ImageVerifierCode 换一换
格式:PDF , 页数:36 ,大小:564.18KB ,
资源ID:806279      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-806279.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ITU-T Y 1720-2006 Protection switching for MPLS networks《多协议标签交换(MPLS)网络的切换保护 15号研究组》.pdf)为本站会员(eventdump275)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ITU-T Y 1720-2006 Protection switching for MPLS networks《多协议标签交换(MPLS)网络的切换保护 15号研究组》.pdf

1、 International Telecommunication Union ITU-T Y.1720TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (12/2006) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS Internet protocol aspects Operation, administration and maintenance Protection switching fo

2、r MPLS networks ITU-T Recommendation Y.1720 ITU-T Y-SERIES RECOMMENDATIONS GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS GLOBAL INFORMATION INFRASTRUCTURE General Y.100Y.199 Services, applications and middleware Y.200Y.299 Network aspects Y.300Y.399 Interf

3、aces and protocols Y.400Y.499 Numbering, addressing and naming Y.500Y.599 Operation, administration and maintenance Y.600Y.699 Security Y.700Y.799 Performances Y.800Y.899 INTERNET PROTOCOL ASPECTS General Y.1000Y.1099 Services and applications Y.1100Y.1199 Architecture, access, network capabilities

4、and resource management Y.1200Y.1299 Transport Y.1300Y.1399 Interworking Y.1400Y.1499 Quality of service and network performance Y.1500Y.1599 Signalling Y.1600Y.1699 Operation, administration and maintenance Y.1700Y.1799 Charging Y.1800Y.1899 NEXT GENERATION NETWORKS Frameworks and functional archit

5、ecture models Y.2000Y.2099 Quality of Service and performance Y.2100Y.2199 Service aspects: Service capabilities and service architecture Y.2200Y.2249 Service aspects: Interoperability of services and networks in NGN Y.2250Y.2299 Numbering, naming and addressing Y.2300Y.2399 Network management Y.240

6、0Y.2499 Network control architectures and protocols Y.2500Y.2599 Security Y.2700Y.2799 Generalized mobility Y.2800Y.2899 For further details, please refer to the list of ITU-T Recommendations. ITU-T Rec. Y.1720 (12/2006) i ITU-T Recommendation Y.1720 Protection switching for MPLS networks Summary IT

7、U-T Recommendation Y.1720 provides requirements and mechanisms for 1+1, 1:1, shared mesh, and packet 1+1 protection switching functionality for the user-plane in MPLS layer networks. The mechanism defined herein is designed to support end-to-end point-to-point LSPs. Protection switching functionalit

8、y for multipoint-to-point and point-to-multipoint LSP are for further study. m:n protection switching is for further study. Hitless protection switching is outside the scope of this version of the Recommendation. Source ITU-T Recommendation Y.1720 was approved on 14 December 2006 by ITU-T Study Grou

9、p 15 (2005-2008) under the ITU-T Recommendation A.8 procedure. Keywords LSP, MPLS, PML, protection switching, PSL, re-routing. ii ITU-T Rec. Y.1720 (12/2006) FOREWORD The International Telecommunication Union (ITU) is the United Nations specialized agency in the field of telecommunications. The ITU

10、Telecommunication Standardization Sector (ITU-T) is a permanent organ of ITU. ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with a view to standardizing telecommunications on a worldwide basis. The World Telecommunication Standardizat

11、ion Assembly (WTSA), which meets every four years, establishes the topics for study by the ITU-T study groups which, in turn, produce Recommendations on these topics. The approval of ITU-T Recommendations is covered by the procedure laid down in WTSA Resolution 1. In some areas of information techno

12、logy which fall within ITU-Ts purview, the necessary standards are prepared on a collaborative basis with ISO and IEC. NOTE In this Recommendation, the expression “Administration“ is used for conciseness to indicate both a telecommunication administration and a recognized operating agency. Complianc

13、e with this Recommendation is voluntary. However, the Recommendation may contain certain mandatory provisions (to ensure e.g. interoperability or applicability) and compliance with the Recommendation is achieved when all of these mandatory provisions are met. The words “shall“ or some other obligato

14、ry language such as “must“ and the negative equivalents are used to express requirements. The use of such words does not suggest that compliance with the Recommendation is required of any party. INTELLECTUAL PROPERTY RIGHTS ITU draws attention to the possibility that the practice or implementation o

15、f this Recommendation may involve the use of a claimed Intellectual Property Right. ITU takes no position concerning the evidence, validity or applicability of claimed Intellectual Property Rights, whether asserted by ITU members or others outside of the Recommendation development process. As of the

16、 date of approval of this Recommendation, ITU had received notice of intellectual property, protected by patents, which may be required to implement this Recommendation. However, implementers are cautioned that this may not represent the latest information and are therefore strongly urged to consult

17、 the TSB patent database at http:/www.itu.int/ITU-T/ipr/. ITU 2007 All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written permission of ITU. ITU-T Rec. Y.1720 (12/2006) iii CONTENTS Page 1 Scope 1 2 References. 1 3 Definitions 2 3.1 Def

18、initions defined elsewhere 2 3.2 Terms defined in this Recommendation. 3 4 Abbreviations and acronyms 3 5 Requirements 4 6 Principles 5 7 Mechanisms 6 7.1 Unidirectional protection switching . 6 7.2 Mechanisms of bidirectional protection switching. 15 8 Security aspects 15 Appendix I Example of prot

19、ection capacity sharing for shared mesh protection switching. 16 Appendix II Packet 1+1 example realization 18 II.1 Dual-feed and select mechanism 19 II.2 Analysis of the packet 1+1 scheme 19 Bibliography. 27 ITU-T Rec. Y.1720 (12/2006) 1 ITU-T Recommendation Y.1720 Protection switching for MPLS net

20、works 1 Scope This Recommendation provides requirements and mechanisms for 1+1, 1:1, shared mesh, and packet 1+1 protection switching functionality for the user-plane in MPLS networks. The mechanism defined herein is designed to support end-to-end point-to-point LSPs. Protection switching functional

21、ity for multipoint-to-point and point-to-multipoint LSP are for further study. m:n protection switching is for further study. Hitless protection switching is outside the scope of this version of the Recommendation. 2 References The following ITU-T Recommendations and other references contain provisi

22、ons which, through reference in this text, constitute provisions of this Recommendation. At the time of publication, the editions indicated were valid. All Recommendations and other references are subject to revision; users of this Recommendation are therefore encouraged to investigate the possibili

23、ty of applying the most recent edition of the Recommendations and other references listed below. A list of the currently valid ITU-T Recommendations is regularly published. The reference to a document within this Recommendation does not give it, as a stand-alone document, the status of a Recommendat

24、ion. ITU-T G.805 ITU-T Recommendation G.805 (2000), Generic functional architecture of transport networks. NOTE There is a limitation of the applicability of the architecture specified by ITU-T G.805. It is not applicable to LDP based multipoint-to-point LSP and the case where PHP is in effect with

25、the egress not supporting MPLS data plane. ITU-T G.841 ITU-T Recommendation G.841 (1998), Types and characteristics of SDH network protection architectures. ITU-T I.630 ITU-T Recommendation I.630 (1999), ATM protection switching. ITU-T M.20 ITU-T Recommendation M.20 (1992), Maintenance philosophy fo

26、r telecommunication networks. ITU-T M.495 ITU-T Recommendation M.495 (1988), Transmission restoration and transmission route diversity: Terminology and general principles. ITU-T Y.1710 ITU-T Recommendation Y.1710 (2002), Requirements for Operation 2) SF is declared on the connected LSP (i.e., workin

27、g LSP or protection LSP) and is not declared on the other LSP and the hold-off timer has expired; or 3) the wait to restore timer expires (revertive mode) and SF is not declared on the working LSP. 7.1.2.1 Manual control Manual control of the protection switching function may be transferred from the

28、 operation system. 7.1.2.2 Signal fail declaration conditions 7.1.2.2.1 1+1 architecture For 1+1 architecture, signal fail (SF) is declared when the sink point of the protection domain enters the LSP Trail sink Near-End Defect State by entering the dServer, dLOCV, dTTSI_Mismatch, dTTSI_Mismerge, dEx

29、cess, or dUnknown condition. In order to achieve fast protection (the requirement for fast protection is under study), SF can be declared when an FDI packet is received by the sink of the protection domain before it enters other defect conditions (e.g., dLOCV). It allows fast protection against the

30、defects sourced from layers below the MPLS layer (and this requires that the incoming FDI have the DT codepoint 0x0101). In addition, the FDD function can be used to achieve a faster declaration of the signal fail condition. NOTE It is only to be used if the lower layer is not protected. If the lowe

31、r layer is also protected, it may lead to unnecessary protection switching by declaring SF on reception of FDI packets. In the case where the CV or FFD function is not activated, SF is declared when an FDI packet is received by the sink of the protection domain. It only applies to the defects source

32、d from layers below the MPLS layer (and this requires that the incoming FDI have the DT codepoint 0x0101). 7.1.2.2.2 1:1 architecture For 1:1 architecture, signal fail (SF) is declared when: the source of the protection domain enters the Trail sink Far-End Defect State by receiving a BDI packet (fro

33、m the return LSP or out of band). ITU-T Rec. Y.1720 (12/2006) 13 7.1.2.2.3 Shared mesh architecture Shared mesh architecture is an extension of 1:1 architecture. Signal fail (SF) is declared as in 1:1 architecture. NOTE Protection against a bidirectional LSP defect is for further study. 7.1.3 Compli

34、ance with network objectives The following network objectives apply: 1) Operating modes Revertive and non-revertive switching are provided. 2) Manual control Operator control via lockout of protection, forced switch and manual switch commands are supported. 3) Other switch initiation criteria Signal

35、 fail, wait to restore, and no request are supported in addition to the manual control commands listed above, as criteria for initiating (or preventing) a protection switch. 7.1.4 Switch initiation criteria The following switch initiation criteria exist: 1) an externally initiated command (clear, lo

36、ckout of protection, forced switch, manual switch); 2) an automatically initiated command (signal fail) associated with a protection domain; or 3) a state (wait to restore, no request) of the protection switching function. All requests are local (i.e., protection sink for 1+1 architecture and protec

37、tion source for 1:1 architecture). The priority of local requests is given in Table 1. Table 1 Priority of local requests Local request (i.e., automatically initiated command,state, or externally initiated command) Order of priority Clear Highest Lockout of protection | Forced switch | Signal fail |

38、 Manual switch | Wait to restore | No request Lowest NOTE 1 A forced switch for the working LSP should not be overridden by a signal fail on the protection LSP. Since unidirectional protection switching is being performed, and no APS protocol is supported over the protection LSP, signal fail on the

39、protection LSP does not interfere with the ability to perform a forced switch for the working LSP. NOTE 2 A forced switch for the protection LSP is not defined because this function may be achieved via a lockout of the protection command. 14 ITU-T Rec. Y.1720 (12/2006) 7.1.4.1 Externally initiated c

40、ommands Externally initiated commands are listed below in descending order of priority. The functionality of each is described below. clear: This command clears all of the externally initiated switch commands listed below. lockout of protection (LoP): Fix the selector position on the working LSP. Pr

41、events the selector from switching to the protection LSP when it is selecting the working LSP. Switches the selector from the protection to the working LSP when it is selecting the protection LSP. forced switch (FS) for working LSP: Switches the selector from the working LSP to the protection LSP (u

42、nless a higher priority switch request (i.e., LoP) is in effect). manual switch (MS) for working LSP: Switches the selector from the working LSP to the protection LSP (unless an equal or higher priority switch request (i.e., LoP, FS, SF or MS) is in effect). manual switch (MS) for protection LSP: Sw

43、itches the selector from the protection LSP to the working LSP (unless an equal or higher priority switch request (i.e., LoP, FS, SF or MS) is in effect). 7.1.4.2 FDI triggered protection switch In the case of FDI triggered protection switching, if the LSP with SF never enters a near end defect stat

44、e, there may be a need to prevent frequent transitions. If so, some time may be defined that must pass before taking another protection switching action. This is for further study. 7.1.4.3 States Wait to restore is only applicable for the revertive mode and applies to a working LSP. This state is en

45、tered by the local protection switching function in conditions where working traffic is being received via the protection LSP when the working LSP is restored, if local protection switching requests have been previously active and now become inactive. It prevents reversion back to select the working

46、 LSP until the wait to restore timer has expired. The wait to restore time may be configured by the operator in 1 minute steps between 1 and 30 minutes; the default value is 12 minutes. No request is the state entered by the local protection switching function under all conditions where no local pro

47、tection switching requests (including wait to restore) are active. 7.1.5 Protection switching protocol In the unidirectional 1+1, 1:1 and shared mesh protection switching architecture, there is no need for APS protocol. 7.1.6 Unidirectional protection switching algorithm operation 7.1.6.1 Control of

48、 the selector In the 1+1, 1:1 and shared mesh architecture in the unidirectional protection switching operation, the selector is controlled by the highest priority local (i.e., sink of the protection domain for 1+1 architecture; source of the protection domain for 1:1 architecture) request (automati

49、cally initiated command, state, or externally initiated command). Therefore, each end operates independently of the other. If a condition of equal priority (e.g., SF) exists on both LSPs, switching shall not be performed. In packet 1+1, the packets are selected based on a packet level selector which uses identifiers (sequence numbers) carried within transmitted packets. ITU-T Rec. Y.1720 (12/2006) 15 7.1.6.2 Revertive mode In revertive mode of operation, under conditions where working traffic is being transmitted via the protectio

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1