Protection Dr. Jnos Tapolcai tapolcai@tmit.bme.hu - - PowerPoint PPT Presentation

protection
SMART_READER_LITE
LIVE PREVIEW

Protection Dr. Jnos Tapolcai tapolcai@tmit.bme.hu - - PowerPoint PPT Presentation

Dedicated and Shared Protection Dr. Jnos Tapolcai tapolcai@tmit.bme.hu http://opti.tmit.bme.hu/~tapolcai/ 1 Design goals in Survivable Networks High connection availability Short recovery time Complex Scalability


slide-1
SLIDE 1

1

Dedicated and Shared Protection

  • Dr. János Tapolcai

tapolcai@tmit.bme.hu http://opti.tmit.bme.hu/~tapolcai/

slide-2
SLIDE 2

Design goals in Survivable Networks

  • High connection availability
  • Short recovery time
  • Scalability
  • Maintainability
  • Efficient usage of network resources
  • We search for the best trade off

– Efficiency vs. complexity

2

Simple Complex

slide-3
SLIDE 3

Dedicated Protection

  • For single connection

1 working + 1 protection path is allocated The two path are disjoint

1 1 1 1 1 1 2 1 1

The reserved capacity along the common link is : A + B PRO: instantaneous recovery (no action is needed)

slide-4
SLIDE 4

4

Shared Protection

  • If two working path is (SRLG) disjoint, the

capacity along their protection routes can be shared

– At most one of them is activated after a single failure

1 1 1 1 1 1 1 1 1

The spare capacity along the common link is : max{A,B} CONS: we need actions (signaling) after failure

slide-5
SLIDE 5
  • 1st phase: Failure detection (depends only on the network

architecture)

  • 2nd phase: Failure localization

(isolation) (tl)

  • 3rd phase: Failure notification (tn)
  • 4th phase: Failure correlation (tc)
  • 5th phase: Fault restoration

– Path selection (tp) – Device configuration (td)

Recover Time – The Tasks After Failure

Failure management

slide-6
SLIDE 6

6

Recovery Cycle

Recovery time Recovery operation (switching) time Fault notification time Fault detection time time notification The service is

  • perational

Failure detected by the nearast node The protection path is deployed Data flow arrives at the destination node

failure

Hold-Off time Sending fault notification The service is

  • perational

On the example shared protection: tl = 10 ms, tn = 20-30 ms, tc = 20-30 ms, tp = 0-30 ms, td = 50 ms, tR= 100-150ms

Traffic Recovery time

slide-7
SLIDE 7

Shared protection (pre-planned)

3

Network resource usage vs. recover time

Dedicated protection Dynamic restoration 150 ms 0 ms 0 % 100 % 150 ms 0 ms 0 % 100 % 150 ms 0 ms 0 % 100 %

? R T R T T

Protection: the restoration process (e.g. protection paths) is planned at connection setup Dynamic restoration: the restoration process is computed on-the-fly after failure

slide-8
SLIDE 8

8

Link, Segment or Path Protection

1 2 3 4 7 5 8 9 6 1 2 3 4 7 5 8 9 6 fault

Link protection: local, loop back

1 2 3 4 7 5 8 9 6

fault fault

1 2 3 4 7 5 8 9 6

Segment protection: A good compromise Working path Path protection: global, efficient

slide-9
SLIDE 9

9

Protection and restoration

100%, fast No guarantee, slower pre-planned (protection) after failure event occures (restoration) link path segment link path segment dedicated shared dedicated shared dedicated shared Failure dependent Faiure independent (the faied element is unknown) Failure dependent Faiure independent (the faied element is unknown)

Different protection approaches from down to top (e.g. Dedicated Path protection or Failure Dependent Shared Link Protection)

slide-10
SLIDE 10

10

Dedicated 1+1 Path Protection

  • Two signal is sent parallel along the working path

and along the protection path

  • If the working path is interrupted by a fault

– The destination node switches to protection path

  • Simple, high network resource usage (100%

redundancy)

R T

S D

swithcing

slide-11
SLIDE 11

11

Dedicated 1:1 protection

  • We reserve two disjoint path for the connection
  • If the working path is interrupted by a fault

– The source and destination node switches to protection path

  • In no failure state the protection route can be

used for best effort traffic

– It is called „preemption”

R T

S D

switching switching

slide-12
SLIDE 12

12

Dedicated 1:n Path Protection

  • There is n disjoint working path between the same source

and destination nodes

– Better capacity efficiency  – CON: slightly smaller availability 

  • What is the avalabiltiy of 1:1 protection?

– Aw, Ap

  • What about 1:2?

– Aw1, Aw2, Ap

A=1-(1-Aw)(1-Ap)=Aw+Ap-AwAp A=Aw1Aw2+(1-Aw1)Aw2Ap+Aw1(1-Aw2)Ap

S D

slide-13
SLIDE 13

Diversity Coding (DC)

  • Split the traffic into n sub data flows
  • Use coding techniques along the protection route

– For single failure – For n=2 it is the bitwise XOR of the two working path

  • There are not many (short) disjoint paths in the network

13

R T

slide-14
SLIDE 14

14

Self healing rings – 1+1 dedicated path protection

  • Used in ring acces networks

Path 1 Path 2 B   A B   Failure A

Switch

slide-15
SLIDE 15

15

Self healing rings – 1:1 dedicated link protection

  • Used inside a building/office

Working ring A B   A B   Failure Protection ring

Switch Switch

slide-16
SLIDE 16

16

Amsterdam London Brussels Paris Zurich Milan Berlin Vienna Prague Munich Rome Hamburg Lyon Frankfurt Strasbourg Zagreb

P-cycles

  • Shared Protection
  • Protection cycles are

defined in advance in the spare capacity of the network

  • On-cycle and straddling

links

  • Only two switching

R T

slide-17
SLIDE 17

17

P-cycles

  • Similar to Self-healing rings
  • Working path is routed along the shortest path
  • Failure occurs along

– On-cycle link

  • Route the connection into the other direction

– Straddling links

  • Decompose the working data into two parts
slide-18
SLIDE 18

18

P-cycles

  • Unit bandwidth along the p-cycle

– Protects unit working bandwidth if the working path is routed along the cycle – Protects two units of working bandwidth if the working path traverses on a straddling link

  • Pros:

– No spare capacity reservation along straddling links – Could be a lot of straddling links – Efficient bandwidth usage – Only two switching needed at recovery

  • Two nodes along the cycle
slide-19
SLIDE 19

19

Shared protection

  • Working path is reserved
  • Protection path are only calculated

– They are built up in the optical control plane, but the switches are not configured

  • Soft-switching
  • Shared protection
  • Backup multiplexing

1 1 1 1 1 1 1 1 1

slide-20
SLIDE 20

20

Capacity on the edges

Free capacity Spare capacity Working capacity Non-shareable Free capacity Shareable Working capacity

with W sw

j

link j link j

slide-21
SLIDE 21

21

Example

10 10 5 5 10 10

spare working free

Single link SRLGs are considered!

slide-22
SLIDE 22

22

Calculation of the shareable spare capacity

  • Depends from the

working paths

– In which SRLGs are they involved

SRLGs

slide-23
SLIDE 23

23

Spare provision matrix

sl

j = non-sharable spare capacity

along link j, if the working path is in SRLGl

SRLG (Working edge involved)

Protection edges (all edges in the network) l. 3 1 ……….2 …..………………... 2 2 ……… 3……………….……. 1 2 .………5.……………………. 2 1 .………2……………………. 2 2 .………4……………………. 3 1 ……….2 …..………………... 2 2 ……… 3……………….……. 1 2 .………5.……………………. 2 1 .………2……………………. 2 2 .………4……………………. column

  • j. row

=

S

slide-24
SLIDE 24

24

Spare Provision Matrix

Link l

  • l. column

=

S

20 10 10 10 10

  • j. row

link j

  • To obtain the matrix we need to

keep track of the network state after each failure

  • With the single failure scenario,
  • nly one SRLG could possibly be

failed at a moment.

slide-25
SLIDE 25

25

Spare Provision Matrix

Link l

  • l. column

=

S

20 10 10

  • j. row

Link j 10 5 5

slide-26
SLIDE 26

26

Spare provision matrix

  • How much is the spare

capacity on link j?

  • How much is the non-

shareable spare capacity along link j if the working path is known?

– finding the maximum demand

  • f spare capacity among all

the SRLGs traversed by W

,

max

j j l l SRLG

v s

  • l. column

=

S

  • j. row

,

max

W j j l l W

s s

SRLG edge

slide-27
SLIDE 27

27

Shared protection

When a new demand arrives:

  • The whole capacity of working path

need to be reserved

  • In the case of the protection path:

W j j

v s  

W j j j

f v s b   

W j j

v s b  

spare vj free fj working

W j j

v s b  

W j j j

f v s b   

shareable Non-shareable

W j

s

W

W j

h

BLOCK ADMIT

slide-28
SLIDE 28

28

Routing in the case of shared protection

Input: – G=(V,E) network topology

  • Capacity along links

– free – spare

– s,t – source and destination (target) node of the connection – b – bandwidth of the demand – SRLGs – Spare provision matrix (not in dedicated protection) – Cost funtion on the edges

slide-29
SLIDE 29

29

Routing in the case of shared protection

  • The following conditions have to hold for

a solution in a network:

– a working path (containing edges W) for the connection with capacity requirement b existing so that – a protection path (containing edges P) for the connection with capacity requirement b existing so that – path W and P are SRLG disjoint.

W i i i

f v s b   

,

max

W j j l l W

s s

spare (vj = sj + hj) working free (fj)

b f W j

j 

  :

link j

slide-30
SLIDE 30

30

Routing Algorithms for Shared Protection

  • Two-step-approach:

– First step:

  • Shortest path is routed as the working path

– Second step

  • An SRLG disjoint protection route is selected to permit

sharing of the protection capacity on links of the protection route

  • For a given working path find the optimal

protection route

  • Delete the edges of an SRLG in which the working path is

involved

  • Calculate the amount of capacity on each link need to be

reserved for the protection path

– Use this value as the edge cost in the auxiliary graph

  • Find the shortest path in the auxiliary graph
slide-31
SLIDE 31

31

Two-Step Routing Approach - Pros

  • Simple, easily calculable
  • Works in a distributed

system

  • Two-step reservation

– Reserve the working path, collect the affected columns of the spare capacity matrix meanwhile – Calculate the protection path – Reserve the protection path

Amsterdam London Brussels Paris Zurich Milan Berlin Vienna Prague Munich Rome Hamburg Lyon Frankfurt Strasbourg Zagreb

slide-32
SLIDE 32

32

Two-Step Routing Approach - Cons

  • Finding a solution

is not guaranteed

– “trap topology” (we have seen at Suurballe’s algorithm)

  • Capacity efficiency

can be improved

Amsterdam London Brussels Paris Zurich Milan Berlin Vienna Prague Munich Rome Hamburg Lyon Frankfurt Strasbourg Zagreb

slide-33
SLIDE 33

33

Shared Protection One-Step Routing Approach

  • Pros

– Better capacity efficiency – One-step reservation:

  • Calculate the working and

protection path

  • Reserve the working and

protection path

  • Cons

– In a distributed environment the source need to know the spare provision matrix – More complex problem!

Amsterdam London Brussels Paris Zurich Milan Berlin Vienna Prague Munich Rome Hamburg Lyon Frankfurt Strasbourg Zagreb

slide-34
SLIDE 34

34

Shared Link Protection

  • Each link has its own

restoration strategy

  • The protection capacity
  • f the protection paths of

different links is shareable

1 2 3 4 7 5 8 9 6

failure

Link Cons

  • High capacity requirement
  • Only for single failures

Pros

  • Simple method
  • Fast recovery

RHE RTE

slide-35
SLIDE 35

35

Shared Segment Protection

Protection domain 2 Protection domain 2 Protection domain 1 a b c d e f g h i j k l

Splitting node

Switching node

  • Pros

– Efficient capacity usage – Fast recovery time

  • Cons

– Complex

slide-36
SLIDE 36

36

Failure dependent protection

After the failure

– Localize the failure – Along the disrupted connections free up the reserved capacity (stub release) – Build up new protection paths – Multiple protection path belongs to a single connection (working path)

slide-37
SLIDE 37

37

Failure Dependent Protection (FDP)

Pros

  • Optimal network resource usage

Cons

  • Complex mechanism, we need

precise failure localization

  • High signaling overhead in the

control plane after the failure

R T

slide-38
SLIDE 38

38

FDP – Two-Step Approach

  • First step:

– Shortest path is routed as the working path – No trap topology

  • Second step:

– For each SRLG the working path is involved in a protection path is calculated

Amsterdam London Brussels Paris Zurich Milan Berlin Vienna Prague Munich Rome Hamburg Lyon Frankfurt Strasbourg Zagreb

slide-39
SLIDE 39

39

FDP – Two Step Approach

  • Second step in details:

– The corresponding column of the spare provision matrix contains the non-shareable capacity

Amsterdam London Brussels Paris Zurich Milan Berlin Vienna Prague Munich Rome Hamburg Lyon Frankfurt Strasbourg Zagreb

spare vj free fj working shareable non- shareable

, j l

s

W

, j l

h

b - ( vj – sj,l )

slide-40
SLIDE 40

40

GMPLS environment

Dynamic re-routing Path pre-computation Signaling Path Selection yes Signaled with Resource Reservation Resource Selection Resource Allocation (cross-connection) yes yes yes Pre-planned re-routing without Extra-Traffic Pre-planned re-routing without Extra-Traffic Pre-planned re-routing Protection (switching) no no no no a.k.a. path re-provisioning a.k.a. soft provisioned Recovery LSP setup (including activating) Recovery LSP Activation e.g. shared M:N e.g. 1:1, 1+1 e.g. Faiure dep. e.g. re- route

slide-41
SLIDE 41

41

Recovery mechanisms - Summary

Capacity savings Recovery time Computati

  • nal

complexity Dedicated minimal even P Shared path ~25% medium NP-hard Failure dependent ~37% slow “really” NP-hard Shared segment ~34% fast “really” NP-hard

slide-42
SLIDE 42

42

Availability of shared path protection (1)

  • The probability of the simultaneous

failures of w1 and w2 is:

s1 s2 t2 t1 w1 w2

U=(1-Aw1)(1-Aw2) What is the availability of connection s1 – d1?

slide-43
SLIDE 43

43

Availability of shared path protection (2)

  • The order of failures is important

– We should know the order of failures!!!

s1 t2 t1 w1 w2

slide-44
SLIDE 44

44

Order of failures

  • The availability of the two cases are the same

– What we know about the order of the failure of the two paths?

e f c d a b MTTF1=100 MTTR1=10 MTTF2=10 MTTR2=1

  • perational
  • utage
  • perational
  • utage
slide-45
SLIDE 45

45

Dual failure case

  • Markov model

UP1 UP2

m1 l1 m

DW2 UP1

DW1 UP2 DW1 DW2

MTTR MTTF   m l 1 1

m2 l2 l1 m2 l2

DW2 DW1

m1 m1 m2

slide-46
SLIDE 46

46

References

  • Darli A. A. Mello, et. al, ‘A Matrix-Based Analytical

Approach to Connection Unavailability Estimation in Shared Backup Path Protection’

  • Dr. Chidung LAC, “Telecommunication network

reliability”

  • D. Arci, et.al, “Availability models for protection

techniques in WDM networks”

  • Kefei Wang, ‘Protection & Restoration for Optical

Ethernet’

  • Jesús F. Lobo, Gaël Hernández, Alberto Soria, “MPLS

Fast Reroute”

  • Ling Huang, „Protection and Restoration in Optical

Network”