Lightpaths WAVELENGTH ROUTING NETWORKS

PROTECTION SCHEMES 211 Working fiber Protection fiber A B Figure 9.5 An optical unidirectional path sharing ring OUPSR. static rings to advanced dynamic rings. Below, we examine the protection scheme of three WDM rings: the optical unidirectional path sharing ring OUPSR, the two-fiber optical bidirectional link sharing ring 2F-OBLSR , and the four-fiber optical bidirectional link sharing ring 4F-OBLSR . OUPSR is unidirectional. It consists of a working and a protection ring transmitting in opposite directions see Figure 9.5. The 1 + 1 protection scheme is used to implement a simple path protection scheme. That is, a lightpath is split at the source node and is transmitted over the working and protection rings see Figure 9.5 from A to B. The destination selects the best signal. When a fiber link is broken, the receiver continues to receive the signal along the other path. The OUPSR provides a simple and robust architecture without complex protection signaling protocols. This type of ring is typically used as a metro edge ring, and it connects a small number of nodes e.g. access networks and customer sites to a hub node, which is attached to a metro core ring. The traffic transmitted on the ring is static and it exhibits hub behavior. That is, it is directed from the nodes to the hub and from the hub to the nodes. Static lightpaths are used. The two-fiber and four-fiber optical bidirectional link shared rings are used in the metro core where the traffic patterns dynamically change. A signaling protocol is used to establish and tear down lightpaths, and protection schemes are implemented using a real- time distributed protection signaling protocol known as the optical automatic protection switching optical APS . The two-fiber optical bidirectional link shared ring 2F-0BLSR uses two rings, trans- mitting in opposite directions as in OUPSR. Each fiber is partitioned into two sets of wavelengths; one set of working wavelengths and one set of protection wavelengths. If a fiber fails, the traffic will be rerouted onto the protection wavelengths of the other fiber. The four-fiber optical bidirectional link shared ring 4F-OBLSR uses two working fibers and two protection fibers see Figure 9.6. Protection can be done at both the fiber level or at the lightpath level. Fiber protection switching is used to restore a network failure caused by a fiber cut or a failure of an optical amplifier. Lightpath protection switching is used to restore a lightpath that failed due to a transmitter or receiver failure. Let us consider a lightpath from user A to user B see the solid line in Figure 9.6. This lightpath is routed through nodes 1, 2, and 3. Assume that the lightpath fails on the link between nodes 2 and 3. In this case, the protection mechanism will switch the lightpath over to the protection fiber from nodes 2 to 3 see the dotted line labeled “span switching” in Figure 9.6. If the working fiber from nodes 2 to 3 fails as well, then all of the lightpaths will be switched onto its protection fiber from nodes 2 to 3, as in the 212 WAVELENGTH ROUTING OPTICAL NETWORKS Working fibers Protection fibers Node 1 Node 2 Node 3 Node 4 A B Span switching Ring switching Figure 9.6 A four-fiber optical bidirectional link sharing ring 4F-OBLSR. case of the lightpath above. This is known as span switching. When all four fibers are cut between nodes 2 and 3, then the traffic will be diverted to the working fibers in the opposite direction. This is known as ring switching. In this case, the lightpath from A to B will be diverted; that is, it will be routed back to node 1, and then to nodes 4 and 3. See the dotted line labeled “ring switching” in Figure 9.6.

9.2.3 Mesh Optical Networks

A mesh network can employ both path and link protection. Link protection can be implemented using the point-to-point 1 + 1, 1:1, and 1:N schemes see Section 9.2.1. Path protection uses dedicated or shared back-up paths. Alternatively, an arbitrary mesh topology can be organized into a set of WDM optical rings, which permits ring-based protection schemes. The 1 + 1 path protection scheme is the simplest form of protection. It is also the most expensive and bandwidth-inefficient. The user signal is split into two copies, and each copy is transmitted simultaneously over two separate lightpaths. The lightpaths might be diversely routed i.e. they follow different geographical paths or they might go through the same OXCs but use different fibers. The receiver monitors the quality of the two signals and selects the best of the two. If one lightpath fails, then the receiver continues to receive data on the other lightpath. In the case of the 1:1 path protection, the user signal is carried over a working lightpath. The back-up protection lightpath has also been established, but it is not used. If the work- ing lightpath fails, the source and destination switches to the protection lightpath. Since the bandwidth allocated to the protection lightpath is not utilized during normal operation, it can be shared by multiple working lightpaths. This is the 1:N path protection scheme. An important concept in these protection schemes is the concept of the shared risk link group SRLG . An SRLG is a group of links that share the same physical resources, such as a cable, a conduit, and an OXC. Failure of these physical resources will cause failure of all of the links. Each common physical resource is associated with an identifier called the SRLG. When setting up a working and a protection lightpath, care is taken so that the two lightpaths are not routed through the same SRLG. For example, let us consider the optical network shown in Figure 9.7. The working lightpath from OXC 1 to OXC 2 THE ITU-T G.709 STANDARD – THE DIGITAL WRAPPER 213 1 2 3 6 7 8 11 12 13 4 5 9 10 OXC 1 OXC 2 Figure 9.7 Path protection. that uses links {1, 6, 11} and its protection lightpath that uses links {3, 8, 13} do not use the same SRLG. That is, they are SRLG-disjoint. The concept of SRLG can also be used in the 1:N shared protection scheme. For instance, in Figure 9.7, the two working lightpaths {1, 6, 11} and {2, 7, 12} from OXC 1 to OXC 2 are SRLG-disjoint. Therefore, it makes sense that they both use the same SRLG-disjoint protection lightpath {3, 8, 13}. This is because a single failure of a physical resource along the path of either working lightpaths excluding the originating and termi- nating OXCs will not cause both working lightpaths to fail at the same time. That is, in this case, the protection lightpath will only be used by one of the two working lightpaths. In protection schemes, the backup protections routes are pre-planned and the neces- sary resources e.g. wavelengths, fibers, and bandwidth within an OXC are allocated in advance. During the normal operation of the network, these resources are either kept idle, or they are used to transmit low priority traffic which can be preempted any time a failure occurs. This guarantees a fast recovery from a failure at the expense of inefficient resource utilization. An alternative strategy, known as dynamic restoration, is to calculate a protection path and allocate resources for recovery at the moment when a network fail- ure occurs. This approach has a more efficient resource utilization but the recovery time is longer than in the case of a protection scheme. Dynamic restoration is a promising new approach that is being further studied.

9.3 THE ITU-T G.709 STANDARD – THE DIGITAL WRAPPER

Information on a lightpath is typically transmitted using SONETSDH framing. Also, Ethernet frames can be transmitted over an optical network. In the future, it is expected that information will be transmitted over the optical network using the new ITU-T G.709 standard, otherwise known as the digital wrapper. This standard defines the network node interfaces between two optical network operators, or between subnetworks of vendors within the same network of an operator. The following are some of the features of the G.709 standard: • Types of traffic : The standard permits the transmission of different types of traffic, such as IP packets and gigabit Ethernet frames using the generic framing procedure GFP, ATM cells, and SONETSDH synchronous data. • Bit-rate granularity : G.709 provides for three bit-rate granularities: 2.488 Gbps, 9.95 Gbps, and 39.81 Gbps. This granularity is coarser than that of SONETSDH, but is appropriate for terabit networks, since it avoids the large number of low bit-rate paths that would have to be used with SONETSDH.