe, or bit pipe, between two users. The size or capacity of the pipe will vary depending on the amount of data to be transferred between the input and the output. In general terms, transmission systems consist of tributary interfaces, multiplexers, add/drop facility (digital cross-connects) and line systems. Four main transmission networks are in use in modern systems. They are PDH (Plesiochronous Digital Hierarchy) and SDH (Synchronous Digital Hierarchy), which are digital systems; WDM (Wavelength Division Multiplexing), which provides optical multiplexing; and OTNs (Optical Transport Networks), hybrid networks providing digital switching capability over a WDM system. WDM is in fact analogue, as it deals with light waves, although it is still carrying a client digital signal. PDH systems have been around since their introduction into trunk systems in the USA in the early 1960s. SDH systems reflect the modern approach to digital transmission systems, having been in use since 1985; again starting in North America under the title of SONET (Synchronous Optical Network). Most if not all of the new transmission equipment rolled out over recent years tends towards SDH and OTN, although some in the industry are looking at pure optical systems, which will take tributary inputs and place them onto their own colour of light, i.e. WDM and optical switching. With the deregulation in the telecommunications market there are many new operators. These are likely to have networks consisting entirely of SDH/OTN equipment. Established operators have a mixture of legacy PDH and SDH equipment and new technologies such as OTNs, Carrier Ethernets and PBB (Provider Backbone Bridging), and PBT (PBB with Traffic Engineering). However, the percentage of PDH equipment in these networks is steadily decreasing, except in the access domain (for some mobile operators in particular), where 34/45 Mbit/s (E3) circuits are being deployed over microwave radio links to connect base stations back to exchange buildings.
1.2
© Wray Castle Limited
TY2702/v3.1
Introduction to Transmission Networks
CP – Central Processor GS – Group Switch
CP
CP E1 E1 E1 E1 E1 E1
GS
E1 E1 E1 E1 E1 E1
E1 E1 E1 E1 E1 E1
CP E1 E1 E1 E1 E1 E1
GS
GS
E1 E1 E1 E1 E1 E1
CP E1 E1 E1 E1 E1 E1
E1 E1 E1 E1 E1 E1
GS
E1 E1 E1 E1 E1 E1
PDH 565 Mbit/s E4 140 Mbit/s
E1 2.048 Mbit/s
Early Transmission Systems In the 1980s, the services supported by network operators were centred on the 64 kbit/s timeslot. These were usually multiplexed using primary rate multiplexers to form E1s (2.048 Mbit/s) or 30-channel PCM (Pulse Code Modulation). This was reflected by equipment manufacturers as it became the common interface type for their equipment, such as telephony switches, to connect to the outside world. For any service, local switches may need to connect to other users locally, nationally or even internationally. A solution has to be found to cover these distances. In the 1980s this was provided by PDH networks. PDH equipment had defined interfaces in accordance with ITU-T (International Telecommunication Union – Telecommunication Standardization Sector) recommendations such as G.702/G.703, and provided bit rates from E1 through to E4. These are standard interfaces that should provide a fully compatible interface for different vendors to connect to. There is also a proprietary stage operating at 565 Mbit/s. The problem with PDH systems was that they did not define the line system interface, i.e. optical or radio. PDH systems also had proprietary management systems. This meant that operators had to terminate transmission links using the same vendor’s equipment and if they wanted to reduce operating expenditure they had to replicate this across their whole network. This meant that once a vendor got into a major operator their future was pretty well guaranteed. This was undesirable as far as operators are concerned, and competition in the marketplace often suffered. To interconnect between different vendors, as with an international circuit, it was necessary to demultiplex down to the PDH tributary levels, i.e. E1 to E4, then manually cross connect at these levels before applying a management channel and a line code for the new system.
TY2702/v3.1
© Wray Castle Limited
1.3
Next Generation Transmission
SDH (Synchronous Digital Hierarchy) With the advent of the SDH standards in the late 1980s, a standard NNI (Network Node Interface) was created. This was a fundamental step forward as it allowed operators to interconnect different vendors’ equipment at the line signal without the need for expensive demultiplexing. SDH also provided higher bit rate line systems starting at a comparable 155 Mbit/s for STM-1 (Synchronous Transport Module 1) and working up in multiples of four to STM-64 (10 Gbit/s) and even STM-256 (40 Gbit/s). Another major advantage was the introduction of extensive management and protection mechanisms. With SDH it is possible to monitor the performance of an optical link or an individual circuit path down to level 1, i.e. 2.048 Mbit/s. SDH can also provide some FEC (Forward Error Correction) for signals of STM-16 and above which can improve the optical reach of a system by some 3–6 dBs. SDH has been further enhanced through Next Generation offerings such as GFP (Generic Framing Procedure), VCAT (Virtual Concatenation) and LCAS (Link Capacity Adjustment Scheme). GFP allows SDH to carry different payloads beyond the traditional switched circuit payloads and includes direct encapsulation of IP and Gigabit Ethernet frames. VCAT allows operators to assemble any of the SDH payloads in an STM-n signal and combine them as a group providing a combined group bandwidth to the client service. LCAS provides a dynamic means of adjusting the VCAT groups such that the effective bearer can be adjusted to meet the bandwidth requirements of the client service. SDH systems have been very successful and are carried on media as diverse as coaxial cable, microwave radio and optical fibre. SDH systems are the main technology used for submarine cable systems, which in turn represent a major portion of operators’ intercontinental interconnects.
1.4
© Wray Castle Limited
TY2702/v3.1
Introduction to Transmission Networks Capacity STM-1 STM-4 STM-16 STM-64 STM-256
155 Mbit/s 622 Mbit/s 2.5 Gbit/s 10 Gbit/s 40 Gbit/s
E1 x 63 E1 x 252 E1 x 1008 E1 x 4032 E1 x 16,128
SDH Hierachy STM-1 WDM
STM-4 STM-16
nx
STM-64 STM-256 n = 1, 8, 20, 40, 80, 120 ……
WDM Concept SDH Line Signals Since the late 1990s there has been a fall in the unit cost of network bandwidth, which in turn has allowed many different service providers to offer bandwidth-hungry applications such as streaming music and video as well as data transfers. At first it looked as though SDH systems were the solution. Although this considerably improves the effective bandwidth on offer, it is still effectively centred on voice type services. With NG-SDH GFP and VCAT can offer some interesting packet-based alternatives such as supporting Gigabit Ethernets. WDM (Wavelength Division Multiplexing) Concept An alternative plan to the STM-n progressive approach is where STM-n signals are seen as the tributary inputs. These tributary inputs are then transponded into individual ITU-T defined wavelengths, which are then bound to a single medium/optical fibre. This process is known as WDM (Wavelength Division Multiplexing) and hopes to offer an almost limitless capacity over modern optical fibres. Modern systems can offer up to 160 wavelengths on a single fibre, with bodies such as Bell Labs setting a 1000 wavelength target for future systems. With the advent of optically multiplexed systems comes the need to perform optical switching. The ITU has looked at WDM and includes this as part of its OTN solution, where an OTN sees STM-n as a digital client signal. However, OTN can also support other clients such as ATM (Asynchronous Transfer Mode), Ethernet and even MPEG (Motion Picture Experts Group) transport streams in support of IPTV. Thus, SDH is not the only tributary input to WDM systems; in some cases layer 2 protocols have been looking to expand their reach into the physical layer and thus would act as the tributary directly.
TY2702/v3.1
© Wray Castle Limited
1.5
Next Generation Transmission
Traditional Legacy Networks and Transmission Traditional networks concentrated on supporting circuit-switched networks. Even though packet-based solutions using ATM or FR (Frame Relay) were in use, they still used TDM (Time Division Multiplexing) architecture such as PDH and SDH as physical layer transmission technologies. The services on offer were voice centric, i.e. based on the 64 kbit/s timeslot or multiples thereof. Even if the service required was a data service, which was provided by a separate PDN (Public Data Network), this would probably still be supported by switches that switched at 64 kbit/s. Typically, management systems were deployed with different types of NEMs (Network Element Managers) used for each layer of the transport network. Even within the same layer it was common to find different types of NEMs. This approach makes it difficult to centrally manage networks.
1.6
© Wray Castle Limited
TY2702/v3.1
Introduction to Transmission Networks
NGNs (Next Generation Networks) and Transmission New networks do not see the architecture as a straight layer 1, 2 and 3 as per the OSI (Open Systems Interconnect) model; they see services being carried by a transport network. The transport layer includes such legacy technologies as PDH and SDH as well as OTN. It also enables protocols directly supporting services such as Ethernet to be carried natively over an optical signal or as part of a WDM solution. Another major factor is that equipment at the transport layer should be controlled and managed using the same solution. To this end, technologies such as GMPLS (Generalized Multi Protocol Label Switching) are being used to provide a common control plane for systems such as OTN. GMPLS, defined by the IETF (Internet Engineering Task Force), is seen as an extension of MPLS providing for packet and layer 2 switched networks, whereby it can also switch timeslots, wavelengths and whole fibres. The ITU-T started work on ASTN (Automatic Switched Transport Networks), which is now part of ASON (Automatic Switched Optical Networks), which uses GMPLS as its control layer for an OTN. The ITU-T has also been working on T-MPLS (Transport MPLS), which is seen as a connection oriented packetswitched service which would compete with carrier Ethernet solutions. Although most work has concentrated on improving transmission networks which are traditionally confined to the core network, there has been a drive towards providing these solutions in access networks. The first such solution, Access SDH, provided a versatile node which could be configured using different line cards in any slot to support a desired service. The internal interface would provide a common interface, and the backhaul link would be provided by SDH. Initially this was thought to be at sub STM-1 levels, although STM-1, 4, and 16 solutions may be coming into this area. The latest versions of these multi-service units are known as MSPPs (Multi Service Provisioning Platforms). These have been likened to the fabled ‘God Boxes’ and could provide a common interface point for any current access technology. This would be a useful feature in terms of dealing with legacy services, as everything to the left of the device could stay the same while the network to the right would become IP compatible. In fact, there would be an IP routing engine at the heart of these devices which would forward the information to the appropriate core network service node. The MSPP as a MSAN (Multi Service Access Node) reflects the fact that this node is usually the node terminating the customer’s line.
TY2702/v3.1
© Wray Castle Limited
1.7
Next Generation Transmission
Mobile Broadband Access Core Packet-Switched Network
Telephony
TV Leased Lines
Services
Logical Addressing
Virtual Circuits and Data Links and Physical Addressing
Physical Links
Layer 3 Network
Layer 2 Data Link
Layer 1 Physical OSI Model
NGNs and Services NGNs (Next Generation Networks) have seen the architecture change from a circuit-switched to a packet-switched network. So far, this has taken place in the core network, but it is intended that future solutions should be all packet or all-IP based. This would lead to all services being carried over packet based technologies such as IP, MPLS, FR and Ethernet. As such, services would be transported over a layer 3 technology such as IP, where logical addressing of the service end points is derived. IP provides for security and separation of user traffic through the use of layer 3 VPNs (Virtual Private Networks), although the VPN may be handled at lower layers. There may also be some limited support for QoS (Quality of Service), although QoS implementation is more likely to be conducted at the lower layers. The layer 3 packets will be carried over a suitable layer 2 switching architecture such as MPLS label switches or Ethernet bridges and switches. Ethernet has undergone a revolution in the access and metro, and even across the operator’s core. It has seen its line rate improve from hundreds of Megabits per second through to Gigabits, even tens of Gigabits and possibly more. Ethernet through PBB (Provider Backbone Bridging) networks can provide a layer 2 switched solution with local, national and international reach. However, Ethernet is no longer seen as just a LAN (Local Area Network) solution. Ethernet also supports the idea of separation for the user’s traffic, firstly through the advent of VLAN (Virtual LAN) tags and then by extending this to provide S-VLANs (Service VLANs) by the service provider and B-VLANs (Backbone VLANs) as broadband or backbone bridge VLANs through the core. All these higher layers still need to be carried over some form of physical media. The traditional approach was to use a transmission system such as PDH or SDH. However, this is changing, and technologies such as Ethernet can provide their own signal suitable for transmission over the physical media.
1.8
© Wray Castle Limited
TY2702/v3.1
Introduction to Transmission Networks
PBB-TE v
MPLS
v MPLS-TP
? Core Network
SDH GMPLS
OTN
WDM
Competing Core Technologies A common interface into modern networks is provided by the Ethernet family of standards. This includes media such as fibre copper and wireless. This is certainly true when considering the interconnection point for the user and for local transfer of information around an office or a campus. A suitable transmission solution is required when distance is a major factor. There is competition in this space. The middle ground is taken up by the evolution of traditional transmission solutions from the ITU, i.e. SDH and OTN, both of which could provide a single wavelength solution or use a multiple wavelength or WDM approach. Operators could adopt MPLS-TP (MPLS – Transport Profile; formerly T-MPLS), or take the Metro Ethernet solution of PBB-TE (PBB Traffic Engineering), otherwise known as PBT. Where network operators have already invested in an MPLS solution for their core network, they may look at PBB-TE within their Metro/Access domain. This would be beneficial in two ways. Firstly, the interface to the customer would be compatible with their current data closet solution, i.e. standards-based Ethernet, and secondly, the network operator would peer at layer 2, so would not need to maintain routing tables for each connected customer as is the case when peering in support of IP VPNs.
TY2702/v3.1
© Wray Castle Limited
1.9
Next Generation Transmission
LAN
LAN
Customer Bridge
PEB
PEB
Customer Bridge
WAN Carrier Ethernet Network
Normal Ethernet Frames
Normal Ethernet Frames
Carrier-Based Ethernet For as long as Ethernet has been used on customer premises, its reach has been local, with distances measured in hundreds of metres between stations using this technology. When it came to communicating over long distances, a WAN (Wide Area Network) solution had to be found. Part of the problem with Ethernets is that the address space available is limited to 48 bits for one station, which may be insufficient for a worldwide solution. Ethernet’s lack of QoS and OAM (Operation, Administration and Maintenance) also hinder its use in a WAN environment. All of these areas have been worked on by members of the Ethernet community including the IEEE, MEF and ITU-T SG 13. The aim is to be able to provide an end-to-end circuit using Ethernet-only bridges and switches in between; as such an EVC (Ethernet Virtual Circuit) would be described through the network. To support this, the Ethernet community introduced IEEE 802.1q VLAN (Virtual Bridged Local Area Network) tagging. Here, a tag was added to the header that could provide up to 4096 VLANs, where a VLAN would correspond to an IP subnet. This was expanded through IEEE 802.1ad, which introduced the concept of a stack of tags, whereby the outer tag value would correspond to a service provider’s EVC through their network whilst the inner tag would be left unchanged until it reached the egress of the service provider. Here, it is used to switch towards the appropriate customer. This is also known as QinQ. A further extension of this, known as Mac-in-Mac, was introduced through IEEE 802.1ah. This allows a double-tagged Ethernet frame to be encapsulated in another outer double-tagged Ethernet frame. This would increase the available address space for Ethernet, making it a viable option for an international carrier.
1.10
© Wray Castle Limited
TY2702/v3.1
Introduction to Transmission Networks
P
PE E1 BTS
PE
AC
AC
E1
AC
E1
BSC/ PCU
P FR/Gb PE
L2TP or MPLS
AC E1
S G S N
Pseudo Wires With the advent of NGNs, operators have been moving towards an all-packet-switched network. The first area to be migrated was the core. This was intended to reduce overall complexity and to minimize the impact on existing customers. The problem with this approach is that customers are still using legacy services and expect them to continue to work even if the network operator has changed its network. TDM private lines in the US in 2007 represented some $10.77 billion of revenue. In a typical example, a BTS (Base Transceiver Station) uses E1s to connect back to the BSC (Base Station Controller). Another example could be a corporate customer with a large PBX (Private Branch Exchange) which uses Primary Rate (E1) connections to connect to its local CP (Communications Provider). In each case, customers expect to get a native E1 service to support their connections. There are certain expectations from the E1 service that are well understood by the customer and may be important to the effective operation of the service. However, the CP cannot provide a switched circuit network through its core, as before; it needs to carry the service over a PSN (Packet Switched core Network). Here, PWs (Pseudo Wires) can provide a solution, where a suitable Attachment Circuit is used to connect the legacy service to the CP’s edge device such as an MPLS PE router. The CP would then need to provide a PW for the customer between the appropriate end points. A TDM PW can be used to connect the BTS to the BSC. A second PW is provided that uses a FR (Frame Relay) solution in order to support the Gb interface extending from the BSC to a SGSN (Serving GPRS Support Node), as needed for GPRS support. In either case, the PW is being carried over an IP or MPLS core network, which is essentially packet based. As with any network of this type, packet loss and delay variation can cause problems. If this is likely, time-sensitive PWs would fail unless there was appropriate engineering of the underlying resources.
TY2702/v3.1
© Wray Castle Limited
1.11
Next Generation Transmission
1.12
© Wray Castle Limited
TY2702/v3.1
Next Generation Transmission
SECTION 2
OPTIONS FOR LAYER 2 VIRTUAL CIRCUITS
© Wray Castle Limited
I
Next Generation Transmission
CONTENTS Leased Lines
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.1
Data VPNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.2 IP VPNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.3 Overlay Model – Frame Relay or ATM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.4 Peer-to Peer-Model – MPLS
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.5
MPLS (Multi Protocol Label Switching)
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.6
MPLS Applications View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.7 MPLS and ATM Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.8 MPLS Shim Header and MPLS Packet Forwarding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.9 Architecture of MPLS-based IP-VPNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.10 Motivation for MPLS-based VPLS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.11 MPLS VPLS Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.12 What is MPLS Traffic Engineering? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.13 TE (Traffic Engineering) Label Distribution Protocols – CR-LDP . . . . . . . . . . . . . . . . . . . . . .2.14 Label Distribution Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.16 Label Advertisement Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.17 Label Retention Mode Routing
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.18
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.19
Appendix A Frame Relay – Frame Switching and Addressing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A2.1 Frame Relay Frame Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A2.2 QoS (Quality of Service)
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A2.3
Frame Relay over TDM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A2.4
II
© Wray Castle Limited
Options for Layer 2 Virtual Circuits
CONTENTS Appendix B ATM Terminology – VPs (Virtual Paths) and VC (Virtual Channel) Switches . . . . . . . . . . . .B2.1 ATM Interfaces and Adaptation Layers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .B2.2 The ATM Layered Reference Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .B2.3 ATM Cell Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .B2.4 ITU-T and ATM Forum Correlation
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .B2.5
Traffic Contract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .B2.6 OAM Hierarchical Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .B2.7 Mapping ATM Cells into SDH (Cell Delineation) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .B2.8
© Wray Castle Limited
III
Next Generation Transmission
IV
© Wray Castle Limited
Options for Layer 2 Virtual Circuits
OBJECTIVES At the end of this section you will be able to:
identify the key packet switching attributes of Frame Relay
identify the types of circuits provided by Frame Relay
state how Frame Relay may support QoS (Quality of Service)
describe how Frame Relay may be transported over modern transmission systems
identify the key attributes of ATM (Asynchronous Transfer Mode)
describe how an ATM circuit can be created
state how ATM provides enhanced support for OAM (Operation Administration and Maintenance) and QoS
describe how ATM can be transported over modern transmission systems
identify the key attributes of MPLS (Multi Protocol Label Switching)
state the difference between LSPs (Label Switched Paths) and VPNs (Virtual Private Networks)
describe how MPLS can support IP (Internet Protocol) and Ethernet services
© Wray Castle Limited
V
Next Generation Transmission
VI
© Wray Castle Limited
Options for Layer 2 Virtual Circuits
Application Presentation Session Transport Kilmarnock
Network Data Link Physical
Leased Lines
Swansea
Leased Lines In telecommunications networks the main form of interconnection for corporate sites used to be some form of dedicated leased line. These are expensive resources, especially when extended over lengthy geographical distances. Typically, an incumbent operator such as BT in the UK would have the presence and the network infrastructure to provide this type of service on a local, national and international basis. Mobile-network operators used to rely on this when connecting to remote base stations, where they would need to lease a 2 Mbit/s E1 to provide connectivity back to the mobile telephone exchange. In terms of running costs the use of leased lines could be more than 60% of an operator’s expenditure. Obviously, on a cost basis, leased lines are undesirable. In some cases the other communications providers are installing their own networks to replace this need. Leased lines were typically dimensioned to support TDM services, voice in particular. In recent times the type of services being carried by operators has changed significantly and there has been a move away from TDM services to more packet-based bursty-type services. To support these, different types of leased line circuits are required. VPNs (Virtual Private Networks) are the solution. There are different VPN types of VPN; two types often encountered are Data VPNs and IP VPNs.
TY2702/v3.1
© Wray Castle Limited
2.1
Next Generation Transmission
Kilmarnock Data Centre
Application Presentation Session Transport Network Data Link Physical Swansea Data Centre
Data VPN Frame Relay or ATM
Data VPNs Data VPNs are the domain of technologies such as Frame Relay and ATM, which provide a meshed layer 2 switching architecture interconnecting customer sites. The circuits supported are no longer dedicated as they share the underlying resources; as such they are termed ‘virtual circuits’. With leased line circuits, the resources were dedicated. There was no need for addressing as the traffic routing was permanently (or semi-permanently) set. For virtual circuits some form of addressing is needed so that the switching devices can determine the correct path through the network for the traffic.
2.2
© Wray Castle Limited
TY2702/v3.1
Options for Layer 2 Virtual Circuits
Kilmarnock Data Centre
Application Presentation Session Transport Network Data Link IP VPN
Physical
Swansea Data Centre
IP VPNs IP VPNs act at layer 3 and may be deployed using protocols such as MPLS (Multi Protocol Label Switching). Being IP-based, the information is routed through the network from source to destination based on IP addresses. However, if it is delivered over MPLS then MPLS is responsible for establishing a layer 2 switched path between the end points of the network and then rapidly packet-switching the traffic through the network. In essence, data movement around a modern network relies upon some form of layer 2 switching architecture. This still has to be carried by some underlying layer 1 (physical) technology such as SONET/SDH or WDM.
TY2702/v3.1
© Wray Castle Limited
2.3
Next Generation Transmission
Customer Site
Customer Site
Customer Site
Customer Site
Customer Site
Overlay Model – Frame Relay or ATM The diagram shows Frame Relay or ATM switches being used in an overlay model which employs layer 2 virtual circuits to interconnect the sites in a full mesh arrangement. This can provide significant scaling problems, such as when adding new sites. The benefit of this model is that the user traffic from different sites and customers can share the core resources on a statistical basis, being switched through the network based on addressing information contained in the frames or ATM cells. There are two principal forms of virtual circuit, PVCs (Permanent Virtual Circuits) and SVCs (Switched Virtual connections). In the case of PVCs the network operator configures the switches along the circuit path with all the necessary information in order to maintain the circuit. For SVCs, the service could be on demand. In this case the user equipment will request service from the network and the network will effectively have to build a circuit, automatically populating the switch nodes along the circuit route.
2.4
© Wray Castle Limited
TY2702/v3.1
Options for Layer 2 Virtual Circuits
Customer Site
Customer Site
Customer Site
Customer Site
Customer Site
Peer-to Peer-Model – MPLS This diagram shows a peer-to-peer model where customers’ equipment peers with the CP (Communications Provider) network. This peering is done using standard routing or switching protocols such as OSPF (Open Shortest Path First) or straightforward Ethernet in the case of VPLS (Virtual Private LAN Service). The classic example of this model can be found in MPLS deployments, where the service provider’s network is aware of the customer’s chosen protocol and MPLS. In this model, the MPLS network creates virtual circuits between each POP (Point of Presence). Then the CP peers to its customers using standard interfaces and standard layer 2 and layer 3 protocols. In the case of IP VPNs, the MPLS peering provides a virtual instance of the customer’s router in the edge MPLS router. This virtual instance is known as a VRF (Virtual Routing and Forwarding) instance. The CP then moves information across its network using MPLS VPNs between the edge POPs.
TY2702/v3.1
© Wray Castle Limited
2.5
Next Generation Transmission Router
Switch
Sophisticated Routing Layer 3
Fast Switching Layer 2
V Connectionless
Connection-Oriented
MPLS
LSR Integration of Routing and Switching
MPLS (Multi Protocol Label Switching) Traditionally, switches have offered better performance than routers in terms of the speed at which data can be forwarded. However, routers can be configured to make sophisticated decisions about the processing of datagrams. As well as forwarding a packet based upon destination IP addresses, a router can classify packets based on other header fields, including source address and TCP (Transmission Control Protocol) port numbers. This leads to the question, why not build a device that combines fast forwarding across the core of a network based upon classification of packets carried out at the edge of the network? While this is essentially what an IP over ATM approach achieves, the key innovation of the MPLS approach was the use of traditional IP routing protocols to determine how these switched paths should be set up. In MPLS, a switching model closely coupled to the IP layer it was intended to support became available for the first time. This leads to the idea of LSRs (Label Switched Routers), devices that integrate the best of both routing and switching. Whereas traditional layer 2 switching was not integrated with the IP layer, MPLS is closely coupled to the routing and addressing schemes of the IP layer.
2.6
© Wray Castle Limited
TY2702/v3.1
Options for Layer 2 Virtual Circuits
MPLS Applications
FEC
L3 Control
L2 Control
Simple Packet Forwarding
IP routing table
‘Any’ IP routing protocol
LDP
MPLS VPN
per-VPN routing table (VRF)
‘Any’ IP Routing CE-PE MP-BGP in core
MP-BGP
MPLS Traffic Engineering
MPLS tunnel definition
Combination of manual configuration and TE extensions to OSPF/IS-IS includes FRR
RSVP-TE or CR-LDP
VRF – Virtual Routing and Forwarding FRR – Fast Re-Routing
MPLS Applications View The underlying principles of MPLS have been tailored to several MPLS-based applications. These all have the same core components, but they are implemented in a different way. Simple Packet Forwarding Simple packet forwarding is the most general and basic of MPLS applications. It typically uses the LDP (Label Distribution Protocol) to carry label-binding information between LSRs. The layer 3 control protocol can be any conventional routing protocol. In this case the FEC (Forwarding Equivalence Class) table is simply the conventional routing table found in any router. Packet forwarding is widely used to build simple MPLS-based networks where no specialized traffic engineering is required. A common early deployment is to support MPLS VPNs, which require an MPLS core over which to operate. MPLS VPNs MPLS VPNs provide an alternative to traditional layer 2 VPN services, and are based upon running customer IP traffic across an MPLS core. In order to maintain separation between customer address spaces, separate routing tables must be maintained by the implementation, and the customer sites are modelled by extensions to the BGP (Border Gateway Protocol), so that all customers’ routing remains external to the internal routing of the service provider network. MPLS Traffic Engineering Traffic engineering using MPLS aims to improve the control and manageability of IP-based networks by adding explicit steering of traffic alongside the normal routing-based control methods. To propagate the correct layer 3 information between nodes, extensions have been defined to traditional routing protocols, and a signalling model is used to establish label bindings, using extensions to the RSVP (Resource Reservation Protocol), or to LDP.
TY2702/v3.1
© Wray Castle Limited
2.7
Next Generation Transmission LSR
edge-LSR
edge-LSR
Label Switched Path (LSP)
MPLS and ATM terminology compared MPLS
ATM
Function
edge-LSR
ATM edge switch
Operates at the boundary of the network. Maps input packets onto L2 network.
LSR
ATM switch
Operates in the core of the network, switches.
LSP
Virtual Circuit and Virtual Path
Logical connection between a pair of edge devices, across which L2 switching operates.
MPLS and ATM Terminology MPLS introduces some new terminology for layer 2 switching. An LSR is an MPLS layer 2 switch, which also has the appropriate control plane functions to participate in setting up and tearing down LSPs. This is similar to an ATM SVC switch in respect of the user plane, but very different in respect of the control plane. An LSP is an end-to-end MPLS virtual connection between a pair of edge-LSRs, and across a network of LSRs. This is similar to ATM VCs and VPs. An edge-LSR is an LSR that originates or terminates LSPs and can classify IP traffic for forwarding across the most appropriate LSP by placing the packet in a FEC (Forwarding Equivalence Class). This is similar to an ATM edge switch. An FEC is a collection of different packets that are treated identically by the MPLS network. So, for example, in a best-endeavour internet, all packets to the same aggregate network prefix would typically be within the same FEC.
2.8
© Wray Castle Limited
TY2702/v3.1
Options for Layer 2 Virtual Circuits
edge-LSR
edge-LSR
LSR
2
1
MPLS Shim header
2
Label 20 bits
LFT FEC 5 6 . . .
3
1
TTL 8
LFT
Out Interface Label 2 2
EXP S
In Out Interface Label Interface Label
23 41
1 1 . . .
23 41 . . .
2 2 . . .
37 44 . . .
NHLFE
MPLS Shim Header and MPLS Packet Forwarding MPLS adds a shim header to the packet being switched through the network. It uses information in the header to switch packets through the network and for the purposes of managing per hop behaviour, i.e. QoS. The shim header contains the following fields:
label – 20 bits EXP (Experimental) bits – 3 bits S (Stack) bit – 1 bit TTL (Time To Live) bits – 8 bits
The 20-bit label is used to identify a packet for label forwarding. The EXP bits are used for QoS and the S bit indicates if a label stack is in place, or that this is the last label in the stack (i.e. S=1). The TTL is effectively a hop count. Assuming for the moment that appropriate LSPs have been established, and the edge-LSR can determine the most appropriate FEC to use for any incoming packet, then the forwarding operation is straightforward and similar to that of virtual circuit technologies such as Frame Relay and ATM. The NHLFE (Next Hop Label Forwarding Entry) within an LSR LFT (Label Forwarding Table) maps an inbound label to the appropriate outbound label for the path, and writes the new label into the packet. At the ingress edge-LSR, inbound packets are mapped from their FEC to the appropriate initial label value. At the egress LSR, the MPLS label is removed from the packet and conventional layer 3 routing forwards it towards its final destination.
TY2702/v3.1
© Wray Castle Limited
2.9
Next Generation Transmission Customer router
Customer router CE router
PE router
PE router
Provider routers
LSR
LSR LSR
LSR LSR
IP
CE router
IP 1 2
LSR
IP 1 3
IP 1 4
IP packet within MPLS label stack
Conventional IP packet from customer
1 = VPN label 2, 3, 4 = MPLS trunk labels
IP
Conventional IP packet to customer
PE – Provider Edge CE – Customer Edge
Architecture of MPLS-based IP-VPNs MPLS VPNs operate from a service perspective at the IP layer and classify routers in the customer and service provider network into one of four types. CE and PE routers operate at the boundary of the customer and service provider networks respectively. Unlike the layer 2 VPN model, the CE and PE routers are peers from a routing perspective. The VPN functionality is centred on the PE router. The CE router typically requires no VPN-specific configuration, simply treating the PE router as the next hop router in a ‘private’ network. The P (Provider) routers in the service provider core are also ignorant of the VPN address and routing information, and simply provide transport across the core network. The C (Customer) routers are conventional enterprise routers, with no special relationship to the VPN service. MPLS VPNs assume that the service provider operates an MPLS core between PE routers to which customers attach, and that this core has mechanisms for the establishment of LSPs between these edge routers. The MPLS core LSPs may have been manually provisioned, or may have been established by another MPLS control plane mechanism. This is all independent of the MPLS VPN service, but this infrastructure is required for the MPLS VPN model of RFC 2457 to operate. This separation of the core routing from the VPN functionality achieved by MPLS VPNs is possible because the MPLS VPN architecture uses label stacking to tunnel a customer’s VPN traffic across the MPLS core. Decisions about how to switch the traffic are made at the originating PE router, which understands the customer VPN locations and the LSPs in place across the core. Therefore it can apply a pair of labels as traffic enters the network from customer sites. The inner label is a VPN label allowing the traffic to be routed to the correct customer site at the destination PE router. This label is not examined or changed by the core routers. The outer label is a conventional LSP label, which allows the packet to be switched across a trunk LSP through the network core joining the PE routers. This label is examined and modified at the core routers, and operates like a conventional virtual circuit identifier.
2.10
© Wray Castle Limited
TY2702/v3.1
Options for Layer 2 Virtual Circuits
L2 PVC (e.g. Frame)
L3-VPN (IP-VPN)
L2-VLAN (VPLS)
Provisioning of new site requires multiple new PVCs
Provisioning of new site requires provisioning in single PE router
Provisioning of new site requires provisioning in single PE-router
No visibility of customer routing in SP core
Visibility of customer routing in SP core
No visibility of customer routing in SP core
Traditional serial interfaces
Traditional serial interfaces
10, 100, 1000, 10,000 Mbit/s low cost WAN interfaces
All routing issues responsibility of customer – SP has simple PVC network
Complex routing issues for fault/performance management by SP
All routing issues responsibility of customer – SP has simple VLAN network
Motivation for MPLS-based VPLS In addition to IP VPNs implemented using an MPLS core, there is increasing interest in a multipoint bridged service generally known as VPLS (Virtual Private LAN Service). This is the topic of current Internet drafts, including draft-ietf-l2vpn-vpls-ldp-09.txt, dated June 2006. Whereas in IP-VPN services the service provider participates in the routing of customer traffic, in a VPLS the service provider sees a flat layer 2 Ethernet network and all routing is carried out by the customer premises routers. Each approach has advantages and disadvantages.
TY2702/v3.1
© Wray Castle Limited
2.11
Next Generation Transmission
Full mesh of MPLS-LSPs between PE routers FIB instance for ‘blue’ VPLS instance CE
CE
Blue
Blue
Red
Red
FIB per VPLS service instance
FIB instance for ‘red’ VPLS instance PE router
P router
PE router
MPLS VPLS Architecture The architecture defined in the current VPLS drafts builds upon the approach taken to implementing IPVPNs using MPLS. PE routers connect customers to the service provider network and label stacking tunnels customer traffic with VPLS identifiers across an MPLS core LSP network, which fully meshes the PE routers. Where this solution differs from the IP-VPN service is in the implementation of a learning bridge between the PE routers, rather than the propagation of customer routes. When a customer is attached to a physical circuit, either the port is associated directly with their VPN service and its identifier, or (more usually) an 802.1q VPN_ID tag representing the customer VLAN is mapped internally to a separate instance of a FIB (Forwarding Information Base). This is the bridging equivalent of the VRF (Virtual Routing and Forwarding) used in IP-VPNs. Configuration of an instance of the VPLS service only requires that the physical port is mapped to the customer VPLS identifier in the PE router, or that the 802.1q tag is mapped to the VPLS identifier in the PE router.
2.12
© Wray Castle Limited
TY2702/v3.1
Options for Layer 2 Virtual Circuits Performance evaluation and optimization of operational networks Is the bandwidth utilization on these links within acceptable limits?
Measurement, characterization, modelling and control of Internet traffic Is this traffic meeting its Service Level Agreement (SLA) on delay, delay variation and loss? Usually supported by Differentiated Services (DiffServ)
What is MPLS Traffic Engineering? RFC 2702 defines Internet traffic engineering as ‘That aspect of network engineering dealing with the issue of performance evaluation and optimization of operational networks. Traffic engineering encompasses the application of technology and scientific principles to the measurement, characterization, modelling and control of Internet traffic.’ As this definition suggests, successful traffic engineering needs to address the performance of the network from two distinct perspectives. It seems that the CR-LDP (Constraint-based Routing Label Distribution Protocol) is used in optical networks, whereas the RSVP-TE (Resource Reservation Protocol – Traffic Engineering) is widely used elsewhere. Traffic-Oriented Performance Traffic-oriented performance optimization ensures that the QoS experienced on individual traffic streams is optimal in terms of delay, delay variation and packet loss. Resource-Oriented Performance Resource-oriented performance optimization ensures that the utilization of scarce resources in the network is optimized, including bandwidth, memory and processing power.
TY2702/v3.1
© Wray Castle Limited
2.13
Next Generation Transmission LDP Hello Packet Sent to 224.0.0.2 (Port 646) LDP Hello Packets
Establish LDP session between neighbour Label Switched Routers
TCP SYN (646) TCP SYN + ACK (646) TCP ACK (646)
Egress
Ingress Request Label to Network A
Request Label to Network A
+ Attributes Label Mapping 19
+ Attributes Label Mapping 21
P1
PE2
Database
OSPF v2 or IS-IS
Database
Network A PE1
OSPF v2 or IS-IS
Database
TE (Traffic Engineering) Label Distribution Protocols – CR-LDP TE is not QoS; it is used to manipulate traffic flows for that best fit the network topology. MPLS TE is the process of building links between nodes with an available bandwidth and then making allocations against that in support of circuits, reserving the bandwidth as required. For MPLS to support TE it needs to extend an existing IGP (Interior Gateway Protocol), such as OSPF and IS-IS (Intermediate System to Intermediate System), to include TE extensions. It also needs to extend the label distribution protocols used for the creation of label switched paths. These protocols are CR-LDP and RSVP-TE, both of which are supported in the ASON (Automatically Switched Optical Network) architecture. CR-LDP (Constraint-based Routed Label Distribution Protocol) LDP starts a discovery process by periodically sending hello packets over UDP using multicast address (224.0.0.2 using port 646). Once a neighbour has been detected, a TCP session (using port 646) is established between the pair. Once this has been completed the neighbours are free to start advertising labels. Notification messages are used to indicate the ongoing status of the neighbours and the labels. CR-LDP uses attributes as per RFC 3036 and RFC 3212, which provides extensions to the LDP model to support such things as bandwidth in order to support provision of links using traffic engineering.
2.14
© Wray Castle Limited
TY2702/v3.1
Options for Layer 2 Virtual Circuits
RSVP-TE Egress
Ingress PATH to Network A
PATH to Network A
+ TE Attributes
+ TE Attributes
RESV Label 19
PE2
Network A
RESV Label 21
P1
PE1
TE (Traffic Engineering) Label Distribution Protocols – RSVP-TE RSVP-TE (Reservation Protocol – Traffic Engineering) RSVP-TE is an IETF-defined protocol as per RFC 2205 and is used to establish connections that may be subject to routing constraints in an MPLS network. RSVP-TE is an extended version of IP’s RSVP and includes additional fields to support parameters such as bandwidth. GMPLS extends both CR-LDP and RSVP-TE to support technologies beyond packet, frame and cellbased switching and now includes time division, lambda switching and fibre/physical switching. GMPLS is further extended to support the requirements of the GENERALISED_UNI object as per the OIF UNI-01.0. RSVP-TE and CR-LDP both allow for traffic engineering, but come from a datacoms background and have no knowledge of call control. To this end the OIF UNI provides extensions in support of the basic call model, i.e. call control. This also applies to the E-NNI, which is used in ASON between domains. This does not apply to the I-NNI as this is an intra-domain interface that may be more proprietary in nature. The types of circuits that can be established include SPCs (Soft Permanent Connections) and SCs (Switched Connections). Normally, SPCs are established by a management platform using a central circuit database, while SCs are more likely to be set up on demand when triggered by signalling from a user/client device over the UNI.
TY2702/v3.1
© Wray Castle Limited
2.15
Next Generation Transmission
PE2
P2
P1
PE1
Ingress
Egress
PE1
L3
PE1
L2
PE1
SWAP
L3
packet L3
L1
SWAP
L2
L2
packet L2
L1
packet L1
Data Flow
Downstream Nodes
Label Distribution Mode GMPLS prefers the use of ordered label distribution as opposed to independent control. With ordered control, the PE router acting as the egress initiates the LSP by assigning a label (L1), which corresponds to its loopback address. It then advertises this mapping to its peer router (P1). P1 checks its IGP routing table to ensure that PE1 is on the shortest path to the destination. If successful it will assign its label to reach PE1 and together with the label from PE1 enter this into its forwarding table. P1 then advertises to P2 a label (L2) to use to get to PE1. P2 repeats the checks and, if successful, assigns its label (L3) and then advertises this to PE2. PE2 performs the final check for this LSP and, if successful, enters the label (L3) into its forwarding table to reach PE1. Once the LSP is successfully established, traffic wishing to use this LSP will be mapped by the ingress LSR (PE2) through the forwarding table using the label (L3) provided by P2. Independent mode would assign labels for all egress PEs that it can see from its IGP and then advertise these to its neighbours. The neighbours work independently of each other and only when all have managed to determine a suitable label for the shortest path is the LSP in place. If one node en route fails to set up a mapping, other LSRs are likely to be unaware of this. Ordered LSP control mode would mean that the LSR would have to wait to receive bindings from its downstream neighbours before sending labels it has generated upstream. Independent mode allows LSRs to distribute label bindings freely to their neighbours either downstream or upstream. The terms ‘upstream’ and ‘downstream’ are used with reference to the direction of the data flow along an LSP, i.e. from the point of ingress to the point of egress, and not to the direction in which the labels are sent. In the example, labels are distributed from PE1, the egress point, to PE2, the ingress point. Data flow is from PE2 to PE1 along the LSP. Downstream nodes are P2, P1 and PE1.
2.16
© Wray Castle Limited
TY2702/v3.1
Options for Layer 2 Virtual Circuits Downstream on demand
PE2
P2
P1
PE1 192.168.10.0/24
Request Label to 192.168.10.0/24 Use Label 21 to 192.168.10.0/24
Unsolicited downstream used with independent control
PE2
P2
P1
PE1 192.168.10.0/24
Use Label 21 to 192.168.10.0/24
Label Advertisement Mode Labels in GMPLS should be using ‘downstream on demand’ mode, whereby an upstream LSR requests of its downstream neighbour a label mapping to a specific destination. The downstream LSR should then respond with a suitable label to use to support the LSP being built to the destination. One problem in any MPLS network is to make sure that all nodes are configured with the same method. If an LSR was configured to support downstream unsolicited operation whilst the others were all supporting downstream on demand, it would be providing unnecessary information and would not take part if a request for a label was received from an upstream device.
TY2702/v3.1
© Wray Castle Limited
2.17
Next Generation Transmission P4
P3 PE1
PE1
L4
L5
PE1
P2 PE1
PE1
L2
PE1
PE1
L2
PE2 PE1
L2
Conservative
PE1
L2
PE1
L5
PE1
L4
L2 PE1
L4
PE1
L2
L3
P5
P6
PE1
L3
Use this remember these
Liberal
Label Retention Mode GMPLS does not make any provision for the type of label retention; this may be left to implementers to decide. In either case, LSRs will receive label advertisements from downstream LSRs. They will check their internal routing functions, i.e. IGP, and determine which label is from a peer node on the shortest path to the destination. In the case of conservative label retention it will only store the entry representing the shortest path. For liberal label retention it will remember all (or a certain number of) labels pertaining to all paths towards the destination. The main problem with liberal retention would be that of the memory requirements needed to store all of these. However, in the case of a failure, liberal retention would already have an alternative label to use to the destination whilst conservative mode would need to signal and learn an alternative.
2.18
© Wray Castle Limited
TY2702/v3.1
Options for Layer 2 Virtual Circuits PE2
Explicit or Strict Source Routing P3
PE1
PE3 P2
P1
Loose Source Routing P3
PE1
PE3 P1
P2
Routing GMPLS supports both explicit and loose source routing in support of the establishment of LSPs. For explicit routing neighbour nodes will pass a request including the remainder of the path towards the destination. Then at each successive node they will remove their entry from the list and forward the request to wards the next destination on the list, until naturally all nodes in the explicit list have been contacted and labels have been assigned to support the ER-LSP. An explicit list will therefore initially contain a complete routing link by link between the two end points. Loose source routing allows for an intermediary node to use what it thinks is the best route towards the destination, as learned from its IGP. Loose source routing may contain a list of intermediary points; although this will not be the intended path, they will be points along its path. It is left to the nodes that appear in this list to select a route towards the next entry. Explicit or strict source routing is a valuable traffic engineering tool as it allows an operator to specify specific routes around its network for its customers’ traffic, which may differ from the IP preferred route.
TY2702/v3.1
© Wray Castle Limited
2.19
Next Generation Transmission
2.20
© Wray Castle Limited
TY2702/v3.1
Next Generation Transmission
APPENDIX A
FRAME RELAY
© Wray Castle Limited
AI
Next Generation Transmission
AII
© Wray Castle Limited
Options for Layer 2 Virtual Circuits Incoming
Outgoing
Incoming
Inter- DLCI Inter- DLCI face face
d
1
c
8
d
9
c
10
2
d
a d
c
3
d
1
c
4
d
10
2
d
a b
FRAD
Outgoing
Inter- DLCI Inter- DLCI face face
b d
c
FRAD
c c a
Incoming Fragment + Address (Data Link Connection Identifier (DLCI))
Outgoing
Inter- DLCI Inter- DLCI face face
a
8
c
3
b
9
c
4
2
c
Frame Relay – Frame Switching and Addressing A customer may use Frame Relay to interconnect several geographically disparate sites. Computer applications as well as VoIP (Voice over IP) services are typical of the services supported. The FRAD (Frame Relay Assembler/Dissembler) takes the information in from the customer equipment and encapsulates the traffic into a Frame Relay frame. The frames are then addressed using a DLCI (Data Link Connection Identifier). The DLCI is bound to a fragment. The fragment is usually a number of TDM timeslots; in the example shown, two timeslots have been combined to form the fragment. These timeslots in turn are usually carried in a TDM structure such as an E1/T1. The circuit path through the network may be either permanently set i.e. PVC, or dynamically established as an SVC. For SVCs a signalling protocol between the frame switches is required; this could be established using Q.933 and Q.922. The circuit path in this example is a PVC – it has been configured centrally. Each switch has a simple look-up table based on the interface and DLCI values. Thus if the FRAD associated with the laptop wishes to send information to the desktop PC, it will forward this into the network with a DLCI value of 1. This incoming value will be switched out of interface ‘c’ with a value of 8. The frames incoming at the second switch will have a incoming value of 8. The second switch will look up its table and forward the frames out of interface ‘c’ with a new value of 3. The final switch in the chain will see an incoming value of on its interface ‘c’, and as a result of its table settings it will forward the information towards the FRAD with a value of 1 on interface ‘d’.
TY2702/v3.1
© Wray Castle Limited
A2.1
Next Generation Transmission
F L A G
Header
Information
1598 octets
Address (6 bits) Address (4 bits)
C/R
EA (0)
DE
EA (1)
FCS
F L A G
2 octets 1 octet
Frame Relay over TDM The Frame Relay frame is usually carried in a TDM fragment, which in turn could be transported using a transmission technology such as SONET/SDH. This could be then transferred over fibre as a SONET/SDH frame or carried in an individual wavelength as part of a WDM network.
Frame Relay Frame Structure An example of the frame relay frame is shown with the following fields:
Flag FCS (Frame Check Sequence) Information Field Header
Flags are used to delimit the Frame Relay frame set to 01111110. The FCS uses a 16-bit CRC (Cyclic Redundancy Check), which is computed across the frame to allow the receiver to check for transmission errors. The Information Field is the payload of the frame. It can be up to a maximum of 1598 octets. The header shown here is set to 2 octets, as indicated by the Extension bit (EA) set to 0 in the first octet and then 1 in the second, where the 1 indicates this is the end of the header, the header could be extended over 3 or 4 octets. The header could be extended further to carry a longer address field. Here, the DLCI is a 10-bit value over two octets. DE (Discard Eligible) is used in congestion control, as are the FECN (Forward Explicit Congestion Notification), which is used upstream to inform other devices that congestion has occurred, and the BECN (Backward Explicit Congestion Notification), which is used on any frames in the downstream direction to inform downstream switches of congestion. C/R (1 bit) is used to designate whether the frame is a command or response. Its use is not defined by frame relay and as such is left to implementors to decide on its use. Therefore this field may not be used.
A2.2
© Wray Castle Limited
TY2702/v3.1
Options for Layer 2 Virtual Circuits
Discard on entry
EIR
CIR
Excess Information Rate (EIR) Attempt to deliver Mark 'Discard Eligible' Committed Information Rate (CIR) Deliver
Access Rate
QoS (Quality of Service) The CIR (Committed Information Rate) is the data rate at the ingress point that has been contracted with the customer. It must be supported by the network under normal conditions. The EIR (Excess Information Rate) is at a level above the CIR. The communications provider will attempt to deliver the frames that exceed the CIR but are below the EIR limit. However, it will mark these frames as ‘Discard Eligible’, and as they pass through the network they will be discarded by a subsequent switch through which they intend to pass which is currently suffering from congestion. Any frames at the ingress above the EIR will be discarded on entry.
TY2702/v3.1
© Wray Castle Limited
A2.3
Next Generation Transmission
Frame Relay
TDM
SONET/SDH
Frame Relay over TDM The Frame Relay frame is usually carried in a TDM fragment, which in turn could be transported using a transmission technology such as SONET/SDH. This could then be transferred over fibre as a SONET/SDH frame or carried in an individual wavelength as part of a WDM network.
A2.4
© Wray Castle Limited
TY2702/v3.1
Next Generation Transmission
APPENDIX B
ATM
© Wray Castle Limited
BI
Next Generation Transmission
BII
© Wray Castle Limited
Options for Layer 2 Virtual Circuits
VCC Endpoint 1
Virtual Path Switch 1
A
Virtual Channel Switch
Virtual Path Switch 2
B
C
Virtual Path Switch 3
D
VCC Endpoint 2
E
F
Virtual Channel Connection (VCC) VC Link 1
VC Link 2
VCI-7 VPI-1
VC Layer
VCI-8
VCI-7 VP Link
VP Link
VP Link
VP Link
VP link
VPI-1
VPI-2
VPI-3
VPI-4
VPI-5
Virtual Path Connection 1
VCI-8 VPI-5 VP Layer
Virtual Path Connection 2
ATM Terminology – VPs (Virtual Paths) and VC (Virtual Channel) Switches ATM is a connection-oriented switching technology within which the basic unit of transport is a fixed length packet known as a cell. Cells transport data flows over an ATM connection. An ATM connection is referred to as a VCC (Virtual Channel Connection). VCCs may be preconfigured, in which case they are known as PVCs (Permanent Virtual Connections), or they may be set up automatically using a suitable control protocol, in which case they are known as SVCs (Switched Virtual Connections). VCs are identified using a two-layer channel identifier consisting of a VPI (Virtual Path Identifier) and a VCI (Virtual Channel Identifier). This allows for switching at two levels. Individual circuits may be identified and switched using both the VPI and VCI; devices capable of this are generally known as VC switches. Groups of circuits may also be switched using just the VPI; devices capable of this are known as Virtual Path switches. VC switches must be able to terminate a VP, and by implication are also VP switches. In this example shown, an ATM VC has been established between VCC Endpoint 1 (A) and VCC Endpoint 2 (F) through several VP and VC switches. At A the VC is identified as VPI-1: VCI-7. This is transported over a physical connection (such as SDH) to Virtual Path Switch 1 (B). Virtual Path Switch 1 is not interested in the value of the VCI; it is simply configured to switch the traffic from VPI-1 to VPI-2. Virtual Path Switch 2 (C) is similarly configured to switch VPI-2 to VPI-3. Thus VCI-7 is transferred over VPI-1, then VPI-2, and finally it arrives on the Virtual Channel switch (D) on VPI-3. The Virtual Channel switch (D) is configured to switch cells arriving on VPI-3: VCI-7 to VPI-4: VCI-8. The path is completed to Endpoint 2 (F) via Virtual Path Switch 3 (E). Note that cells for this circuit arrive at Endpoint 2 (F) labelled as VPI-5: VCI-8. In the VP layer, cells have been transported over several VP links. A VP link exists between any pair of devices applying or swapping a VP label. There are two VP connections used in this example. A VP connection is simply a concatenation of VP links. A VP connection terminates at points where the VCI must be acted on. In the VC layer, two VC links have been used; A-D and D-F. A VC link exists between a pair of devices applying or swapping the VCI. The complete connection between endpoints is known as a VCC. A VCC is simply a concatenation of VC Links. The ability to switch groups of circuits under a single VP label ensures that size of switching tables at a VP switch is minimized.
TY2702/v3.1
© Wray Castle Limited
B2.1
Next Generation Transmission
Customer Site UNI Private – ATM-F (UNI+OSPF) Public – ITU-T B-ISUP
ITU-T: Q.2931 Q.2971 ATM-Forum UNI 3.0/3.1 UNI 4.0 (Q.2931)
Customer Site
9 Octets
UNI
NNI or PNNI
261 Octets
STM-1
UNI
VC-4 9
SOH
J1 B3 C2 G1
Customer Site ***
***
Incoming Outgoing Outgoing Incoming InterInterInter- DLCI InterVPI VCI DLCI VPI VCI face face face face
a
10
1
b
11
4
a
4
2
b
11
2
2
***
ATM cell VC-4 POH 53 Octets
ATM Interfaces and Adaptation Layers ATM allows operators/vendors to manage bandwidth across any interface, while providing services to both circuit- and packet-switched information. These valuable assets allow any application software to own dedicated bandwidth in order for the application to communicate. User data/traffic is no longer confined to 64 kbit/s timeslots on a physical layer transport system such as an E1 (PDH). Using ATM, greater or smaller bandwidths can be configurable, dependent on requirements. Bandwidth may be changed by different means, dependent on the type of ATM virtual circuit created. ATM switches fixed-length packets (cells) of information in the connection-oriented mode of operation, ensuring that all cells relating to a specific connection follow the same route through the network. Despite its name, the ATM cell stream is synchronous, and is ideally suited for delivery over synchronous transmission systems such as SDH. It is the way in which cells relating to a particular connection are transported that can be asynchronous rather than the operation of the complete cell stream. ATM has defined two interfaces, that of the UNI (User Network Interface), which connects customers to ATM networks, and the internal NNI (Network to Network Interface). The signalling protocol used across the UNI is usually based on Q.931 i.e. ITU-T Q.2931. Both the ITU-T and ATM Forum use these standards for their UNI. UNI signalling would be required specifically to support SVCs (Switched Virtual Channels). Most major deployments do not use SVCs and as such do not deploy UNI signalling. A positive exception to this could be seen in 3G networks where Q.2931 signalling is used to provide circuits for real time voice services i.e. Circuit Switched. The ATM Forum and ITU differ when it comes to the NNI. In the case of the ATM Forum this is PNNI (Private NNI) which is based on the UNI signalling with a dynamic routing protocol based on OSPF. The ATM Forum also extended some of OSPF's Link State Advertisements and renamed them as PTSEs (PNNI Topology State Elements). The PTSE LMI (Local Management Interface) uses VPI/VCI of 0/16. The ITU-T version of the NNI is their PNNI (Public NNI) where the signalling is based on the existing SS7, where the SS7 messages have been extended to include ATM parameters. This approach is consistent with their view of ATM as part of B-ISDN.
B2.2
© Wray Castle Limited
TY2702/v3.1
Options for Layer 2 Virtual Circuits
Enterprise VoD
Internet
VoIP
Voice AAL Type 0
Q.2931 B-ISUP
Layer 2
SNMP CMIP
User
SAAL
AAL
Typical use Raw ATM cells containing unformatted data
1
CBR services
2
Real-time services
5
Packet data and Signalling
ATM Layer Physical e.g. SONET/SDH, PDH, Packet 1
The ATM Layered Reference Model The ATM layered reference model consists of three layers: physical, ATM, and AAL (ATM Adaptation Layer). The physical layer provides for the transport of cells between ATM cell switching interfaces. It performs functions such as cell delineation and the insertion of idle cells. Suitable physical layers include SONET/SDH. The ATM layer provides for the switching of cells between interfaces. The choice of output virtual link for any given input link is based on routing table information held within the ATM switches. The AAL provides for the support of multiple applications by adapting the higher-layer information for transfer across the ATM switching network. In effect, the AAL isolates the ATM layer from the complexity of functions associated with multiple applications. SAAL (Signalling AAL) is a specific implementation of AAL5 with two additional sublayers called SSCF (Service Specific Coordination Function) and SSCOP (Service Specific Connection Oriented Protocol). The higher layer may consist of functions required to exchange user data. Higher layers may also include access signalling, i.e. Q.2931; core network (PNNI) signalling using B-ISUP. The higher layers will also support management protocols such as CMIP (Common Management Information Protocol) or SNMP (Simple Network Management Protocol).
TY2702/v3.1
© Wray Castle Limited
B2.3
Next Generation Transmission a) User–Network Interface (UNI) Octets
48
Information Bits
5
HEC 8
C L PT P 1
VCI
3
16
VPI
G F C
8
4
b) Network–Network Interface (NNI) Octets
48
Information Bits
5
HEC 8
C L PT P 1
3
VCI 16
VPI 12
ATM Cell Fields The five-octet header contains the following fields:
GFC (Generic Flow Control) VPI (Virtual Path Identifier) VCI (Virtual Channel Identifier) PT (Payload Type) CLP (Cell Loss Priority) HEC (Header Error Control)
The 4-bit GFC is used to control traffic between the user and ATM network, thus it is only seen in the UNI, not the NNI. It provides local functions only. The VPI identifies a virtual path link between two nodes. The VPI allows a VP switch to route cells based on information held within the node’s switching table. The VCI identifies a VCL between two adjacent nodes. The VCI (along with the VPI) allows a VC switch to route cells based on information held within the node’s switching table. The 3-bit PT indicates the nature of the payload information. It distinguishes between user data and management data. Cells with their CLP set to 1 are deemed eligible for discard by the network in the event that congestion is encountered within the network. Thus it provides a method for prioritizing cells. HEC is used to carry out a CRC of the header. The HEC does not report on the payload of the cell, only the header. If an error is found, the cell is discarded. Though this field is provided by the ATM layer, it is populated and used by the physical layer.
B2.4
© Wray Castle Limited
TY2702/v3.1
Options for Layer 2 Virtual Circuits ATM Service Category
≡
ATM Transfer Capability
ITU-T ‘ATM Transfer Capability’
Typical Use
Constant Bit Rate (CBR)
Deterministic Bit Rate (DBR)
Real-time, QoS guarantees
real-time Variable Bit Rate (rt-VBR)
(For further study)
Statistical mux, real-time
non-real-time Variable Bit Rate (nrt-VBR)
Statistical Bit Rate (SBR)
Statistical mux
Available Bit Rate (ABR)
Available Bit Rate (ABR)
Resource exploitation feedback control
Unspecified Bit Rate (UBR)
No equivalent
Best effort, no guarantees
No equivalent
ATM Block Transfer (ABT)
Burst level feedback control
ATM Forum ‘ATM Service Category’
ITU-T and ATM Forum Correlation An ATC (ATM Transfer Capability) is intended to represent a class of ATM connections that have homogeneous characteristics in terms of traffic pattern, QoS requirements and possible use of control mechanisms, making it suitable for a given type of resource allocation. ATC is an ITU-T definition; the ATMF (ATM Forum) equivalent definition is termed an ATM Service Category. A comparison of the two definitions are shown. Referring principally to the ITU-T definitions, the transfer capabilities are defined as follows and summarized below:
DBR (Deterministic Bit Rate) SBR (Statistical Bit Rate) ABR (Available Bit Rate) ABT (ATM Block Transfer)
The DBR is based on a constant (maximum) bandwidth allocation. It is termed CBR (Constant Bit Rate) by ATMF. The SBR is based on an average bandwidth allocation. This is termed VBR (Variable Bit Rate) by ATMF. The ABR is based on dynamic bandwidth allocation, where the allocated resources vary with time depending on network availability. The ABT is based on block or burst allocation, and is specific to ITU-T. In addition, the ATMF has split the VBR category into rt-VBR (real-time Variable Bit Rate) and nrt-VBR (non-real-time Variable Bit Rate) and has introduced the ATM Service Category known as UBR (Unspecified Bit Rate), which is considered only by ATMF. Here, no explicit resource allocation is performed; neither bandwidth nor QoS objectives are specified.
TY2702/v3.1
© Wray Castle Limited
B2.5
Next Generation Transmission Traffic Contract ATM Transfer Capability Connection Traffic Descriptor Source Traffic Descriptor Peak Cell Rate (PCR) Sustainable Cell Rate (SCR) Minimum Cell Rate (MCR) QoS Class QoS Parameters (i.e. CLR, CTD, CDV)
" +RVW $70&HOOV &$& 81,
1HWZRUN
83&
Traffic Contract A traffic contract specifies the negotiated characteristics of the ATM layer connection at the UNI. The network must only accept a new connection if the traffic contract can be honoured and must ensure that the user adheres to this contract during the connection by policing the connection traffic flow. The traffic contract identifies an ATC (ATM Transfer Capability). The ATC is realized by a source traffic descriptor (e.g. peak cell rate, mean cell rate), associated CDV (Cell Delay Variation) tolerances and requested QoS class. All are declared by the user at connection set-up by means of signalling (SVC) or subscription (PVC). Once the connection has been accepted, the value of the CAC (Connection Admission Control) and UPC/NPC (Usage Parameter and Network Parameter Control) parameters are set by the network at the UNI and the NNI respectively. CAC represents a set of actions taken by the network at call set-up in order to accept or reject an ATM connection. UPC/NPC represent a set of actions taken by the network to police ATM connection usage, e.g traffic volume and cell routing. In other words UPC/NPC enforce compliance of ATM connection usage with the traffic contract.
B2.6
© Wray Castle Limited
TY2702/v3.1
Options for Layer 2 Virtual Circuits
Typically provided by SDH
OAM Hierarchical Levels OAM functions are performed on five OAM hierarchical levels associated with the ATM and physical layers of the ATM reference model. These functions, identified by the ITU-T, result in five bidirectional information flows, referred to as OAM flows. Not all of these flows need to be present, as OAM functions of a missing level are performed at the next higher layer. The levels are as follows: Virtual Channel Level (F5) This extends between network elements performing VCI termination functions, such as VC switches and CEQ (Customer Equipment). This level encompasses one or more VCLs (Virtual Channel Links) and may span a complete VCC (Virtual Channel Connection). Note that a virtual channel link is transported over a VPC and that a VCC is a concatenation of VCLs. Payload Type indicates the presence of OAM cells at this level. Virtual Path Level (F4) This extends between network elements performing VPI termination functions, such as VP crossconnects and CEQ. This level encompasses one or more VPLs (Virtual Path Links) and may span a complete VPC (Virtual Path Connection). A reserved VCI value is used to indicate presence of OAM cells. Transmission Path Level (F3) This extends between network elements assembling/disassembling the payload of a transmission system and associating it with its OAM functions. Cell delineation and HEC functions are required at each endpoint. The transmission path is connected through one or more digital sections. Digital Section Level (F2) This extends between section endpoints and comprises a maintenance entity. Regenerator Section Level (F1) A regenerator section is a portion of a digital section and as such is a maintenance sub-entity (such as a repeater). It should be borne in mind that the Physical Layer within the ATM model may be realized by technologies such as SDH or a cell-based technology. SDH will exchange its OAM F1 to F3 information within its own synchronous overhead channels, while a cell-based technology will need to identify cells specifically marked as OAM. TY2702/v3.1
© Wray Castle Limited
B2.7
Next Generation Transmission
VC-4 Payload (260 columns) J1 B3 C2 G1 F2 H4 F3 K3 N1
ATM Cell
VC-4 Path Overhead H4 byte used as a pointer to indicate the first occurrence of an ATM cell header in the same row as the H4 byte.
Mapping ATM Cells into SDH (Cell Delineation) The mapping of ATM cells is performed by aligning the byte structure of every cell with the byte structure of the VC used. According to the ITU-T, there are several ways in which ATM cells can be mapped into an SDH frame, including VC-4 use. Considering the VC-4 option, the diagram shows how ATM cells containing 53 octets could be mapped into the Virtual Container payload. The VC-4 is a standard 261-column payload, with the first column reserved for the VC-4 POH (Path Overhead); the remaining 260 columns are designated as the payload. The ATM cells are transported as a stream in the payload area, where each cell has the characteristic 53 octets, i.e. 5-octet header and 48octet data. The ATM cell header can be thought of as the cell’s FAW (Frame Alignment Word), which facilitates cell delineation. The H4 byte in the VC-4 POH is identified in G.707 as being ‘a generalized position indicator for payloads, which is payload dependent’. Thus the H4 byte is used as the pointer, indicating the first occurrence of an ATM cell header, which is found in the same row as the H4 byte. The 48 bytes of the ATM cell for data are scrambled prior to transmission to prevent the ATM signal from replicating the SDH frame sequence. The 5-byte header is not scrambled, however, as this would affect ATM cell delineation. The H4 byte indicates the start of an ATM cell to the scrambler/descrambler.
B2.8
© Wray Castle Limited
TY2702/v3.1
Next Generation Transmission
SECTION 3
CARRIER BASED ETHERNET AND TRANSMISSION SYSTEMS
© Wray Castle Limited
I
Next Generation Transmission
CONTENTS Transport Network Evolution
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3.1
Carrier Ethernet Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3.2 Motivation for Carrier Ethernet Services – Mobile Operator Perspective . . . . . . . . . . . . . . . . .3.3 Advantages and Disadvantages of Traditional Ethernet/GE . . . . . . . . . . . . . . . . . . . . . . . . . .3.4 Metro Ethernet Forum (MEF) Carrier Ethernet Defined . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3.5 MEF Terminology for Ethernet Services
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3.6
E-Line Services – Ethernet Private Line . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3.7 Ethernet Line Services – Ethernet Virtual Private Line (EVPL) . . . . . . . . . . . . . . . . . . . . . . . .3.8 Ethernet Private LAN (EP-LAN) Service
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3.9
E-Tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3.10 MEF Service Definition Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3.11 MEF Metro Ethernet Network Model
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3.12
The 802.1 Standards for Bridged Networks
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3.13
Service Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3.14 EVC Bandwidth Profiles (BWP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3.15 IEEE 802.1ad Provider Bridge . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3.16 Provider Bridge Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3.17 Ethernet Label Switching (ELS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3.18 Scalability of Provider Bridge (PB) Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3.19 Provider Backbone Bridging (PBB) Networks PBB Basic Network Architecture
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3.20
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3.21
MAC Learning in PBB Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3.22 Multiplexing Service Instances through a B-VLAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3.23 More on Service Multiplexing in a PBB Network
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3.24
Simple Provider Bridged Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3.25 II
© Wray Castle Limited
Carrier Based Ethernet and Transmission Systems
CONTENTS Hierarchical PBB Networks
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3.26
Benefits and Limitations of PBB Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3.27 Provider Backbone Bridging Traffic Engineering (PBB-TE) . . . . . . . . . . . . . . . . . . . . . . . . . .3.28 Transport Profile (MPLS-TP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3.29 MPLS-TP Transport Profile Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3.30 Carrier Ethernet Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3.31 Ethernet OAM Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3.32 802.3ah – EFM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3.33 CFM and Performance Management (PM)
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3.34
End-to-End Ethernet Service OAM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3.35 MEP and MIP Assignments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3.36 Ethernet Service OAM Service Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3.37 CFM Continuity Check . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3.38 CFM Fault Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3.39 Link Trace Message – MIP Address Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3.40 Loopback Procedures – CFM Fault Verification/Isolation . . . . . . . . . . . . . . . . . . . . . . . . . . . .3.41 CFM AIS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3.42 Performance Monitoring Y.1731 Frame Loss Ratio . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3.43 Performance Monitoring Y.1731 Delay and Delay Variation
. . . . . . . . . . . . . . . . . . . . . . . . .3.44
OAM Frame . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3.45 Ethernet Physical Layer Family . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3.46 LAN PHY and WAN PHY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3.47 LAN PHY and WAN PHY in WANs and MANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3.48 Ethernet Physical Layer Options
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3.49
© Wray Castle Limited
III
Next Generation Transmission
IV
© Wray Castle Limited
Carrier Based Ethernet and Transmission Systems
OBJECTIVES At the end of this section you will be able to:
briefly discuss the evolution of transport networks
list the advantages and disadvantages of LAN-based Ethernet
identify and discuss the five attributes used by the MEF to define Carrier Ethernet (CE)
discuss the terms UNI and Ethernet Virtual Connection
identify and discuss the range of CE services defined by the MEF
discuss Service Profiles, their relationship to BandWidth Profiles (BWP) and how BWPs may be assigned at a UNI
discuss the structure of 802.1Q and 802.1ad VLAN tags and how they may be used in a Provider Bridge network
identify tags associated with Provider Backbone Bridging (PBB) networks
discuss the operation of simple and hierarchical PBB networks
discuss the roles of Ethernet Label switching, PBB-TE and MPLS-TP as transport options for Carrier Ethernet services
list and discuss the functions associated with Ethernet OAM with particular reference to EFM, Connection Fault Management (CFM) and Performance Management (PM)
identify the roles associated with different OAM maintenance levels
discuss the roles of MEPs and MIPs in Ethernet OAM
with the aid of suitable diagrams explain the use of various messages used in CFM and PM operations
© Wray Castle Limited
V
Next Generation Transmission
VI
© Wray Castle Limited
Carrier Based Ethernet and Transmission Systems
ETH Client Services
MPLS IP-POS
PDH
ATM PBB-TE
Transport Networks G.805 Layered networks
MPLS-TP Characteristics: Connection oriented
SDH
Fast recovery
NG-SDH
Deterministic Sophisticated OAM
OTN Fibre
Static Provisioning
WDM
Optical Technology 1990 Transport eras
1995 1. Circuit
2000 2. Optical
2005 3. Packet
Transport Network Evolution Transport networks provide links between service platforms that are reliant on stable and reliable links between their various nodes and elements. In the early 1990s, the first era of transport networks based on a G.805, which describes a generic functional architecture of transport networks, were based on SDH and SONET to provide transport quality links between switching elements. SDH/SONET were designed against a TDM and ATM background to ‘efficiently’ manage sharing of the physical media. The characteristics generally associated with carrier transport system are shown in the diagram. WDM systems emerged to address the increasing demand for capacity. This led to the development of the OTN set of standards, also designed following G.805 principles, and in parallel to this the NG-SDH standards were produced. Both OTN and NG-SDH provided more efficient ways of dealing with packet transport. The requirement to further increase the efficiency of transporting packet data, using layer two aggregation, saw the introduction of carrier class layer two technologies including MPLS Transport Profile (MPLS-TP) and Provider Backbone Bridging Traffic Engineering (PBB-TE). These technologies provide a mechanism for the static provisioning of end-to-end connections, configured with the appropriate CoS and QoS, with options for building working and standby paths for resilience. They also provide a rich set of OAM functions. Modern transport networks aim to provide carrier class transport of Ethernet service frames. Carrier Ethernet Transport is not a single technology but a multilayer network using a range of the technologies shown above.
TY2702/v3.1
© Wray Castle Limited
3.1
Next Generation Transmission
Reliable Transport Network implemented using layer 1 and layer 2 technologies
LAN
Customer Bridge
Carrier Edge Bridge
MAN/WAN
Carrier Edge Bridge
LAN
Customer Bridge
Carrier Ethernet Network Normal Ethernet Frames
Carrier Ethernet Transport
Normal Ethernet Frames
Carrier Ethernet Services A carrier-based Ethernet service provides Ethernet connectivity between customer sites, over a MAN or WAN. This service is provided using a Carrier Ethernet Network that is assumed to provide reliable transport services. The transport service itself may be Ethernet based or could rely upon pseudo wire technologies or classic transmission techniques such as SDH using Packet over SONET (RFC 2615) or Generic Framing Procedure (GFP). The Ethernet layer 2 model of a service allows point-to-point and bridged networks and aims to compete with/replace traditional PVC services provided by ATM and Frame Relay.
3.2
© Wray Castle Limited
TY2702/v3.1
Carrier Based Ethernet and Transmission Systems Subscriber base growing strongly PDA
iPhone
Cost curve for TDM transport closely linked to traffic .
Blackberry
Meet me there at 5:00
Home
E-mail
Voice dominant
Web
Traffic TDM costs
Mobile Broadband EDGE (100 kbit/s) WCDMA (384 kbit/s)
Traffic/Revenue disconnect
1000’s Radio sites
HSDPA (7.2 Mbit/s)
Revenue
HSPA+ (24 Mbit/s) LTE (30-40 Mbit/s) Services: Downloads Interactive Games Video TV
Data dominant Mobile Backhaul Traditionally implemented using NxE1 TDM
Ethernet transport flattens the cost curve. Graph: source Light Reading
Motivation for Carrier Ethernet Services – Mobile Operator Perspective The mobile subscriber base continues to grow strongly. With the introduction of mobile broadband access, the proliferation of devices such as the Android, iPhone, PDAs and BlackBerry, and the popularity of high-bandwidth packet-based services such as downloads, interactive games, video and TV, the amount of traffic used by each subscriber is growing as well. Larger operators have thousands of cell sites and continuing traffic growth means they have to cope with massive amounts of capacity in the backhaul network. Capacity requirements are set to increase further with the deployment of HSPA+ and LTE technologies; initial deployments of LTE, a purely packet based technology, is likely to increase cell site traffic by 30–40 Mbit/s. With packet-based traffic likely to become dominant in the years to come, CAPEX considerations for transport systems are becoming critical. Continuing down the traditional route of building backhaul solutions based on an NxE1 TDM model is too costly. As the graph shows, there is a direct link between traffic growth and transport costs in the TDM model. If revenue grew in step with traffic, this might not be a problem. However, in a data-dominant world, where flat-rate charges are the norm, then Average Revenue Per User (ARPU) will not increase in line with traffic growth. It is imperative that operators deploy new transport technologies in order to reduce the cost per bit and break the linear relationship between traffic growth and transport costs. Ethernet is a technology that can bend the cost curve downwards. Ethernet connectivity is near enough ubiquitous; port costs are relatively cheap; it is well known and understood, and is the main connection of choice for most customers; it is naturally suited to carry packet-based technologies, and the physical interface scales well in terms of capacity. Implementing carrier Ethernet services will mean added investment now, but the incremental costs to meet future capacity demands will be relatively small. Installing a 100 Mbit/s interface at a cell site now is likely to meet demands for years to come, assuming appropriate access to the site such as fibre or Ethernet microwave radio.
TY2702/v3.1
© Wray Castle Limited
3.3
Next Generation Transmission Ethernet/GigE versus other approaches ease of use – plug and play low cost/port scalability at the physical layer inherently broadcast widely deployed combines data link layer and switching layer Disadvantages of LAN Ethernet/GigE best effort – no end-to-end QoS lack of OAM - no standardized service points to check for service health - Performance monitoring, if any, is far less than provided in optical systems lack of resilience - not designed as for 5 or 6 nines reliabilty - failure recovery in seconds, not 50 ms non-deterministic scalability issues - MAC address learning - Spanning Tree Protocol - designed for 100s or 1000s, not millions timing/synchronization security – unknown traffic flooded to all ports
Advantages and Disadvantages of Traditional Ethernet/GE The advantages of using traditional Ethernet and GigE characteristics can be summarized as being best effort, ease of use, low cost/port, bandwidth availability and equipment availability. Additionally, Ethernet is inherently a broadcast mechanism, which in some cases is an advantage, although it can also unnecessarily consume network resources. The disadvantages of traditional Ethernet/GigE in carrier-grade transport networks are that it lacks management functionality and resilience, and there is no inherent synchronization information. There are also scaling issues arising from the use of the Spanning Tree Protocol and MAC address learning. Maintaining synchronization between sites across a packet-based network is not a trivial matter. For example, if a mobile operator chooses to backhaul radio site traffic using a packet-based service, maintaining frequency synchronisation becomes important to maintain the accuracy targets set in the appropriate standards documents. There are two solutions currently under development: Synchronous Ethernet (ITU-T G.8261) and IEEE 1588v2.
3.4
© Wray Castle Limited
TY2702/v3.1
Carrier Based Ethernet and Transmission Systems MEF-Carrier Ethernet – Service Providers A set of certified network elements that connect to transport Carrier Ethernet services for all users, locally and worldwide
MEF Carrier Ethernet for Business Users Five Attributes
E-Line: point-to-point E-LAN: multipoint-to-multipoint E-Tree: rooted multipoint Standardized Services Traffic and QoS descriptors enabling SLAs matching the needs of voice, video and data.
Quality of Service
Service Management
Scalability
Scalable granular bandwidth 1–10 Gbit/s and beyond. Millions of users.
Reliability
OAM with the ability to monitor, diagnose and centrally manage Ethernet services.
Detect and recover from incidents in as little as 50 ms.
Carrier Ethernet services are carried over physical Ethernet networks and other legacy transport technologies
Metro Ethernet Forum (MEF) Carrier Ethernet Defined The MEF has defined Carrier Ethernet for business users as ‘A ubiquitous, standardized, carrier class Service and Network defined by five attributes that distinguish it from familiar LAN based Ethernet’. The five attributes are: standardized services, scalability, service manageability, quality of service and reliability. For service providers MEF has defined a set of certified network elements that connect to transport Carrier Ethernet services for all users; locally and worldwide Carrier Ethernet services are carried over physical Ethernet networks and other legacy transport technologies. The E-Line, E-LAN and E-Tree are well defined, globally recognizable, services provided via MEF certified equipment and require no change to the customer LAN or existing connectivity. Ethernet has traditionally been known as a best-effort technology, but in a carrier-class environment reliability is a key component. Today’s Carrier Ethernet should be capable of detecting and recovering rapidly from network faults; the recovery time should be as low as 50 ms to meet the most demanding quality and availability needs for critical business applications. Scalabilty is another important attribute for carrier networks. Traditional Ethernet uses MAC addresses to transfer data between devices, and this works well at the LAN level. However, address space is limited, and in the WAN space such addresses would be used up very quickly. Carrier Ethernet transport networks based on Ethernet technology use a variety of techniques to expand address space including tag stacking and MAC-in-MAC encapsulation. Additionally, Ethernet provides scalable, granular bandwidth from 1to 10 Gbit/s and beyond at the physical layer. The MEF defines a range of QoS options that set exacting standards for traffic characteristics such as CIR, frame loss, delay and delay variation, leading to Service Level Agreements (SLAs) that match the needs of voice, video and data over converged business and residential networks. Service management defines carrier class OAM capability with the ability to monitor, diagnose, test and centrally manage Ethernet services including rapid service provisioning. MEF service and terminology definitions have provided a common language for the industry so that customers and service providers can communicate effectively. The MEF have also defined standards for mobile backhaul (MEF 22) and Circuit Emulation Services (MEF 8). TY2702/v3.1
© Wray Castle Limited
3.5
Next Generation Transmission EVC attributes include EVC Type (Point-to-Point or Multipoint-to-Multipoint), UNI list CoS identification EVC related Performance - delay, delay variation, frame loss, availabilty
Ethernet Virtual Circuit: end-to-end service instance supporting E-Line or E-LAN services (SP responsibility)
Subscriber Site
OVC
OVC
Operator 1 Domain Carrier Ethernet network
Operator 2 Domain Carrier Ethernet network
MEN
CE UNI
ETH UNI-C
Subscriber Site
MEN
I-NNI
E-NNI
ETH UNI-N
ETH E-NNI
CE
I-NNI
ETH E-NNI
UNI
ETH UNI-N
ETH UNI-C
Ethernet Services Layer Terminology
UNI attributes include: UNI Identifier, Physical Layer (speed, mode, and physical medium), Service Multiplexing
E-NNI Interface Details 802.3 PHY, 1GE or 10GE Protection – Link Aggregation Support frame that are: untagged, single S-tagged, single S-tagged plus single C-tagged MTU size: at least 1526,octets , recommended 2000 octets
Metro Ethernet Network
MEF Terminology for Ethernet Services The terms MEN and Carrier Ethernet Network (CEN) are used interchangeably to describe Provider or Operator owned networks that provide connectivity services to customers. The MEF specifies the services provided by the MEN, interfaces to the MEN and the attributes that characterize these services and interfaces. The MEF does not specify the technology used in the MEN to implement services. If the MEN is implemented using 802.1 technologies then the MEN will be a Provider Bridge (PB) or Provider Backbone Bridge (PBB) network. In the MEF model a Service Provider (SP) is responsible for the end-to-end service offered to the customer. The SP may contract one or more operators , each responsible for a MEN, to implement the service. The SP may or may not be the same business as one of the operators. The User-to-Network Interface (UNI) is defined in MEF 11 as the physical interface/demarcation point between the service provider and subscriber. The interface is described in terms of the functionality supported at the customer side, UNI-C, and the service provider’s side, UNI-N, of the UNI. The UNI must support at least one of the 802.3 PHY interfaces in full duplex mode using either fibre or twisted pair at rates ranging from 10 Mbit/s to 10 Gbit/s. An EVC is defined as an association between two or more UNIs and is an end-to-end service instance. Customer frames received over a UNI are mapped to an EVC and may be delivered to any or all other UNIs mapped to the same EVC. The EVC is used to implement transparent private-line services including point-topoint and multipoint-to-multipoint LAN services. There are three types of EVC: E-Line, E-LAN and E-Tree. Two sets of attributes may be used to describe the EVC as shown in the diagram. One set of attributes describe the characteristics of the EVC at a UNI, the other set describe the characteristics of the EVC within the MEN. The UNI service multiplexing parameter identifies whether multiple EVC services may be supported at a particular UNI. For example the UNI may carry service frames belonging to different VLANs and it may be required to map different VLANs to different EVCs. The EVC UNI list for an EVC is a list of UNI pairs. The list must have exactly one such pair for each UNI in the EVC. In a carrier Ethernet network, data is transported across the EVC according to the attributes of the E-line or E-LAN service. The Network Node Interface (NNI) is a demarcation or peering point between different operator MENs, E-NNI, or between a service provider’s internal networks, I-NNI. The E-NNI includes definition of the following: support of at least one 1GE or 10GE 802.3 Physical Interface (PHY), Protection using Link Aggregation, support of untagged framed, single S-tagged frames, single S-tagged followed by single C-tagged frame, MTU size of at least 1526 octets (but 2000 octets is recommend). The E-NNI specification also includes the definition of an Operator Virtual Connection (OVC) which is similar in concept to an EVC. An OVC is an association of UNIs which constrains the exchange of frames between the external interfaces of a single operator MEN, i.e. frames sent on a particular OVC may transferred from UNI to E-NNI, E-NNI to UNI, UNI to UNI, E-NNI to E-NNI where each UNI or E-NNI are on the same MEN domain. If an EVC exists within one MEN domain then there is a one -to-one mapping between an EVC and OVC. Further Reading: MEF 6.1 Service definitions: MEF 10 Service Attributes, MEF 11 – UNI, MEF 26 E-NNI.
3.6
© Wray Castle Limited
TY2702/v3.1
Carrier Based Ethernet and Transmission Systems Head Quarters
Ethernet Private Line (EPL) Replaces a TDM private line Port-based service with single service (EVC) across dedicated UNIs providing site-to-site connectivity Typically delivered over SDH (Ethernet over SDH) Most popular Ethernet service due to its simplicity
CE
UNI
Remote Site
Metro Ethernet Network CE UNI UNI
Point-to-Point EVCs
UNI
ISP POP
Internet
CE
E-Line Services – Ethernet Private Line The E-Line service provides a point-to-point connection between customer sites using an Ethernet service interface. This is similar to a point-to-point PVC service based on FR or ATM. The service delivers Ethernet frames across the VLAN connection between the source and destination MAC addresses of the CE devices, without overwriting or changing the MAC addresses. An Ethernet Private Line (EPL) is essentially a port-based service that could be used to replace a traditional TDM Private Wire/Line. The EPL uses a port-based service where traffic from a single port is mapped to a point-to-point EVC providing site-to-site connectivity between a single pair of UNIs.
TY2702/v3.1
© Wray Castle Limited
3.7
Next Generation Transmission
CE
Remote Site 1 (Spoke)
Service Multiplexing SP’s Edge
Head Quarters (Hub)
UNI
CE
UNI
Metro Ethernet Network
Point-to-Point EVCs
UNI
CE
Remote Site 2 (Spoke)
Ethernet Line Services – Ethernet Virtual Private Line (EVPL) The EVPL service employs service multiplexing at the SP’s Edge device to enable multiple services (EVCs) to be delivered over a single physical connection (UNI) to a customer premises. In the example above, a single physical UNI carries multiple service flows, e.g. traffic belonging to multiple VLANs, where each service flow is mapped to a different EVC. The EVCs may terminate at different end points on the Carrier Ethernet Network. The EVPL may be used to replace Frame Relay or ATM L2 VPN services to deliver higher bandwidth, end-to-end services, and it supports ‘hub and spoke’ connectivity via the Service Multiplexed UNI at the hub site. This is similar to Frame Relay or Private Line hub-and-spoke arrangements.
3.8
© Wray Castle Limited
TY2702/v3.1
Carrier Based Ethernet and Transmission Systems
1. EP-LAN – Port based service: all traffic on UNI is mapped to a single EVC - or 2. EVP-LAN – Service multiplexing: different service flows mapped to different EVCs CE
Remote Site 1 (Spoke)
Headquarters (Hub) UNI
CE
UNI
Metro Ethernet Network
Multipoint-to-Multipoint EVCs
UNI CE
Remote Site 2 (Spoke)
Ethernet Private LAN (EP-LAN) Service The EP-LAN service supports dedicated UNIs to provide transparent multipoint-to-multipoint connectivity between a customer’s CE equipment within a particular LAN. In functional terms, the Carrier Ethernet Network (CEN) appears as a dedicated multiport learning bridge to the customer. Broadcast and multicast frames should be handled by the service in the same way as a multiport bridge would handle them. In this case the EP-LAN service is implemented as a port-based service where all traffic flows are mapped to the same EVC providing the EP-LAN service. Alternatively, service multiplexing at the service provider’s edge device enables different service flows on a common UNI to be mapped to different EVCs. In this case the service is referred to as an Ethernet Virtual Private LAN (EVP-LAN) service. .
TY2702/v3.1
© Wray Castle Limited
3.9
Next Generation Transmission
Communications Directions Root to Leaf
CE
Remote Site 1
CE
Remote Site 2
Leaf to Root Headquarters (Hub) Metro Ethernet Network
CE
UNI
Root
Leaf
UNI
Leaf UNI Leaf
Rooted-Multipoint EVC
UNI CE
Remote Site 3
E-Tree The E-tree service is aimed at applications requiring point-to-multipoint services including video on demand, IPTV and mobile backhaul from cell sites. E-tree is implemented as a rooted multipoint EVC where a Root UNI can transmit to any leaf and any leaf can transmit to any root, but a leaf is not allowed to transmit to another leaf. At the configuration stage a UNI must be declared as a root type or leaf type. The root provides a well-defined source address, which would be useful in multicast services such as business multicast and IPTV. These services are usually deployed asymmetrically. It is envisioned that there will be less provisioning for point-to-multipoint services using an E-tree implementation as opposed to multiple EVPLs in a large hub-and-spoke environment. Service multiplexing may be employed at the UNI to provide an Ethernet Virtual Private Tree (EVP-Tree) service (not shown here).
3.10
© Wray Castle Limited
TY2702/v3.1
Carrier Based Ethernet and Transmission Systems
Port-Based
VLAN-Based
(All-to-One Bundling)
(Service Multiplexed)
E-Line
Ethernet Private Line
Ethernet Virtual Private Line
(Point-to-Point EVC)
(EPL)
(EVPL)
Ethernet Private LAN
Ethernet Virtual Private LAN
(EP-LAN)
(EVP-LAN)
E-Tree
Ethernet Private Tree
Ethernet Virtual Private Tree
(rooted multipoint EVC)
(EP-Tree)
(EVP-Tree)
Service Type
E-LAN (multipoint-to-multipoint EVC)
MEF Services are classified into two categories: Port-based-Single Service Instance per UNI (dedicated network resource) VLAN-based-Multiple Service Instances per UNI (shared network resource)
MEF Service Definition Summary The table above summarizes the MEF services definitions.
TY2702/v3.1
© Wray Castle Limited
3.11
Next Generation Transmission Application Services Layer
Applications carried on the basic Ethernet services across the MEN
APP Layer
(e.g. IP, MPLS, PDH, etc
Ethernet Services Layer
Ethernet connection services between UNIs, ETH OAM
ETH Layer (MEF Focus)
(Ethernet Service PDU)
Metro Ethernet Network
TRAN Layer
Transport Services Layer CE
CE UNI
UNI
TRAN Layer candidates include: ATM VP/VC
SONET/SDH Fibre
802.1 Bridged Network Family (PBB-TE) OTN Copper
MPLS-TP
PDH
802.3 PHY
Coax
Wireless
MEF Metro Ethernet Network Model The MEN layer network model defines the MEN in terms of three layer network components: the Application Services Layer (optional), the Ethernet Services Layer (ETH Layer) and the Transport Services Layer (TRAN). The Ethernet Services Layer supports basic Layer 2 Ethernet data communication services and is responsible for Ethernet connectivity services and the delivery of Ethernet service frames across MEN interfaces, UNI and NNI. The ETH layer is also responsible for ETH operations, administration and maintenance. The service frame presented by the ETH layer external interfaces is an Ethernet unicast, multicast or broadcast frame conforming to the IEEE 802.3-2002 frame format. The Transport Layer is a set of one or more supporting Transport Services Layer(s). The TRAN layer supports connectivity among ETH layer functional elements in a service independent manner. Various technologies may be used to support the transport requirements for the Ethernet services including those identified in the diagram above. This allows Carrier Ethernet traffic to be agnostic to the transport services it traverses. The optional Application Services Layer supports applications carried on the basic L2 Ethernet services the MEN. Various application services may be supported over the basic Ethernet services; a sample of which are identified above.
Further Reading: MEF 4
3.12
© Wray Castle Limited
TY2702/v3.1
Carrier Based Ethernet and Transmission Systems
Carrier Ethernet 802.1D Bridging
Foundations
802.1Q VLAN Tagging and priority field – 4096 VLAN Ids 802.1P
Scaling Further scaling Quality Predictability Ethernet in the First Mile (EFM)
Details use of the priority field for CoS/QoS
802.1ad also called Q-in-Q VLAN Tag Stacking 802.1ah PBB also called MAC-in-MAC 802.1ag Y.1731, MEF–OAM/Performance 802.1Qay PBB-TE – connection-oriented Ethernet 802.3ah Point-to-point link monitoring
The 802.1 Standards for Bridged Networks The table above identifies the specifications that have enabled the evolution of Ethernet to a call class transport technology. The 802.1D/Q/P standards are the foundations and are commonly found in LAN deployments. The 802.1Q standard introduced the concept of VLAN tagging to create multiple logical or virtual LANs into Ethernet switched architectures up to a limit of 4096 VLANs. The 802.1ad standards adds another layer of 802.1Q to expand the VLAN space by tagging tagged frames, i.e. it introduces tag stacking. The expanded address space allows the service provider to provide specific services on specific VLANs, e.g. Internet access on one VLAN, voice services on another. Provider Backbone Bridging (PBB), 802.1ah, provides a highly scalable technology using MAC-in-MAC encapsulation. However, it lacks carrier-grade protection and traffic engineering functions, it is not a deterministic model. PBB with Traffic Engineering (PBB-TE) provides a connection-oriented, deterministic operation Ethernet service by introducing traffic engineering capabilities. OAM and functions are provided at Ethernet layer 2 with 802.1ag, Connectivity Fault Management (CFM) for Ethernet services, and Y.1731. CFM provides basic Ethernet service testing functions such as continuity, loopback and trace functions. While Y1731 includes performance monitoring and alarm signals in addition to CFM. 802.3ah is also called Ethernet in the First Mile (EFM) and provides a point-to-point link monitoring function between two adjacent devices.
TY2702/v3.1
© Wray Castle Limited
3.13
Next Generation Transmission BW Profile Token Bucket Algorithm – Coupled* yellow rate bounded by CIR+EIR burst size bounded by EBS
Bandwidth Profile Compliance Colours Green Tokens - CIR Traffic > EIR
CBS
None
C-Bucket Overflow Green Tokens
EIR Traffic > CIR Mark DEI
Yellow Tokens - EIR
CIR Traffic
CIR
Guaranteed
EBS
Discard
E-Bucket
If service frame length is less than C-Bucket tokens - declare green and remove tokens from C-Bucket else if service frame is less than E-Bucket tokens - declare yellow and remove tokens from E-Bucket else - declare red
Best Effort: deliver to egress UNI SLA performance objectives do not apply Assured: deliver to egress UNI SLA performance objectives do apply
CIR/EIR long term average rates CBS and EBS short term burst rates within the CIR/EIR limits
* BW Profile Token Bucket Algorithm - decoupled yellow rate bounded by EIR only no green overflow tokens burst size bounded by EBS
Service Profiles Ethernet services, EVCs, are described by attributes and profiles that can be used to implement and police SLAs. Many attributes are conventional Ethernet attributes, such as physical port speed, addressing, etc. In addition to this the MEF define a number of Bandwidth Profile (BWP) parameters, discussed below, to allow the equivalents of the FR service descriptors to be applied and for traffic policing to take place at the service provider’s side of the UNI for a given service flow. Committed Information Rate (CIR) is the long-term average rate in bits/s up to which service frames, i.e. Ethernet frames transmitted on the UNI, are delivered across the UNI and then the network. Frames within the CIR are fully compliant ‘green’ frames and are delivered at the performance objectives determined by CoS markings, i.e. CIR defines the assured bandwidth. Committed Burst Size (CBS), expressed in bytes, limits the maximum number of bytes available for a burst of Service Frames sent at the UNI speed to remain CIR-conformant. Higher burst sizes improve performance. The Excess Information Rate (EIR) is the long-term average rate in bits/s up to which the network may deliver Service Frames but without any performance objectives. Service frames transmitted as ‘excess frames’ are partially compliant ‘yellow’ frames and marked as eligible for discard in congestion conditions. EIR provides additional throughput, network conditions permitting. Excess Burst Size (EBS), expressed in bytes, limits the maximum number of bytes available for a burst of Service Frames sent at the UNI speed to remain EIR-conformant. Higher burst sizes improve performance. CBS and EBS are often considered to be parameters defining a bucket size in bytes. Tokens representing bytes are dripped into the buckets at the CIR/EIR rate respectively. The size of any frame arriving at the UNI is initially compared to the amount of tokens in the CBS bucket. If there are enough tokens then the service frame is compliant with CIR, declared green and transmitted; if not the frame is not compliant with CIR, in which case it is marked yellow and compared with the amount of tokens in EBS bucket. If there are sufficient tokens in the EBS bucket the frames are EIR-compliant, declared yellow, and transmitted as best-effort frames, eligible for discard. If they are not compliant they are declared red and discarded. The long-term yellow rate may be bounded just by EIR, decoupled from CIR, or bounded by CIR and EIR, coupled. In the latter case tokens may overflow from the CBS bucket into the EBS bucket. EBS limits the burst size in either case. 3.14
© Wray Castle Limited
TY2702/v3.1
Carrier Based Ethernet and Transmission Systems 1. BW Profile per UNI CIR=10 Mbit/s
2. BW Profile per EVC
EVC1
Service Frames
Service Frames
UNI
UNI EVC2
EVC2
Service multiplexing: Multiple services per EVC
UNI
EVC1
CIR= 6 Mbit/s
CIR= 4 Mbit/s
Service multiplexing: Multiple EVCs per port
3. BW Profile per CoS Instance
Service Frames
EVC1
Ingress BW Profile per CoS Identifier
CE-VLAN 1 PCP 0,1,2,3, untagged
3 Mbit/s CIR CoS Id 1 – Gold
CE-VLAN 1 PCP 4,5
4 Mbit/s CIR CoS Id 2 – Silver
CE-VLAN 1 PCP 6,7
1 Mbit/s CIR CoS Id 3 – Bronze
EVC2
2 Mbit/s for Internet Access
Determining the CoS Id: 1. All service frame mapped to an EVC have the same CoS Id 2. CoS Id is determined from PCP 3. CoS Id is determined from DSCP 4. CoS Id is determined from VLAN Id
EVC Bandwidth Profiles (BWP) A BWP is a method of characterizing service frames with respect to their length and arrival time, for the purpose of rate enforcement or policing and may be considered as equivalent to traffic policing in Frame Relay. BWPs are associated with a single UNI of an EVC allowing each UNI to be configured independently with its own BWP. A BWP defines the set of traffic parameters applicable to a sequence of service frames, these include CIR, CBS, EIR, EBS. The BWP may be per UNI, per EVC or per Class of Service Identifier (CoS Id). In a per UNI model a single BWP is applied to all service frames regardless of the EVC they may be mapped to. In this case service frames will be handled non-discriminately by the BWP one EVC may get more bandwidth than the other. In the per EVC model a BWP may be applied to each EVC at the UNI. Service frames are mapped to either EVC1 or EVC2. The BPW for EVC1 polices the traffic flow of service frames mapped to EVC1, while the BWP for EVC2 polices the traffic flow for service frames mapped to EVC2. In the per CoS Id model a single BWP must be applied to all service frames with a specific CoS identifier. There are three ways to determine the CoS Identifier from the contents of a service frames on the UNI. Firstly all service frames mapped to the same EVC shall have the same CoS Id; secondly the CoS Id may determined from the priority code point (PCP) in a tagged frames, if the frame is untagged then PCP is assumed to be 0. The third mechanism uses the DiffServ Code Point in an incoming IP packet to determine the CoS Id. As an example consider EVC1 in case three above. The service provider offers three services classes, gold, silver and bronze. Service frames for CE-VLAN 1 are mapped to EVC1. Tagged service frames with a PCP=0, 1,2 or 3 or untagged frames are mapped to COS Id 1 and receive the gold service. Tagged frames with a PCP=4 or 5 are mapped to CoS Id 2 and receive the silver service while tagged frames with a PCP=6 or 7 are mapped to CoS Id 3 and receive the Bronze service. Multiple models may be supported at a UNI as long as only a single BWP is applied to a given ingress service frame. The CoS marking enable the network to determine the QoS to apply. CoS is usually defined by three performance parameters, frame delay, frame delay variation (jitter) and frame loss. Further Reading: MEF 10 sections 6 and 7 TY2702/v3.1
© Wray Castle Limited
3.15
Next Generation Transmission S-TAG: Gold/Silver/Bronze C-TAG: Customer Service Provider (S-TAG)
E-TYPE
D E I
SP CoS
Customer (C-TAG)
VI
TPI
P
C
VI
1 bit Service Provider's Ethernet Virtual Circuit (EVC) ID
Port Config
No. Classes of Service types
8P0D
8
7P1D
7
6P2D
6
5P3D
5
No. of applicable DEs
EType=88-a8 802.1ad S-TAG
0 1 in class 4 2 1 in class 4 1 in class 2 3 1 in class 4 1 in class 2 1 in class 0
IEEE 802.1ad Provider Bridge One of the issues facing the Ethernet community was the lack of address space either at the MAC level or with the introduction of IEEE 802.1q tags. With IEEE 802.1q Tags, provide the potential to differentiate up to 4096 VLANs. Service Providers (SP) wanting to offer connectivity over 802.1q networks between corporate sites faced address space issues arising from the fact that enterprises commonly use 802.1q tagging within their own networks. This often means that an enterprise customer presents the SP with an already dot1q tagged frame, thus eating into the available VLAN address space available to the SP. The concept of 802.1ad is simply to add another layer of tagging on top of the 802.1q tag. This expands the address space by tagging tagged frames. IEEE 802.1ad adds a second, outer Tag referred as the Service-provider’s Tag (S-Tag), identified using Ethernet Type (ETYPE) value 88-A8. The inner Customer Tag (C-Tag) is the IEEE 802.1q Tag seen before, i.e. TPI=81-00. In theory the double-tagged frame gives a theoretical address space of 16 million VLANs, not all to the SP because the C-Tag is often applied by the user as described above. The Tag format for the S-Tag is:
ETYPE – 2 bytes set to 88-A8 Service Provider Class of Service – will conform to the IEEE 802.1p standards. Discard Eligibility Indicator (DEI) – will be used to provide an enhanced CoS function VLAN Identifier (VI) – 12 bits, which can describe 4096 service instances
The expanded VLAN space makes it possible for the service provider to switch VLAN traffic from a customer over their network using the S-Tag to discriminate the different customer flows, leaving the customer to manage the C-Tag portion. For example, Internet access may be provided on specific VLANs for specific customers, while another VLAN might be used for VoIP traffic.
3.16
© Wray Castle Limited
TY2702/v3.1
Carrier Based Ethernet and Transmission Systems
Customer Bridge
PEB
PEB
Customer Bridge
Provider Bridges
Normal Ethernet Frames
C-Tag
S-Tag
C-Tag
Normal Ethernet Frames
Provider Bridge Network A simple provider bridge network is depicted above. Here, the customers’ networks are using simple Ethernet frames, so can be thought of as using legacy Ethernet equipment. At the edge of the customer’s network is a customer bridge. This may be IEEE 802.1q aware, so would manage the first Tag or C-Tag. This is not important as the customer bridge may only support normal Ethernet frames; in this case the Provider Edge Bridge (PEB) would have to provide both a C-Tag and an S-Tag. The PEB will add an S-Tag to discriminate this customer traffic from other traffic carried by the service provider. For an E-LAN service the S-Tag defines the extent of the broadcast domain on the service provider’s network. Broadcast addresses and unknown unicast addresses will be flooded across the broadcast domain, as is the case with standard VLANs. Over time the Provider Bridges (PB) and PEBs learn customer MAC Addresses and will forward unicast frames in a targeted manner towards a destination MAC on the service provider’s VLAN. MAC address learning means that the customers’ MACs are exposed on the provider network. This is in contrast to IP VPNs where the layer 3 routing table information would be exposed and therefore is seen by security experts as more acceptable for MACs rather than for IP to be known. Another problem with this approach is the fact that the Tags are being added to the Ethernet frame structure, which has a maximum length as depicted by the Maximum Transmission Unit (MTU). This means that the information portion of the frame would have to reduce in size. This is exacerbated by the fact that the Ethernet community is working on IEEE 802.1ah, which will see MAC frames with S- and C-Tags encapsulated in other MAC frames, which again will be double tagged. The Ethernet community has therefore been working on enlarging the Ethernet frame size. Although this work is continuing, some manufacturers are already supporting increased frame sizes up to 9 Kilobytes or more. However, this may be proprietary.
TY2702/v3.1
© Wray Castle Limited
3.17
Next Generation Transmission Normal Ethernet Frames
C-Tag
S-Tag
PEB
Customer Bridge
VID=10 MAC learning and Flooding replaced by configuration
Normal Ethernet Frames
C-Tag
PEB
Cross Connect
Customer Bridge
VID=20
VID=20
VID=10 VID=20
VID=10
VID=20
Switching based on Port No. and VID (not MAC)
Ethernet Label Switching (ELS) The concept of ELS, aka Q-in-Q tunnelling mode, is to use the same 802.1ad Ethernet frame format but to forward based on the ingress port number VLAN-Id but not the MAC address. Tag stacking may still be used and there is potential for basing switching decisions on double tags as well as single tags. MAC learning and flooding are replaced with VLAN switch configuration, which is used to preconfigure a point-to-point Ethernet Virtual Connection across the network. Note that tags may be added, swapped or removed by the Ethernet ‘cross connect’ switch. Additionally, bridged connections can be made from a single port to multiple ports.
3.18
© Wray Castle Limited
TY2702/v3.1
Carrier Based Ethernet and Transmission Systems
Benefits
Limitations
Transparency of 4K C-VIDs
Only 4K services
Ability to determine CoS and discard eligibilty
Topology constrained by the number of connected devices. PEB and PB devices learn customer MAC addresses STP and RSTP
Native support of E-LAN services (S-VLAN determines the extent of the broadcast domain)
Customer MAC addresses exposed in the core
Scalability of Provider Bridge (PB) Networks PB networks may support up to 4096 separate service VLANs with a large number of customer VLANs traversing these. The PB networks have to run separate STPs for each VLAN as well as having to record all the MAC addresses of the PB switches as well as customer MAC addresses per VLAN. As such, the PB equipment needs to have significantly more processing and memory capability than the customer bridging equipment. PB networks cope well whilst the number of VLANs and aggregate MAC addresses are relatively low, but once these numbers start to grow significantly then the PB networks may start to exhibit problems. A solution to this would be to move to a traffic engineering solution.
TY2702/v3.1
© Wray Castle Limited
3.19
Next Generation Transmission
802.1D
802.1Q
802.1ad
802.1ah
Payload
Payload
Payload
Payload
SA
VLAN Tag
C-Tag
C-Tag
Inner VLAN ID
DA
SA
S-Tag
S-Tag
Outer VLAN ID
DA
SA
SA
DA
DA
Customer MAC E-Type I-PCP 88e7 (3) Same type of Tag as S-TAG
DEI (1)
Res (2)
Res (2)
I-SID (24)
E-Type B-PCP B-DEI 88a8 (3) (1)
B-VID (12)
I-Tag
Service Instance Tag
B-Tag
Backbone Provider Tag
B-SA Backbone MAC Address B-DA
S-Tag (Service VLAN Tag) E-Type SP-PCP B-DEI 88a8 (3) (1)
B-VID (12)
C-Tag (Customer VLAN Tag) E-Type 8100
PCP (3)
C (1)
VID (12)
B - Backbone DEI - Discard eligibility PCP - Priority Code Point VID - VLAN Id I-SID - Service Instance Id
Provider Backbone Bridging (PBB) Networks MAC-in-MAC provides a hierarchical structure to carrier Ethernet networks, whereby the service provider’s frames may be totally encapsulated in a backbone provider’s frame, hence the term ‘MAC-in-MAC’. The service provider’s frames may well be already double tagged as per IEEE802.1ad i.e. S- and C tagged. Where each S-tag provides a block of 4000 separate VLANs, these S-VLANs could be mapped to one of 16 million separate service instances using the 24-bit I-SID contained in the I-Tag. I-Tagged frames would be associated with one of 4096 possible backbone VLANs (B-VLANs). The B-VLAN is identified by a combination of Backbone-Destination MAC address (B-DA) and B-Tag’s B-VLAN ID (B-VID).
3.20
© Wray Castle Limited
TY2702/v3.1
Carrier Based Ethernet and Transmission Systems PBB:
PB
802.1ad
standard 802.1ad Bridge learns B-MAC addresses per B-VLAN does not learn customer MAC addresses
PB
PBEB 3
PBEB 1
802.1ad
PBB S-Tagged frames
S-Tagged frames 802.1ad
PB
PB
802.1ah Encapsulation Layer PBEB 2
PBEB 4
802.1ad
802.1ad
PBEB: maps S-Tag to I-Tag assigns I-Tag to BVLAN-Id BVLAN-Id defines extent of the broadcast domain learns B-MAC addresses per B-VLAN learns customer MAC addresses per B-VLAN per B MAC address
802.1ah Encapsulation layer unknown destination B-MAC unicast addresses and broadcast frames are flooded to all BVLAN endpoints known destination B-MAC address are tunnelled to the B-DA endpoint
PBB Basic Network Architecture PBB was introduced to address MAC Address and service scalability issues. PBB introduces extensions to native Ethernet technology. The number of 802.1ad Q-in-Q service instances per metro is limited to 4094 by the 12 bit S-VLAN tag. PBB, 802.1ah, solves the scaling issue by adding a hierarchical structure using MAC-in-MAC encapsulation and the ability to identify millions of service instances using a service instance tag, I-Tag. There are two types of bridges defined in the 802.1ah architecture: Provider Backbone Edge Bridge (PBEB) and PBB in the core. PBEBs contain the ‘intelligence’ to map S-tagged frames from a service provider’s PB to a service instance, identified by an I-Tag’s I-SID. The I-Tag is mapped to a Backbone VLAN (B-VLAN) and an associated B-VLAN tag. S to I to B-VLAN mapping is a configuration function. The B-VLAN defines the extent of the broadcast domain, actually a multicast domain, on the PBB network. Additionally, the PBEB adds the appropriate B-MAC source and destination address and encapsulates the service provider’s S-tagged frame. The PBEB learns backbone addresses per B-VLAN. Furthermore, a PBEB learns customer MAC addresses per S-Tag per B-DA per B-VLAN. An egress PBEB uses the I-SID as a filter to decide whether or not to forward frames to a service provider’s PB network. Should a PBEB device receive a frame where there is no mapping between the I-Tag and an STag, the frame is silently discarded. PBB devices in the core do not learn customer MAC addresses; they are only required to learn B-MAC addresses per B-VLAN. The diagram shows only one PBB, for simplicity. In practice, the core may contain many PBBs. PBBs forward frames based on the B-VLAN and B-DA. As the B-Tag is the same type of tag as an S-Tag and the B-DA is a standard MAC address, then the PBB need only be 802.1ad. The PBB floods unknown unicast B-DAs and broadcast B-MAC addresses across the B-VLAN identified by the B-Tag in the frame. By monitoring traffic passing through it a PBB learns the MAC addresses of PBEBs per B-VLAN.
TY2702/v3.1
© Wray Castle Limited
3.21
Next Generation Transmission SP1 PB2
P C S SA DA I-Tag B-Tag B-SA B-DA SP1 PB1
PBB
PBEB 1 S-Tag 1
802.1ad
B-MAC 1B-1B-15-1F-10-1F
P1
2C-2C-28-24-21-00
B-MAC 2B-2B-25-2F-20-2F
802.1ad
2C-2C-28-24-21-01
PBEB 2 S-Tag 1
P2 P3
802.1ad
C-MAC Address
PBEB 3
802.1ah
SP1 PB3
C-MAC Address 3C-3C-38-34-31-00
B-MAC 3B-3B-35-3F-30-3F
Provisioned S-Tag
I-Tag BVLAN
Learned
Learned
B-MAC Address
C-MAC Address
001
0001
0001
2B-2B-25-2F-20-2F
2C-2C-28-24-21-00
002
0002
0001
3B-3B-35-3F-30-3F
2C-2C-28-24-21-01
802.1ad
3C-3C-38-34-31-01
C-MAC Address 3C-3C-38-34-31-00 3C-3C-38-34-31-01
MAC Learning in PBB Networks The diagram above shows three PBEBs in a single B-VLAN within a PBB domain together with their BMAC addresses. The PBB network is used to provide a B-VLAN service to a Service Provider, SP1. SP1’s domain contains three provider bridges: PB1, PB2 and PB3. A number of C-MAC addresses are connected via PB1 and PB2. The PBB provider provisions service instances at each PBEB. In this example this is accomplished by mapping a particular S-tag to an I-Tag identifying the service instance and then by mapping the I-Tag to a B-VLAN that connects the appropriate service Provider Bridges (PB). As traffic is encapsulated and passed through the B-VLAN, PBEB devices learn customer MAC addresses per S-Tag, per B-VLAN per B-MAC address as illustrated. PBB devices simply learn on a per B-VLAN basis which port a particular PBEB is available on; for example, PBB learns that PBEB 3, whose B-MAC address is 3B-3B-35-3F-30-3F, is available via P3.
3.22
© Wray Castle Limited
TY2702/v3.1
Carrier Based Ethernet and Transmission Systems SP1 PB2
S-Tag 1
PBEB 2
802.1ad
I-SID1 SP1
SP1 PB1 802.1ad
PBEB 3
PBEB 1 S-Tag 1
S-Tag 1
S-Tag 2
S-Tag 2
PB3 802.1ad
I-SID2
B-DA B-SA B-Tag I-Tag Note: When I-SID2 frames are broadcast towards PBEB 2 they will be filtered and not sent on to the SP bridge as ISID2 has no mapping at this interface
I-SID 1 Port
BVLAN 1
S-Tag 1
Tunnel I-SID 2
S-Tag 2
DA SA S-Tag C-Tag P
Multiplexing Service Instances through a B-VLAN In this example an SP presents service frames to the PBB provider tagged as either S-Tag 1 or S-Tag 2. These are mapped to service instances I-SID 1 and 2 respectively, both are mapped to B-VLAN 1. Service instance one is configured at PBEB 1, 2 and 3, while service instance two is only configured at PBEB 1 and 2. Although this example shows the value of the S-Tag being preserved across the network this is not necessary if a single S-Tag is mapped to a particular service instance, for example for service instance two, S-Tag 2 arriving at PBEB 1 may be mapped to S-Tag 3 at PBEB 3. Prior to C-MAC and B-MAC learning it is possible that unknown unicast addresses sent on the B-VLAN for service instance 2 arrive at PBEB 2. PBEB 2 will not forward these to PB2 as I-SID2 has no mapping to a service at this edge. Note that it is possible to map multiple S-Tags to the same service instance using a port-based service, i.e. all service frames are mapped to the same service instance, where an S-Tagged bundled service is requested. In both these cases it is important to preserve S-Tags end-to-end. The ‘tunnel’ illustration provides a conceptual view of PBB operation. The B-VLAN tag determines the extent of a multicast domain PBB network; the B-DA identifies a tunnel endpoint on the B-VLAN and the I-SID identifies particular service instance.
TY2702/v3.1
© Wray Castle Limited
3.23
Next Generation Transmission SP1 PB2 S-Tag 1
802.1ad SP1
SP1
PBEB 2
PB1
PB3 I-SID1
802.1ad S-Tag 1
802.1ad
PBEB 1
S-Tag 1
SP2 PB1
S-Tag 1
PBEB 3
S-Tag 1
SP2 PB2
I-SID2 802.1ad
802.1ad
Note: When I-SID2 frames are broadcast towards PBEB 2 they will be filtered and not sent on to the SP bridge as I-SID2 has no mapping at this interface
More on Service Multiplexing in a PBB Network This example illustrates how different SPs may have their traffic tunnelled through the same B-VLAN. Here SP1 and SP2 present service frames tagged with the same S-Tag value. They are mapped to different I-SIDs but to the same B-VLAN. Since PBB devices are not I-SID aware then any unknown unicast frames sent from any of the SPs, regardless of the service instance they are mapped to, are sent to all endpoints on the B-VLAN. In which case SP2’s traffic may be presented to PBEB 2, PBEB 2 filters traffic based on the I-SID 2 and finds no mapping for this service and silently discards the frame. PBEB 3 uses the I-SID to discriminate between traffic meant for SP1 and SP2.
3.24
© Wray Castle Limited
TY2702/v3.1
Carrier Based Ethernet and Transmission Systems
Provider Backbone Bridge (IEEE 802.1ah) P CSA
CDA C S I B BSA BDA
PBEB
PBB
PBB
PBEB
B-SA
B-DA 3
Site A Customer LAN
Site D Customer LAN
6 P CDA
1
POP C
POP B
CSA C S
P CDA
CSA C S
7
2
CSA
PEB PB PEB Provider Bridge (IEEE 802.1ad)
2 1 P CDA
5
4
PEB
S-Tag
CDA
PB PEB Provider Bridge (IEEE 802.1ad)
6
S-VLAN CSA C
8
S-Tag
7
8
S-VLAN P CDA
3 B-SA
4
B-Tag/I-Tag B-VLAN
CSA C
5 B-DA
Simple Provider Bridged Networks The diagram illustrates a simple PBB network where the Customer LAN is situated at two remote locations, A and D. The local service provider perhaps provides a metro Ethernet solution using PB network IEEE 802.1ad technology. The service provider has two regional POPs at B and C. The interconnect between B and C is provided by a PBB Network using IEEE802.1ah technology. The S-VLANs are controlled by the Service Provider, at B and C these frames are encapsulated by the PBB network provider edge equipment. The S- and C- tags together with the customer MAC addresses are used to help with correctly switching the customer's frames between their LANs. At 3 the S-VLAN service frame is mapped to one of 16 million I-SID values. The PBEB at 3 will also add the B-VLAN information: the B-Tag containing the BVID, the destination B-MAC address of the PBEB at 5 and its own source B-MAC address. The PBB devices forward the MAC-in-MAC frame based on the B-VID and B-DA to specific ports, assuming that they have learned the B-DA address, toward the egress PBEB. The egress PBEB at 5 processes the frame identifies the I-SID and recovers the S-Tagged service frame and forwards to the Service Provider’s network at POP C. The Service Provider delivers the frame on the S-VLAN path towards the customer site. The PBB devices tunnel service frames through the PBB network, i.e. they are transparent to encapsulated PB frames and do not learn customer MAC addresses.
TY2702/v3.1
© Wray Castle Limited
3.25
Next Generation Transmission PBB-Layer 2 802.1ah MAC-in-MAC-in-MAC P CSA
CDA C S I B BSA BDA I2 B2 BSA BDA
BVLAN 2
PBB-Layer 1
802.1ah MAC-inMAC (B-VLAN 1)
B-VLAN 1
P CSA
B-VLAN 1
CDA C S I B BSA BDA
End-to-End I-Tag
Provider Bridge Layer
S-VLAN
S-VLAN P CDA
CSA C S
End-to-End S-Tag P CDA
CSA
P
CSA
CSA C
CDA
CE
P
CE
CSA
CDA
CDA 802.1Q
802.1Q
Hierarchical PBB Networks Supporting B-VLANs with a large number of bridges is challenging as multicast frames delivered to large number endpoints restrict performance. For this reason 802.1ah supports the deployment of hierarchical networks. The hierarchical approach reduces the size of individual multicast domains by reducing the number of bridges in each domain. This in turn reduces the number of multipoint tunnels and the number of frame replications required. The diagram above illustrates how a hierarchical 802.1ah network may be implemented. PBEB edge devices at PBB layer two map the service frame from PBB layer 1 to a layer 2 service instance and B-VLAN, B-VLAN 2 in this example. The PBB layer 1 frame is totally encapsulated in a layer 2 frame, MAC-in-MAC-in-MAC, and tunnelled through the layer 2 network. An egress PBEB node at layer two identifies the service instance and forwards the service frame back to the PBB layer 1 network. In some peer-to-peer relationships, rather than use complete MAC-in-MAC-in-MAC encapsulation, an 802.1ah peer network receiving an 802.1ah frame removes the B-MAC headers, swaps the B-VID label based on the I-SID of the incoming frame, and adds its own B-MAC addresses. The I-SID is the same throughout peer networks. A hierarchical PBB network can have as many layers as required.
3.26
© Wray Castle Limited
TY2702/v3.1
Carrier Based Ethernet and Transmission Systems
Benefits
Limitations
Highly scalable architecture
Customer MAC address learning required on PBEB switches
Supports 802.1ag OAM
Complex to optimize when using multiple spanning trees
Clear separation between customer and service provider networks, transparent transport of S-VLANs
Restoration/convergence/ time following faults is limited to seconds by RSTP and MSTP, whereas requirements for carrier transport network recovery is 50 ms.
Customer MAC addresses tunnelled on the PBB network increasing security and scalability
Lack of effective traffic engineering, this a flat switching hierarchy based on flooding if the destination MAC is unknown
PBB switches only need to learn B-MAC addresses
Still non-deterministic.
Benefits and Limitations of PBB Networks The table above summarizes the main benefits and limitations of PBB networking.
TY2702/v3.1
© Wray Castle Limited
3.27
Next Generation Transmission Service and Network Management Provisioning system
C
B
Customer A
Customer B
PBEB
Provider Bridge Network
A
D
Provider Bridge Network
F
E
Provider Backbone Bridge B-VID=4000 B-DA =d
B
B-VID=4000 B-DA =d
C
B-VID=4000 B-DA =d
D
A MAC=a B-VID=4000 MAC=b B-DA =a B-VID=4001 B-DA =d
E
MAC=c
MAC=d
F D
A MAC=a B-VID=4001 MAC=e B-DA =a
Primary Tunnel
MAC=f
Back-up Tunnel
PBB-TE connection oriented traffic engineered tunnels - point-to-point - reserved bandwidth - hard QoS 50ms restoration time uses 802.1ag and Y.1731 for management and recovery
MAC=d
Provider Backbone Bridging Traffic Engineering (PBB-TE) PBB-TE, which is also further abbreviated to PBT, has been developed in accordance with IEEE802.1Qay specifically to address the major problems of carrier Ethernet such as scalability and reliability. PBB-TE may be run in isolation or in parallel with PBB. PBB-TE removes the need for core devices to engage in MAC address learning and flooding and does not use any variant of STP as with PBB. PBB-TE replaces these with connection-oriented, trafficengineered point-to-point tunnels. Tunnels have reserved bandwidth and a specified QoS, which are used to transport client S-VLANs frames with deterministic performance and hard QoS across the PBBTE network. The PBT tunnels require a sophisticated provisioning platform to be utilized which can engage with the network equipment. IEEE802.1Qay utilizes the IEEE802.1ah frame structure, where the B-DA MAC address and B-Tag BVID are used as the Tunnel Identifiers. The PBEBs seen in the diagram at A and D map the Provider Bridge frames onto an I-Tag I-SID and then adds the PBEB Destination MAC Address (B-DA) and B-VLAN ID ( B-VID). MAC learning, flooding and spanning tree processes are turned off across the PBB –TE network. Instead, the PBB devices are configured with forwarding tables where each B-DA/B-VID couple received on a given ingress port identifies a unique PBB-TE circuit and tunnel, and a specific egress forwarding port. PBB-TE also provides for provisioning of backup tunnels. The same I-Tag would be used for both the primary and backup tunnels, with a different B-VID used to discriminate between the two tunnels. Switching time targets between the tunnels is specified as 50 ms. IEEE 802.1ag Connection Fault Management (CFM) and ITU-T Y.1731 Performance Management (PM) are used to provide management and recovery for the PBB-TE tunnel Connection-oriented operation, rapid recovery times, and deterministic performance and QoS makes PBB-TE a good candidate for carrier Ethernet transport.
3.28
© Wray Castle Limited
TY2702/v3.1
Carrier Based Ethernet and Transmission Systems IP/MPLS
NMS
Control Plane
Control Plane embedded in LSRs signalling protocols e.g. • RSVP-TE • OSPF-TE unidirectional LSPs
Data Plane Forwarding based on MPLS shim header(s)
MPLS-TP
Control Plane implemented in NMS automatic or manual path configuration support bidirectional LSP set up over the same path
NMS Control Plane
Data Plane
Forwarding based on MPLS shim header(s)
Transport Attributes: - Connection Oriented, Reliability, QoS, E2E OAM, protection switching
Transport Profile (MPLS-TP) Acknowledging the increasing importance of packet transport MPLS-TP is a joint effort between the ITUT and the IETF to define a profile of MPLS that adapts it to support the capabilities of a packet transport network that includes transport characteristics such as connection-oriented operation, reliability, simplicity, protection switching, deterministic behaviour and OAM at a price point that makes it suitable for deployment in metro networks as well as core networks. MPLS-TP removes the need for a complex and expensive IP control plane to be embedded in the MPLS LSRs. This is expected to lead to equipment implementations that support carrier requirements but at a lower cost. In the standard MPLS model LSPs are established uni directionally via complex signalling procedures, using protocols such as OSPF-TE and RSVP-TE, together with path computation. The signalling and path computation procedures are carried out in the control plane elements of the LSRs. The LSRs also act as forwarding elements in the data plane. Bidirectional connectivity requires two paths to be established between edge LSRs which may or may not follow the same path through the network. In the MPLS-TP model, control plane complexity is shifted from the LSRs to a NMS. The NMS is used to preconfigure traffic engineered end-to-end paths through the MPLS nodes in the network. These nodes operate as forwarding devices in the data plane but do not take part in control plane functions. MPLS-TP allows for bidirectional point-to-point LSPs to be set up such that both directions follow the same path through the network. Provisioning via the NMS may be automated or manual.
TY2702/v3.1
© Wray Castle Limited
3.29
Next Generation Transmission
Service and Network Management Provisioning system
MPLS-TP Domain NE1
NE2
NE3
NE4
NE5
Ethernet
Ethernet
S-Tag
Tunnel 1
S-Tag
Tunnel 2
C-Tag P
Tunnel and PW Labels: • pushed on ingress • popped on egress
C-Tag TL1.1
TL1.2
TL2.1
TL2.2
PW1.1
PW1.1
PW1.2
PW1.2
S-Tag
S-Tag
S-Tag
S-Tag
C-Tag
C-Tag
C-Tag
C-Tag
P
P
P
P
Tunnel 1 label swap
Tunnel 1 and PW 1 Label swap
P
Tunnel and PW Labels: • pushed on ingress • popped on egress
Tunnel 2 label swap
MPLS-TP Transport Profile Example The example above shows how MPLS-TP may be used to provide an EVC across an MPLS-TP domain using a pseudo wire service. The edge devices are preconfigured by the management system to multiplex/demultiplex tagged Ethernet frames into and out of MPLS-TP tunnels and to apply the appropriate labels. The outer MPLS label is the tunnel label; the inner label is the PW label which is used to identify a particular Ethernet service flow. The core devices are configured to swap outer labels and inner labels as required to build the end-to-end path through the MPLS-TP domain. NE2 performs a label swap for tunnel 1. NE3 terminates tunnel layer, performs a label swap at the PW layer and pushes a new tunnel label, tunnel label 2.1, onto the label stack and forwards the data to NE4. NE4 performs a tunnel swap for tunnel 2. Finally, NE5 terminates tunnel 2 and the PW and forwards the tagged Ethernet frame to the customer.
3.30
© Wray Castle Limited
TY2702/v3.1
Carrier Based Ethernet and Transmission Systems Carrier Ethernet Attributes Service
Port-Based
VLAN-Based
Standardized Services
Type
(All-to-One Bundling)
(Service Multiplexed)
Scalability
E-Line
Ethernet Private Line
Ethernet Virtual Private Line
E-LAN
Ethernet Private LAN
Ethernet Virtual Private LAN
E-Tree
Ethernet Private Tree
Ethernet Virtual Private Tree
Reliability Service Management Quality of Service
Metro Ethernet Network EVC
CE UNI
CE UNI
Transport Technologies for Carrier Ethernet Services 802.1Qay -PBB-TE SONET/SDH
ITU-T and IETF MPLS-TP OTN
ETH Label Switching (ELS) 802.3 PHY
Transport Attributes connection-oriented, reliability, simplicity, deterministic behaviour, fast restoration protection switching – 50 ms, QoS, OAM
Carrier Ethernet Summary This section has discussed the evolution of transport networks from being voice centric to becoming data centric and the importance, going forward, of building transport networks that are optimized for packet transfer. Ethernet connectivity is becoming, if it is not already, the connectivity option of choice. Transporting Ethernet on an end-to-end basis is vitally important to customers and service providers alike. As Ethernet services become business critical it becomes equally critical that the technologies used to transport it are reliable. The term ‘carrier Ethernet’ is often thought to describe a technology, but in practice it is a reference to providing the reliable end-to-end transfer of Ethernet service flows. The MEF has provided an industry-accepted definition of carrier Ethernet: ‘A ubiquitous, standardized, carrier class Service and Network defined by five attributes that distinguish it from familiar LAN based Ethernet’. Additionally, the MEF have defined a standard set of Ethernet services, traffic shaping parameters and CoS marking scheme so that QoS can be applied in the transport network. Transport attributes have been identified together with a number transport technologies that provide these attributes. Carrier Ethernet Transport is not a single technology but a multilayer network architecture that combines a flexible packet layer with an efficient optical layer, SDH/NG-SDH/OTN, allowing end-to-end QoS, resilience and deterministic performance. The main forwarding technologies emerging for packet transport solutions are MPLS-TP, PBB-TE and Ethernet Label switching. One of the major requirements of transport networks is OAM, which includes fault management and performance management.
TY2702/v3.1
© Wray Castle Limited
3.31
Next Generation Transmission
Customer Site
Customer Site UNI
NID
Access
UNI Core Transport Network
10/100/GE NID
Access
Demarcation Point
OAM Layers MEF and ITU-T Y.1731
Reflected in customer SLAs
Service Layer
802.1ag, Y.1731 and MEF
EVC: CFM and PM
Connectivity layer
802.3ah
EFM
EFM
Link layer
Ethernet OAM Standards As Ethernet has evolved as a carrier transport service, a number of standards have emerged to provide OAM support, namely 802.3ah, Y.1731 and 802.1ag. Collectively, these standards provide performance management, connection fault management and troubleshooting functions. IEEE 802.3ah, otherwise known as EFM provides management at the port level for a single link, fibre or copper; it does not support end-to-end service monitoring functions. It has been designed to provide OAM across the access interface between CPE devices, such as a Network Interface Device (NID) providing the demarcation point between the service provider and the customer. MEF services such as E-Line and E-LAN provide connectivity at the EVC level. OAM functions for endto-end EVCs are defined in MEF 17. MEF 17 does not specify OAM physical link layer functions but with the connectivity layer, i.e. the EVC, and the service layer. The MEF standards specify edge-to-edge monitoring of an EVC provided across a single operator domain or across multiple operator domains. 802.1ag and Y.1731 provide functions allowing end-to-end service monitoring at the Ethernet connectivity layer and the service layer. However, rather than just providing an edge-to-edge view of an operator domain, 802.1ag and Y.1731 802.1ag provide the capability to monitor points within a domain. 802.1ag defines CFM (Connection Fault Management) functions, while Y.1731, in addition to CFM functions, also defines Performance Management (PM) functions. CFM functions include fault verification and isolation, while PM functions include monitoring frame loss ratio, delay, delay variation and jitter.
3.32
© Wray Castle Limited
TY2702/v3.1
Carrier Based Ethernet and Transmission Systems
Main Functions discovery unidirectional fault signalling link Monitoring loopback extensions container Customer Site Customer owned equipment
Customer Site
Loopbacks 802.3ah-EFM NID
NID Access UNI
Core Transport Network
OAM PDUs: relevant to a single link – therefore not forwarded service discovery – check OAM support loopback PDUs continuity PDUs event notification PDUs
Access UNI
Performance stats: % frame errors coding symbol errors Alarms – also trigger RDIs power, dying gasp loss of signal critical events – CPE failure
802.3ah – EFM EFM is a link layer OAM protocol which is applied specifically to a single physical link between an endpoint and a directly connected peer device. OAM PDUs are not forwarded by a receiving device. IEEE 802.3ah (EFM) uses OAM PDUs to implement service discovery, check link continuity and provide loopback capabilities. EFM functionality includes auto discovery, fault detection, link performance monitoring and loopback. The auto discovery mechanism is the first phase of the OAM protocol that peers use to determine each other’s OAM capabilities and configuration, e.g. support of loopback functions. On a normal link, OAM PDUs and data frames are sent in both directions. If a link fails in one direction then only OAM PDUs are sent in the opposite direction to the failure. This is often referred to as unidirectional fault signalling and is used to provide remote fault detection indications such as loss of signal to the far end, i.e. remote failure indication, dying gasp or a critical event such as a CPE failure. A ‘dying gasp’ condition occurs when there is a break in an end-point’s power supply. Prior to complete power failure a dying gasp alert is sent to the network operator’s management system. Remote monitoring capabilities enable devices to provide performance statistics. An event OAM PDU is used to notify a peer when a threshold has been exceeded. Monitored events include errored symbol periods and the number of errored frames. An 802.3ah capable device can put its peer into a remote loopback condition using a loopback control OAM PDU. This is useful for testing at the installation phase and troubleshooting. 802.3ah allows ‘organizational specific extensions’ to be written into the protocol. These enable vendors to incorporate proprietary management functions into their EFM implementation. This might include additional monitoring and discovery information, configuration details and trap notifications. For example, Omnitron NIDs include traps for customer-facing port faults, temperature and power deterioration and security and intrusion detection alarms. They are also able to monitor optical port parameters such as temperature power and voltage.
TY2702/v3.1
© Wray Castle Limited
3.33
Next Generation Transmission OAM Function CFM
PM
802.1ag
Y.1731
Fault detection
yes
yes
Continuity Check Message (CCM)
Fault/verification/ loopback
yes
yes
Fault isolation
yes
yes
MIP Discovery
yes
yes
Loop Back Message (LBM) Loop Back Response (LBR) Link Trace Message (LTM) Link Trace Response (LTR) Link Trace Message (LTM) Link Trace Response (LTR)
Fault Notification
no
yes
AIS/RDI
Maintenance
no
yes
ETH-LCK and ETH-Test
Frame Loss
no
yes
CCM Loss Measurment Message (LMM) Loss Measurement Response (LMR)
Frame Delay (one-way)
no
yes
Delay Message (one-way) (DM)
no
yes
Frame Delay Message (one-way) (DM)
no
yes
Delay Message (DMM) Delay Message Response (DMR)
Delay Variation (one-way) Frame Delay (RTT) Delay Variation
Method
DMM/DMR
Main standards: IEEE 802.1ag, ITU-T Y.1731 and MEF 6, 10 & 17
CFM and Performance Management (PM) IEEE 802.1 and ITU SG 13 and MEF have worked together to ensure that the set of Ethernet OAM standards are compatible. The IEEE has defined the protocol element and Opcodes for a specific set of CFM functions. The ITU-T and MEF reference these baseline standards and also provide additional CFM functionality together with PM capability. IEEE 802.1ag CFM functions focus on fault detection, fault localization using loopbacks capability, fault isolation and Maintenance Intermediate Point (MIP) discovery. ITU-T and MEF include fault notification such as RDI and AIS and maintenance and test signals, namely Ethernet Lock (ETH-LCK)and Ethernet Test (ETH-Test). The ETH-LCK signal is a maintenance option and is transmitted by a Maintenance End Point (MEP) to communicate intentional maintenance activity on that MEP. It is sent to all other MEPs in the same OAM level to suppress alarms and to provide a means for MEPs to distinguish between maintenance activity that disrupts data traffic and fault conditions. ETH-Test uses a OAM Test Signal message that is sent between MEPs and may be used to test throughput, measure bit errors, or detect frames delivered out of sequence. The ETH-Test may be used either in service or out of service. In-service testing must be at a rate that is not disruptive to traffic. Outof-service testing will cause MEPs to send LCK messages in addition to the test messages. Test messages include sequence number, transaction identifiers and a pseudo-random test pattern. There are used to test throughput, measure bit errors or detect frames delivered out of sequence. The PM functions are frame loss detection, frame delay (both one way and round trip time) and delay variation. The table above summarizes CFM and PM functions together with the OAM PDUs methods that are used to implement them.
3.34
© Wray Castle Limited
TY2702/v3.1
Carrier Based Ethernet and Transmission Systems
Operator A
Operator B
UNI
UNI
Customer OAM Level (Domain) – levels 5-7
Service provider OAM Level (Domain) – levels 3-4 ETH Service Layers
Layer 2 data flow Operator A OAM Level (Domain) levels 0-2
Operator B OAM Level (Domain) levels 0-2
Server/ Transport
MEP – Maintenance Endpoint manage OAM session, e.g. initiate a loopback MIP – Maintenance Intermediate Point- react and respond to OAM PDUs.
For a particular Maintenance Entity:
same domain same level same vlan
End-to-End Ethernet Service OAM The IEEE, ITU and MEF have adopted a common multi-domain OAM model. The Ethernet service layer sits on top of an underlying transport layer. The transport layer provides packet transport links between Ethernet devices in an operator’s/service provider’s network. The transport layer may be implemented over a single Ethernet link or multi-hop MPLS pseudo-wire or SONET/SDH or OTN paths each with their own OAM functions. The Ethernet OAM model is split into three distinct levels called maintenance domains: customer, service provider and operator. The customer OAM level has visibility of the end-to-end service between CE devices connected to the UNI. The service provider has end-to-end responsibility so has visibility of the end-to-end Ethernet path across the network. An end-to-end link is typically provided by a number of partner carriers, each with responsibility for their own network. The operator domain OAM level allows them to monitor tandem connections across their own networks. Notice that any given maintenance domain is bounded by Maintenance Endpoints (MEPs). Each domain may also have Maintenance Intermediate Points (MIPs). In practice, the Multi-domain model is implemented by network elements and CE equipment that act as OAM MEPs or MIPs. In the diagram, the data flow in Ethernet Layer is shown by the dashed line passing through the MEP and MIPs of various OAM levels configured in the network equipment. This data flow includes customer traffic and Ethernet OAM PDUs. OAM PDUs may be ‘addressed’ to a particular MEP/MIP at a particular OAM level. MEPs are functional entities that manage OAM sessions and generate/receive OAM PDUs, e.g. CCMs or LBMs. MIPs are intermediate functional entities on the end to-to-end path that react and respond to OAM PDUs, i.e. they forward them towards a MEP or provide troubleshooting information for fault isolation. Multiple MIPs and MEPs may be associated with a port on a device. However, a particular MEP and MIP must belong to a particular OAM level within a particular VLAN within a single domain. OAM levels are identified in the diagram. One of the goals of the OAM model is to contain alarms within predetermined levels. This goal is achieved by only allowing alarms detected in one level to be reported within that level and the level above. For example, a fault detected in the operator level is reported to the service provider level allowing the SP to reroute around the fault, while fault reporting in the detecting layer provides the operator with a rich set of information to allow them to localise and repair the fault. Although alarms may be reported into the next higher level, they are not reported between operator domains. TY2702/v3.1
© Wray Castle Limited
3.35
Next Generation Transmission MEP
interface FastEthernet1/0/1 switchport trunk encapsulation dot1q switchport mode trunk ethernet cfm mip level 7 ethernet cfm mep level 4 mpid 2110 vlan 110 ethernet cfm mep level 4 mpid 2101 vlan 101
MIP
ethernet cfm domain CUSTOMER_DOMAIN level 7 ethernet cfm domain Provider_DOMAIN level 4 mep archive-hold-time 60 service customer_101_provider vlan 101 service customer_110_provider vlan 110 ethernet cfm enable ethernet cfm traceroute cache
Site C
Gi0/1
Site A
Fa1/0/1
4 7 Gi0/1
POP 2
!
4
interface FastEthernet1/0/1 switchport trunk encapsulation dot1q switchport mode trunk ethernet cfm mip level 7 ethernet cfm mep level 4 mpid 1110 vlan 110 ethernet cfm mep level 4 mpid 1101 vlan 101
Fa1/0/24 Fa1/0/1
4
Gi3/24
7
4 4 Fa1/0/23
4
Gi3/23
!
4
POP 1
interface FastEthernet1/0/23* switchport trunk encapsulation dot1q switchport trunk mode ethernet cfm mip level 4
Gi3/48 Gi3/48
Site B 4
!
Fa0/1
ethernet cfm cc enable level 0-7 vlan 1-4095
4
Gi3/32
7 POP 3
mpid – MEP Identifier
MEP and MIP Assignments An EVC is provided via a number of service providers switches, as shown above, to a customer at three remote sites, A, B and C. To facilitate ETH OAM, the service provider has configured MEPS and MIPS at either OAM level 4 (service provider level) or 7 (customer level) on appropriate ports as shown. MEPs at level 4 are configured at the edges of the service provider domain, while each intermediate port is configured as a MIP at level 4. The service provider is able to initiate, via the MEPS, CFM and Performance Management (PM) functions end-to-end across their domain. The service provider has configured MIPS at the OAM level 7, but only at the edges of his domain. The MEPs for this level would either be configured on the customer routers or at demarcation devices at the customer sites. This gives the customer end-to-end visibility of their service. The configuration detail shows that there are two VLANs configured for this EVC on interface Fa1/0/1 on the switch at POP 1, VLAN 101 and VLAN 110. Each VLAN is assigned a MEP at level 4 with an associated MEP Id. Interface Fa1/0/1 is also configured with a MIP at level 7. A MIP at level 4 is configured on interface Fa1/0/23. The configuration data for all the MIP at level 4 and 7 will be similar to that shown in the diagram for the MIP on interface Fa1/0/23. The configuration data for the MEPs at POP 2 and 3 will be similar to that at POP 1 except the MEP Ids will differ per VLAN to those declared at POP 1, as shown at POP 2. This example is based on an extract from the following: ethernet-oam-tutorial_srinath-beldona cisco.
3.36
© Wray Castle Limited
TY2702/v3.1
Carrier Based Ethernet and Transmission Systems Service Provider ME S
S
S
S
CE A CE
A A
A
Operator A
A
Operator B B
A A
A
B
B
B B B
A
A
B
B
B
Operator A ME Operator A MEG
A
CE
MEP MIP
MEP
Maintenance Endpoint
MIP
Maintenance Intermediate Point
ME
Maintenance Entity
MEG
Maintenance Entity Group (ITU-T Y.1731)
MA
Maintenance Association (IEEE 802.1ag) (same definition as MEG)
CE
Ethernet Service OAM Service Terminology The ITU-T and MEF use the following terminology to define entities in the OAM architecture. A Maintenance Endpoint (MEP) is a functional entity that manages OAM sessions. For example, a MEP may generate messages to check continuity between a pair of MEPs. A Maintenance Entity (ME) is an entity that requires management. It may be considered to be an association between Maintenance endpoints, as indicated in the diagram. An ME is bounded by a pair of MEPs. A Maintenance Endpoint Group (MEG) includes a set of MEs that satisfy the following condition. MEs in a MEG must be in the same administrative domain and at the same OAM level, operator, service provider; MEs in a MEG belong to the same service provider S-VLAN, i.e. a point-to-point or multipoint EVC. IEEE 802.1ag uses the term Maintenance Association rather than MEG. It follows that MEPs and MIPS, which are part of an ME, must also be in the same domain, at the same OAM level, and on the same S-VLAN.
TY2702/v3.1
© Wray Castle Limited
3.37
Next Generation Transmission
CE A CE
A
A
Operator A
A
Operator B
B
B B
A A
B
B
B Operator B ME
ETH (CCM)
(CCM) ETH S
S ETH (CCM)
NE 1
(CCM) ETH S
ETH (CCM)
S ETH (CCM)
Fault free
NE 2
CCM intervals: 3.3 ms, 10 ms, 100 ms, 1 min or 10 mins Service Provider ME
MEPs pre configured with a list of all other MEPs (MEP Id list) in the domain
MEP MIP
ETH (CCM) – Ethernet frame with encapsulated) CCM – contains senders MEP Id Ethernet frame: SMAC – Unicast, DMAC Multicast
CCMs detection capabilities include: Link and Fabric Failures Duplicate MEPs Missing MEPs Data Loss
CFM Continuity Check Continuity Check Messages (CCM) are used to detect one way connectivity between a pair MEPs in an ME or between multiple pairs of MEPS in a MEG. CCMs may be sent at configured intervals ranging from 3.3ms to 10 seconds. MEPs and MIPs do not send responses to CCMs. The example above considers the case where there are no fault conditions on the network. MEPs at NE1 and NE2 send CCM messages to each other at a pre defined interval. This enables the MEPs to ‘continuously’ monitor connectivity. This example shows CCM messages being sent in the SP domain only. However, CCM messages may also be sent in the operator domains, i.e. along the ME between MEPs in Operator domain A and along the ME between MEPs in Operator domain B. When defining a service domain for a VLAN, MEPs are configured with a list of the MEP Ids for all other MEPS in that domain. CCM messages are sent using a DMAC multicast address to all other MEPs in the domain encapsulated in an Ethernet frame. The Ethernet frame contains the unicast SMAC address of the sender while the CCM messages include the MEPs identity. MEPs receiving CCM messages learn the senders MAC address and its MEP Id. Furthermore MEPs can identify which MEPS are active and can confirm, by comparing the MEP Id in the CCM to its pre configured list of MEP Ids, that the MEP is a valid member of the domain. CCMs may be used to determine a range of conditions included those listed in the diagram.
3.38
© Wray Castle Limited
TY2702/v3.1
Carrier Based Ethernet and Transmission Systems
Service Provider ME NE 1
CCM/RDI
CCM/RDI S S CCM CCM
S CCM
NMC
NE 2
CCM/RDI
NMC
S
uni directional fault
Alarm CE
Alarm A CE
A A
A
Operator A
Operator B
B
B
B
A A
B
B
B
uni directional fault
B
CCM
CCM/RDI
B
MEP MIP Operator B ME
CFM Fault Detection Consider a unidirectional fault at the point shown. In the SPs domain NE2 will not receive CCM messages. Following three consecutive lost CCM PDUs, NE2 sets the Remote Defect Indicator (RDI) flag in the CCM frame it sends to NE1 indicating that there is a loss of service. Both NE1 and NE2 report alarms to their NMCs. Similarly, in Operator B’s domain, NE2 will, following three consecutive lost CCM PDUs, set the RDI flag in the CCM messages sent to its peer at the other edge of the domain indicating that there is a loss of service.
TY2702/v3.1
© Wray Castle Limited
3.39
Next Generation Transmission
Service Provider ME
NE 1
LTM
LTM
S
NE 2
LTM
S
S
S
LTR
LTR
CE LTR A CE
A A
A
Operator A
Operator B
B
B
B
A A
B
B
B Operator B ME
MEP MIP LTR – Contains the MIPs MAC address
Link Trace Message – MIP Address Learning The link trace function, similar to IP trace route, may be used to discover the address of MIPs across an ME. LTM messages are sent using a DMAC multicast address to all other MEPs in the domain encapsulated in an Ethernet frame, alternatively the initiating MEP could use the unicast MAC address of a target MEP learned from the CCM procedures. The Ethernet frame contains the unicast SMAC address of the sending MEP. Any MIP receiving an LTM sends a response, LTR, to the initiating MEP’s unicast address. This is encapsulated in an Ethernet frame where the SMAC is the MIP’s unicast address. The MIP then forwards the LTR onto the next hop. The MEP at the distant end of the ME also responds to the LTM with an LTR indicating that the final destination, i.e. the MEP, has been reached. Following this procedure the initiating MEP learns the unicast MAC addresses of all the MIPs along a path to a given MEP.
3.40
© Wray Castle Limited
TY2702/v3.1
Carrier Based Ethernet and Transmission Systems
LBM to NE2 Service Provider ME
LBM NE 1
NE 2
LBM
S
S
S
LBR
S
LBR
CE A CE
A A
A
Operator A
Operator B
B
B
B
A A
B
B
B Operator B ME
MEP MIP
Loopback Procedures – CFM Fault Verification/Isolation If a fault is detected on the network the loopback function, similar to IP ping request/response, may be used to verify and isolate the fault. A network manager can initiate a loopback procedure across the Service Provider ‘s (SP’s) ME by sending a LoopBack Message (LBM) from the MEP at NE1, for example. The LBM is addressed to a specific MIP or MEP in the ME using the MIP’s/MEP’s unicast MAC address learned during the LTM and CCM procedures respectively . The addressed MIP/MEP responds with a LBR. In the example above NE1 receives successful responses from the two MIPs but this would not be the case for LBM sent to the MEP at NE2. Operator B could use the LBM procedure to isolate the fault within their network. The loopback method provides two way connectivity verification. It may also be used to provide a degree of performance monitoring, for example it can be used to measure delay and delay variation.
TY2702/v3.1
© Wray Castle Limited
3.41
Next Generation Transmission
Operator A
Operator B
UNI
UNI
RDI
Customer OAM levels 5-7
RDI SP OAM levels 3-4
AIS sent downstream In next higher layer
Operator OAM levels 0-2 Transport MEP MIP
Connectivity Failure detected here
Note that defect information is now transferred between operators
CFM AIS When a MEP detects a connectivity failure OAM Level N it injects AIS in the downstream direction away from the fault in the next higher OAM layer on each VLAN affected by the failure. A MEP receiving an AIS in a particular maintenance layer injects it into the next higher layer and sends RDI to its peer MEP in the same maintenance layer as itself. The AIS condition is sent periodically until the service is restored. The AIS interval range is 3.3 ms to 10 seconds; an interval of one second is recommended. When a MEP receives an ETH-AIS from a lower layer it detects AIS and suppresses alarms associated with all its peer MEPs. Note that RDI and AIS indication are supported by Y.1731 but not 802.1ag.
3.42
© Wray Castle Limited
TY2702/v3.1
Carrier Based Ethernet and Transmission Systems
Operator A
Operator B
UNI
UNI
EVC
TX/RX Counters
Frame Loss Measurement (CCM or LMM and LMR) (can be single ended or dual ended)
2 3 0 9 9
TX/RX Counters 2 2 9 5 6
Dual ended CCM both MEPs calculate near and far end frame loss
Single ended LMM/LMR LMR sender calculates near and far end frame loss
MEP
Performance Monitoring Y.1731 Frame Loss Ratio As well as Connection Fault Monitoring, Y.1731 adds Performance Monitoring to the Ethernet OAM functionality. Y.1731 and MEF 10 use the same parameter definitions for PM functions. These include frame loss ratio, service availability, frame delay and frame delay variation. Frame loss ratio is the difference between the number of frames transmitted by a MEP at one end of an EVC and those received at the other end of an EVC. There are two types of loss measurement, single ended and dual ended. Single-ended frame loss is calculated on demand between two MEPs using Loss Measurement Messages (LMM) and Loss Measurement Responses (LMR). The MEPs include TX and RX frame counters to determine the frame loss ratio at both the near end and the far end. Only the end that initiated the LMR message is able to calculate frame loss. Dual-ended frame loss is achieved using CCM messages and appropriate counters which enable MEPs at both ends to calculate near end and far end frame loss. Service availability can be assessed from the frame loss ratio over a period over time. If the loss ratio exceeds a threshold the service is considered to be unavailable.
TY2702/v3.1
© Wray Castle Limited
3.43
Next Generation Transmission
Operator A
Operator B
UNI
UNI
EVC One Way Delay (1DM) (clocks need to be time of day synchronized) 1DM Delay and Delay Variation
Two Way Delay (DMM/DMR) (does not need time of day clocks to be synchronized)
NE1
DMM DMR
MEP
1DM
DMR
NE2 DMR Proc time
RTT=(Time_DMR_RX)-(Time_DMM_TX)-(Processing time) Processing time=Time_DMR-TX -Time-DMM-RX
Performance Monitoring Y.1731 Delay and Delay Variation There are two types of Frame Delay measurement: One Way and Two Way. One-way measurement requires accurately synchronized time-of-day clocks at both MEPs. An initiating MEP sends periodic 1DM messages containing a transmit timestamp. The receiving MEP creates a receive timestamp at the instant the 1DM frame arrives and calculates the time delay as the difference between the two clocks. Two-way frame delay measurements allow an initiating MEP to calculate the Round Trip Time (RTT). This method does not require time-of-day synchronization. MEPs exchange Delay Measurement Messages (DMM) and Delay Measurement Responses (DMR), each of which contains a transmit timestamp and may include a receive timestamp and a return transmit timestamp. A MEP can approximate the RTT using just the transmit time stamp by comparing the time difference between a transmitted DMM and the DMR response. The additional timestamp information enables the DMR processing time to be compensated when calculating RTT. In the diagram:
Time_DMR_RX is the time the DMR message is received by NE1, as seen by NE1 clock Time_DMM_TX is the time the DMR message is sent by NE1, as seen by NE1 clock Time_DMR_TX is the time NE2 sends the DMR, as seen by NE2 clock Time_DMM-RX is the time NE2 receives the DMM, as seen by NE2 clock
Frame delay variation is calculated by monitoring the variation in delay between two delay measurements.
3.44
© Wray Castle Limited
TY2702/v3.1
Carrier Based Ethernet and Transmission Systems
S-Tag DA 6 Octets
SA 6 Octets
C-Tag
OAM Type 0x8902
T-PID S-VID T-PID C-VID
OAM E-Type
ITU-T
FCS
0
802.1ag
Codes
Y.1731
0-31
yes
yes
32-63
yes
no
64-255
no
yes
4 Octets
Octets
Op Code – OAM message type Op
Data
2 2 2 2 2 Octets Octets Octets Octets Octets
Octets
0
MA Level
Version
1
2
3
Op Code
Flags
TLV Offset
4 8 12 Last
End TLV
MA 0–2 Network operator level OAM MA 3+4 Provider level OAM MA 5–7 Customer level OAM
OAM Frame The IEEE 802.1 and ITU study group 13 have been working on a common frame format. The work is in progress, so some of the parameters are still to be defined. The OAM frames will be addressed using the same Tag values as the traffic to which they refer. A new OAM ETYPE 0x8902 has been defined to identify that this is not normal traffic but carrying OAM. The OpCode will be used to identify the OAM operation and the FLAGS will have specific meanings dependent upon the leading OpCode. For example, in a CCM message the flags are used to encode the CCM sending interval; they also contain the RDI. The TLV offset records the position of the first information element within the OAM payload. The MA levels are: MA 5–7 Customer Level; MA 3+4 Provider Level; and MA 0–2 Network Level.
TY2702/v3.1
© Wray Castle Limited
3.45
Next Generation Transmission LAN PHY Ether Type
WAN PHY Ether Type
Transmission Rate
Cable Type
? nm
IEEE
Distance
Duplex
100Base2
NA
10 Mbit/s
Coax (thick or thin)
NA
802.3
64 octets
Flags 0000
0000
Sequence number ATM specific Optional (16) (8)
– ATM N-to-one cell mode – AAL5 SDU Frame Mode RFC 4446 N-to-one mode. Either one or more VCCs or one or more VPCs may be mapped to one PW. The VPI/VCI is always present. Cells from one or more VCCs (or one or more VPCs) may be concatenated.
0000
Flags 0000
RES (2)
LEN (000000)
SEQ NO. (16)
Flags/length not used
Three deployment models: 1. Single ATM connection. A PW carries the cells of only one VCC or VPC. Supports transport of multiservice ATM for all AAL types. 2. Multiple ATM connections. A PW carries the cells of multiple VCCs or VPCs. Supports transport of multiservice ATM for all AAL types. 3. AAL5. A PW carries the cells of only one VCC . Supports transport of multiservice ATM. The AAL SDU is the upper layer PDU – i.e. If the upper layer is IP then the AAL SDU i s the IP datagram.
ATM Pseudo Wire General
TY2702/v3.1
© Wray Castle Limited
A9.1
Next Generation Transmission
ATM Packed Cell Relay (One-to-One) Mode One VCC per PW – with multiple cells (VPI/VCI not included) Tunnel Label PW Label 0000
Control Word
RSV (4)
SEQ NO. (Optional) (16)
M
V
RES (2)
PTI (3)
C
ATM Payload 48 bytes M
Control Word ATM Payload 48 bytes
V
RES (2)
PTI (3)
C
M=0 : packet contains ATM cells M=1: packet contains AAL5 payload V=0: no VCI field present, i.e. Payload is a VCC V=1: VCI present, payload is a VPI PTI: Payload Type Indicator mapped from the ATM header C: CLP bit mapped from ATM Header field
Control Word
M
V
RES (2)
PTI (3)
C
ATM Payload 48 bytes
ATM Cell Relay VCC: one-to-one
ATM Packed Cell Relay (One-to-One) Mode One VPC per PW – with multiple cells (Only the VCI is included) Tunnel Label PW Label Control Word
0000
RSV (4)
SEQ NO. (Optional) (16)
M
V
RES (2)
PTI (3)
C
VCI ATM Payload 48 bytes Control Word
M
VCI
RES (2)
PTI (3)
C
M=0 : packet contains ATM cells M=1: packet contains AAL5 payload V=0: no VCI field present, i.e. Payload is a VCC V=1: VCI present, payload is a VPI PTI: Payload Type Indicator mapped from the ATM header C: CLP bit mapped from ATM Header field
ATM Payload 48 bytes
Control Word
V
M
V
RES (2)
PTI (3)
C
VCI ATM Payload 48 bytes
ATM Cell Relay VPC: one-to-one
A9.2
© Wray Castle Limited
TY2702/v3.1
Pseudo Wires ATM AAL5 CPCS - PDU Mode AAL5 flows mapped to a PW
Tunnel Label PW Label Control Word Payload AAL5 CPCS - PDU N*48 bytes
CPCS Common Part Convergence Sublayer RSV SEQ NO. (Optional) RES Control 0000 M V (4) (16) (3) Word
U
E
C
M=0 : packet contains ATM cells M=1: packet contains AAL5 payload V=0: no VCI field present, i.e. Payload is a VCC V=1: VCI present, payload is a VPI U: used when interworking with Frame Relay . The FR C/R bit is copied here E : EFCI [1if the EFCI bit of the final AAL5 cell is set to 1 C: CLP bit mapped from ATM Header field
ATM AAL5 Pseudo Wire
ATM Packed Cell Relay (N-to-One) Mode. Where multiple VCC or VPCs are transferred on one PW the VPI/VCIs must be unique Tunnel Label PW Label
Optional 0000
Control Word VPI
VCI
PTI
Flags 0000
CLP
RES (2)
LEN (000000)
SEQ NO. (16)
Flags/length not used 1
ATM Payload 48 bytes VPI
VCI
PTI
CLP 2
ATM Payload 48 bytes
VPI
VCI
PTI
CLP
28 max
ATM Payload 48 bytes
ATM N-to-One Pseudo Wire
TY2702/v3.1
© Wray Castle Limited
A9.3
Next Generation Transmission
Structure Agnostic TDM over Packet E1/T1 and E3/T3 emulation SATOP RFC 4553
SATOP RFC 4553
SATOP RFC 4553
TDM Payload
TDM Payload
TDM Payload
CW (Man)
RTP (Opt)
RTP (Opt)
RTP (Opt)
CW (Man)
CW (Man)
UDP (Demux )
L2TPv3 (Demux )
PW Label (Demux )
IP
IP
MPLS Tunnel Label
0000
L R
RSV FRG (2) (2)
LEN (6)
SEQ NO. (16)
Mandatory payload support : – E1 – 256 bytes (8 frame s worth) – T1 – 192 bytes (8 frames worth) – E3/T3 – 1024 bytes
Structure Agnostic TDM over Packet E1/T1 adn E3/T3 emulation
Structure Aware Circuit Emulation over Packet Nx64 kbit/s
CESoPSN RFC 5086
CESoPSN RFC 5086
CESoPSN RFC 5086
TDM Payload
TDM Payload
TDM Payload
CW (Man)
RTP (Opt)
RTP (Opt)
RTP (Opt)
CW (Man)
CW (Man)
UDP Dest Port (Demux )
L2TPv3 (Demux )
PW Label (Demux )
IP
IP
MPLS Tunnel Label
0000
L R M)
FRG 2
LEN (6)
SEQ NO. (16)
Typical payload consists of m frames, where a frame is N timeslots
Structure Aware Circuit Emulation over Packet Nx 64 kbit/s
A9.4
© Wray Castle Limited
TY2702/v3.1
Pseudo Wires TDM over IP Structure Aware and Structure Agnostic TDMoIP RFC 5087
TDMoIP RFC 5087
TDMoIP RFC 5087
TDMoIP RFC 5087
TDM Payload
TDM Payload
TDM Payload
FCS
CW (Man)
RTP (Opt)
RTP (Opt)
TDM Payload
RTP (Opt)
CW (Man)
CW (Man)
RTP (Opt)
UDP Source or Dest Port (Demux)
L2TPv3 Session Id (Demux)
PW Label
MPLS PW Label
Tunnel Label
CW (Man)
IP
IP
Eth Type 88D8 or 8847 (8847 is the MPLS Eth Type) VLAN ID (OPT)
0000 L R
M
RES
LEN (6)
SEQ NO. (16)
Supports real time streams: – constant – rate real time traffic – AAL1 adaptation –
VLAN Eth Type 8100 (OPT) Source MAC Destination MAC
unstructured or structured unchannelized, or structured channelized all channels active all the time
–
AAL1 must be used where high timing accuracy is required
–
variable - rate real time traffic – AAL2 adaptation for example a channelized circuit where all channels are not active all the time – called loop emulation
TDM over IP Structure Aware and Structure Agnostic
TY2702/v3.1
© Wray Castle Limited
A9.5
Next Generation Transmission
A9.6
© Wray Castle Limited
TY2702/v3.1
Next Generation Transmission
NEXT GENERATION TRANSMISSION
GLOSSARY OF TERMS
© Wray Castle Limited
I
Next Generation Transmission
II
© Wray Castle Limited
Next Generation Transmission A AAL AAL5 ABR ABT AC AD ADM ADSL2+ AIS AIS ANPS AP APM APS ARPU AS ASE ASON ASTN ATC ATM ATMF AToM AUG AUI AW AWDM AWG
Adaptation ATM Adaptation Layer ATM Adaptation Layer 5 Available Bit Rate ATM Block Transfer Attachment Circuit Automatic Discovery Add and Drop Multiplexer Asynchronous Digital Subscriber Line 2+ Alarm Indication Signal Alarm Inhibit Signal Automatic Network Protection System Access Point Aggregator/Parser Multiplexer Automatic Protection Switching Average Revenue Per User Administrative System Amplified Spontaneous Emission Automatic Switched Optical Network Automatic Switched Transport Network ATM Transfer Capability Asynchronous Transfer Mode ATM Forum Any Transport over MPLS Administration Unit Group Attachment Unit Interface Administration Weight Access WDM Arrayed Waveguide Grating
B-DA BDI BDI-O BDI-P BECN BEI BGP BIAE BIP BIP8 B-ISUP BSC B-SHR BTS B-VID B-VLAN BWP
B MAC Destination Address Backward Defect Indication Backward Defect Indication – Overhead Backward Defect Indication – Payload Backward Explicit Congestion Notification Backward Error Indication Border Gateway Protocol Backward Incoming Alignment Error Bit Interleaved Parity Bit Interleaved Parity – 8 bits Broadband ISDN User Part Base Station Controller Bidirectional Self Healing Ring Base Transceiver Station B-VLAN ID Backbone VLAN Bandwidth Profiles
C C C CAC CBR CBS CC CC CC CCAMP CCC CCID CCM CCM CD CDV CE CEN
Customer Canonical Control Word Bit Connection Admission Control Constant Bit Rate Committed Burst Size Control Channel Connection Controller Connection Controller Common Control and Management Plane Calling or Called-party Call Controller Control Channel ID Continuity Check Message Council Channel Management Collision Detection Cell Delay Variation Customer Edge Carrier Ethernet Network
TY2702/v3.1
© Wray Castle Limited
G.1
Next Generation Transmission CEQ CESoPSN CFM cHEC CI CID CII CIR CLP CLR CMI CMIP CONC CoS CP CP CP CPE CPM CRC CRC8 CR-LDP CSPF CSPF C-Tag CTP CTRL CV CWDM
Customer Equipment Circuit Emulation Service over PSN Connectivity Fault Management core Header Error Code Characteristic Information Channel Identifier Common Interworking Indicator Committed Information Rate Cell Loss Priority Cell Loss Ratio Code Mark Inversion Common Management Information Protocol Concentrator Class of Service Central Processor Communications Provider Connection Point Customer Premises Equipment Control/Parser Multiplexer Cyclic Redundancy Check Cyclic Redundancy Check – 8 bits Constraint-based Routed Label Distribution Protocol Constrained Shortest Path First Constraint-based Shortest Path First Customer Tag Connection Termination Point LCAS Control Connectivity Verification Coarse Wavelength Division Multiplexing
DA DA DACCS DAPI DBR DCM DCM DCN DCSC DE DEI DiffServ DLCI DM DMAC DMM DMR DSL DWDM DXC
Destination Address Discovery Agent Digital Access Cross Connect System Destination Access Point Identifier Deterministic Bit Rate Dispersion Compensation Module Distributed Call and Connection Management Data Communication Network Data Channel Switch Capable Discard Eligible Discard Eligibility Indicator Differentiated Services Data Link Connection Identifier Delay Message (1-way) Destination MAC Delay Message Delay Message Response Digital Subscriber Line Dense Wavelength Division Multiplexing Digital Cross-Connect
EA ECMP EDFA EFM EIR E-LAN E-Line ELS EMS E-NNI EOS EOW EPL EP-LAN ERO
Extension bit Equal Cost Multi Path Erbium-Doped Fibre Amplifier Ethernet in the First Mile Excess Information Rate Ethernet LAN Ethernet-Line Ethernet Label Switching Element Management System NNI inter-domain End Of Sequence Engineering Order Wire Ethernet Private Line Ethernet Private LAN Explicit Route Object
G.2
© Wray Castle Limited
TY2702/v3.1
Next Generation Transmission ESCON ETSI EVC EVPL EVP-Tree EXI EXI EXP
Enterprise Systems Connection European Telecommunications Standards Institute Ethernet Virtual Circuit Ethernet Virtual Private Line Ethernet Virtual Private Tree Extension Identifier Extension Indicator Experimental
FAS FAW FCS FDDI FDI-O FDI-P FEBE FEC FEC FECN FEND FERF FIB FM FP FR FRAD FRP FRR FRWD FSC FTFL
Frame Alignment Signal Frame Alignment Word Frame Check Sequence Fibre Distributed Data Interface Forward Defect Indicator – Overhead Forward Defect Indicator – Payload Far End Block Error Forward Error Correction Forwarding Equivalence Class Forward Explicit Congestion Notification Far End Far End Receive Failure Forwarding Information Base Fault Management Functional Process Frame Relay Frame Relay Assembler/Dissembler Fast Reroute Protection Fast Re-Route Forwarder Fibre Switch Capable Fault Type and Fault Location
GCC0 GFC GFP GFP-F GFP-T GID GMPLS GPRS GPS GS GSM GSMP
General Communication Channel-0 Generic Flow Control Generic Framing Procedure Frame Mapped Generic Framing Procedure Transparent Generic Framing Procedure VCG Group Identification Generalized Multi Protocol Label Switching General Packet Radio Service Global Positioning System Group Switch Global System for Mobile Communications General Switch Management Protocol
HDLC HDTV HEC H-LSP HOP HPA HPC HPOH HPT HVC
High-level Data Link Control High Definition Television Header Error Control Hierarchical Label Switched Path High Order Path High Order Path Adaptation HOP Connection Higher-order Path Over Head High Order Path Termination High Order Virtual Container
IaDI IAE iBGP IETF IGP ILA I-NNI IP IPCC IPTV
Intra-Domain Interface Incoming Alignment Error Internal Border Gateway Protocol Internet Engineering Task Force Interior Gateway Protocol In Line Amplifier NNI intra-domain Internet Protocol IP Control Channel IP Television
TY2702/v3.1
© Wray Castle Limited
G.3
Next Generation Transmission IPv4 IPv6 IrDI ISC IS-IS ISIS-TE ITU-T
Internet Protocol version 4 Internet Protocol version 6 Inter-Domain Interface Interface Switching Capabilities Intermediate System to Intermediate System ISIS Traffic Engineering International Telecommunication Union – Telecommunication Standardization Sector
L L2TP LACP LAG LAN LAS LBM LBR LC LCAS LCV LDP LDP LFT LLC LMM LMP LMR LOP LOS LPA LPC LPC LPOH LPT LRM LSA LSC LSP LSR LTM LTR LVC
Local Failure Layer 2 Tunnelling Protocol Link Aggregation Control Protocol Link Aggregation Group Local Area Network Link Aggregation Sublayer Loop Back Message Loop Back Response Link Connection Link Capacity Adjustment Scheme Link Connectivity and Verification Label Description Protocol Label Distribution Protocol Label Forwarding Table Logical Link Control Loss Measurement Message Link Management Protocol Loss Measurement Response Low Order Path Loss Of Signal Low Order Path Adaptation LOP Connection Link Property Correlation Lower-order Path Over Head Low Order Path Termination Link Resource Manager Link State Attribute Lambda Switch Capable Label Switched Path Label Switched Router Link Trace Message Link Trace Response Low Order Virtual Container
M MA MAC MAN MAU MCp ME MEF MEG MEN MEP MFI MH-PW MIB MII MIP MMI MoE MoP MoR MoS MP-BGP MPEG MPLS
Defect Modifier Maintenance Association Medium Access Control Metropolitan Area Network Medium Attachment Unit Matrix Connection protection Maintenance Entity Metro Ethernet Forum Maintenance Entity Group Metro Ethernet Network Maintenance End Point Multiframe Indicator Multi Hop Pseudo Wires Managed Information Base Media Independent Interface Maintenance Intermediate Point Man–Machine Interface T-MPLS over Ethernet T-MPLS over PDH T-MPLS over Resilient Packet Ring T-MPLS over SDH Multi Protocol BGP Motion Picture Experts Group Multi Protocol Label Switching
G.4
© Wray Castle Limited
TY2702/v3.1
Next Generation Transmission MPLS-TE MPLS-TP MS-AIS MSAN MSC MSOH MSP MSPP MST MST MSTP MTU
MPLS – Traffic Engineering MPLS – Transport Profile Multiplexer Section Alarm Indication Signal Indication Multi Service Access Node Mobile-services Switching Centre Multiplexer Section Overhead Multiplex Section Protection Multi Service Provisioning Platform Multiplexer Section Termination Member Status Multiple Spanning Tree Protocol Maximum Transmission Unit
NAT NC NCC NCCMAC nD-ROADM NE NEM NEND NGN NHLFE NHOP NID NLPID NMC NMS NNHOP NNI NPC nrt-VBR NSP NSP
Network Address Translation Network Connection Network party Call Controller NCC at the MAC layer nDimentions-Reconfigurable Optical Add Drop Multiplier Network Element Network Element Manager Near End Next Generation Network Next Hop Label Forwarding Entry Next Hop Network Interface Device Network Layer Protocol Identifier Network Management Centre Network Management System Next-next Hop Network Node Interface Network Parameter Control non-real-time Variable Bit Rate Network Service Processor Native Service Processing
OADM OAM OCC OCG OCh OChr OCI ODF ODTUG2 ODU ODUk OIF OLA OLT OLTE OMS OMSP ONNI OOS OPS OPU OPUk OSA OSC OSI OSPF OSPF-TE OSTN OTM OTM-n OTN
Optical Add-Drop Multiplexer Operations Administration and Maintenance Optical Channel Carrier Optical Carrier Group Optical Channel – full functionality Optical Channel – reduced functionality Open Connection Indicator Optical Distribution Frame Optical Channel Data Tributary Unit Group 2 Optical-channel Data Unit Optical-channel Data Unit – k Optical Internetworking Forum Optical Line Amplifier Optical Line Terminal Optical Line Terminating Equipment Optical Multiplex Section Optical Multiplex Section Protection Optical Network Node Interface OTM Overhead Signal Optical Physical Section Optical-channel Payload Unit Optical-channel Payload Unit – k Optical Spectrum Analyser Optical Supervisory Channel Open Systems Interconnect Open Shortest Path First OSPF Traffic Engineering Automatic Switched Optical Network Optical Transport Modules Optical Transport Module – n Optical Transport Network
TY2702/v3.1
© Wray Castle Limited
G.5
Next Generation Transmission OTS OTU OTUk OVC OXC
Optical Transmission Section Optical Transport Unit Optical Channel Transport Unit Operator Virtual Connection Optical Cross-Connect
P P PB PBB PBB-TE PBT PBX PC PCC PCM PCP PCS PDA PDH PDN PE PEB pFCS PFI PHB PHP PHY PLS PM PMA PMD PMI PNNI POH PON POP PoS POS POTS PPP PPPoA PPPoE PPS PRBS PRC PREP PSC PSF PSI PSN PT PTI PVC PW PWE3
Priority Provider Provider Bridges Provider Backbone Bridging PBB with Traffic Engineering Provider Backbone Transport Private Branch Exchange Protocol Controller Protection Communication Channel Pulse Code Modulation Priority Code Point Physical Coding Sublayer Personal Digital Assistant Plesiochronous Digital Hierarchy Private Data Network Provider Edge Provider Edge Bridge payload Frame Check Sequence Payload FFCS Indication Per Hop Behaviour Penultimate Hop Popping Physical Interface Physical Layer Signalling Performance Monitoring Physical Medium Attachment Physical Medium Dependent Payload Missing Indicator Private Network to Network Interface Path Overhead Passive Optical Network Point of Presence Packet over SDH Packet Over SONET Plain Old Telephone Service Point-to-Point Protocol Point-to-Point over ATM Point-to-Point over Ethernet Path Protection System Pseudo Random Binary Signal Primary Reference Clock Pre-Processing Packet Switch Capable Pseudo Wire Stitching Function Payload Structure Identifier Packet Switched Network Payload Type Payload Type Identifier Permanent Virtual Circuits Pseudo Wire Pseudo Wire Emulation Edge to Edge
QoS
Quality of Service
R RC RCOH RDI REI RF RFC
Remote Failure Routing Controller Radio Complementary Overhead Remote Defect Indication Remote Error Indication Radio Frequency Request For Comments
G.6
© Wray Castle Limited
TY2702/v3.1
Next Generation Transmission RR-STM RS RSA RS-ack RSOH RST RSTP RSVP RSVP-TE RTP rt-VBR
STM-1 radio-relay Regenerator Section Re-Sequence Acknowledge Re-Sequence Acknowledgement Regenerator Section Overhead Regenerator Section Termination Rapid Spanning Tree Protocol Resource Reservation Protocol Resource Reservation Protocol – Traffic Engineering Real-time Transport Protocol real-time Variable Bit Rate
S SA SA SA SAAL SAg SAN SAPI SBR SCs SDH SDH-DRRS SDU SE SGSN SLA SM SM SMAC SNC SNCP SNMP SNP SNPP SNR SOH SONET SPC SPF SPI SQ SRLG SSCF SSCOP SSF SSMB S-Tag STM SVC S-VLAN
Stack Section Adaptation Source Address Structure Aware Signalling AAL Structure Agnostic Storage Area Network Source Access Point Identifier Statistical Bit Rate Switched Connection Synchronous Digital Hierarchy SDH Digital Radio-Relay System Service Data Unit Shared Explicit Serving GPRS Support Node Service Level Agreements Section Monitoring Synchronous Multiplexer Source MAC Sub Network Connection SNC Protection Simple Network Management Protocol Sub Network Point Sub Network Point Pool Signal-to-Noise Ratio Section Overhead Synchronous Optical Network Soft Permanent Connection Shortest Path First Synchronous Physical Interface Sequence Indicator Shared Risk Link Group Service Specific Coordination Function Service Specific Connection Oriented Protocol Server Signal Fall Synchronization Status Message Byte Service-provider’s Tag Synchronous Transport Module Switched Virtual Circuit Service VLAN
TAP TCM TCP TCP TDM TDMoIP TE TE TED TIM TLV TM TMH
Termination and Adaptation Performer Tandem Connection Monitoring Termination Connection Point Transmission Control Protocol Time Division Multiplexing TDM over IP Thermo Electric Traffic Engineering Traffic Engineering Database Trace ID Mismatch Type Length Value Terminal Multiplexers T-MPLS Hierarchy
TY2702/v3.1
© Wray Castle Limited
G.7
Next Generation Transmission T-MPLS TNA TPI TRAN TT TTI TTL TTp TTP TTPid TTu TU TUG
Transport MPLS Transport Network Address Tag Protocol Identifier Transport Services Layer Trail Termination Trail Trace Identifier Time To Live protected Trail Termination Trail Termination Point Trail Termination Part identifier unprotected trail termination Tributary Unit Tributary Unit Group
UBR UDP UNI UPC UPE UPI U-SHR
Unspecified Bit Rate User Datagram Protocol User Network Interface Usage Parameter Control Ultimate PE User Payload Identifier Unidirectional Self Healing Ring
VBR VC VC VCAT VCC VCCV VCG VCI VCI vcPT VDSL2 VFI VI VLAN VoD VoIP VP VPC VPI VPL VPLS VPN VRF
Variable Bit Rate Virtual Circuit Virtual Container Virtual Concatenation Virtual Channel Connection Virtual Circuit Connectivity Verification Virtual Concatenation Group Virtual Circuit Identifier Virtual Channel Identifier Virtual Concatenation Payload Type Very-high-speed Digital Subscriber Line 2 Virtual Forwarding Instance VLAN Identifier Virtual Bridged LAN Video on Demand Voice over IP Virtual Path Virtual Path Connection Virtual Path Identifier Virtual Path Link Virtual Private LAN Service Virtual Private Network Virtual Routing and Forwarding
WAN WDM WDM WSS WTR WXC
Wide Area Network Wavelength Division Multiplexing Wave Division Multiplexer Wavelength Selection Switch Wait To Restore Wavelength Cross Connect
XC XGMII
Cross Connect 10 Gigabit Media Independent Interface
G.8
© Wray Castle Limited
TY2702/v3.1
View more...
Comments