atm-architech

Upload: agasa2010

Post on 09-Apr-2018

220 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/8/2019 ATM-Architech

    1/7

    ATM-NETWORK MANAGEMENTARCHITECTURES

    TRAN CONG HUNG , M.ScDeputy Head of Faculty of Information Technology II

    Post & Telecommunication Institute of Technology of Viet NamEmail : [email protected]

    Abstract The most important of Network Management

    Architectures in ATM can brief definition of each element ofOperations, Administration, Maintenance, and Provisioning

    (OAM&P)

    OAM&P PHILOSOPHYA brief definition of each element of Operations,Administration, Maintenance, and Provisioning (OAM&P)

    and how they interrelate is described below and depicted inthe flow diagram of Figure 1

    Figure 1 OAM&P Process Flow

    Operations involves the day to day, and often minute to minute, care and feeding of the data network in

    order to ensure that it is fulfilling its designed purpose.

    Administration involves the set of activities involved

    with designing the network, processing orders, assigning

    addresses, tracking usage, and accounting.

    Maintenance involves the inevitable circumstances that

    arise when everything does not work as planned, or it is

    necessary to diagnose what went wrong and repair it.

    Provisioning involves installing equipment, settingparameters, verifying that the service is operational, and

    also deinstallation.

    SNMP Based Network Management Systems(NMS)

    The Simple Network Management Protocol (SNMP) defined

    in IETF standards has five messages types : GET REQUEST

    (or simple GET), GET NEXT REQUEST (or simply GETNEXT), SET REQUEST (or simply SET), RESPONSE, and

    TRAP (which is like an alarm). The SET, GET, and GETNEXT messages are all replied to by the RESPONSE

    message. The TRAP message is very important since it is the

    notification of an unexpected event, such as a failure or asystem restart. SNMP normally operates over the User

    Datagram Protocol (UDP), which then usually operates over

    IP in the Internet Protocol (IP) stack, but may operate over

    some other protocol.SNMP utilizes a subset of Abstract Syntax Notation 1

    (ASN.1) to define a Management Information Base (MIB) asa data structure that can be referenced in SNMP messages.

    The MIB defines objects in terms of primitives such as

    strings, integers, and bit maps, and allows a simple form of

    indexing. Each object has a name, a syntax, and an encoding.

    The ATM Forum ILMI design provides essential interfacemanagement functions to early users of ATM until these

    functions are standardized in ATM OAM cells. Figure 2

    illustrates the configuration in which the ILMI operates. Each

    ATM End System (ES), and every network that implements aPrivate Network UNI or Public Network UNI, has a UNI

    Management Entity (UME) which is responsible formaintaining the information and responding to SNMP

    commands received over the ATM UNI. The information in

    the ILMI MIB can be actually contained on a separate private

    or public Network Management System (NMS) or may beaccessed over another physical interface. NMSs may also be

    connected to networks or end systems by other network

    management interfaces. The Customer Network Management

    User OAM&P Functions Network

    Administration

    Provisioning

    Operations

    Maintenance

    Order

    Charge

    Schedule Report

    Install

    Verify

    QueryTurn Up

    Inquire

    Respond

    Monitor

    Control

    Dispatch Coordinate

    Diagnose

    Repair

  • 8/8/2019 ATM-Architech

    2/7

    (CNM) capability is important for carrier based services.This should include at least physical port status, VPC/VCC

    status, order parameters, and selected performance metrics.

    Delivery of detailed performance counts will involve

    additional complexity and cost.

    OAM FLOW REFERENCE ARCHITECTURE

    Currently OAM flows are only defined for point to point connections. A fundamental part of theinfrastructure for network management is that of

    Operations, Administration, and Maintenance (OAM)information. Figure 3 shows the reference architecturethat describes how ATM OAM flows relate toSONET/SDH management flows . The F1 flows are forthe regenerator section level (called the Section level inSONET), F2 flows are for the digital section level(called the Line level in SONET), and F3 flows are forthe transmission path (call the Path level in SONET).ATM adds F4 flows for Virtual Paths (VPs) and F5flows for Virtual Channels. (VCs), where multiple VCsare completely contained within a

    single VP. Each flow can be either connected ofterminated at an endpoint. Each of the F4/F5 flows maybe either end to end or segment oriented. End to end flows are received only by the device thatterminates the ATM connection. Only network nodesreceive segment OAM flows. Indeed, network nodes

    must remove segment flows before they ever reachdevices that terminate an ATM (VP or VC) connection.OAM flows maybe either segment or end to end. Anend to end flow is from one endpoint at the samelevel to the other endpoint. A segment flow is from oneconnection point to another connection point.

    PrivateNMS

    Agent

    PublicNMS

    Agent

    Other Network Management

    Interfaces

    ATM End

    System

    Agent

    UME

    Private ATM

    Network

    Agent

    UME UME

    Private

    ATM

    UNI

    ILMI

    (SNMP/AAL)

    Public ATM

    Network

    Agent

    UME UME

    ATM End

    System

    Agent

    UME

    PublicATM

    UNI

    ILMI

    (SNMP/AAL)

    PublicATM

    UNI

    ILMI

    (SNMP/AAL)

    Figure 2 ATM Forum ILMI Configuration

  • 8/8/2019 ATM-Architech

    3/7

    OAM CELL FORMATS

    Figure 4 shows the ATM OAM cell format : There are VirtualPath (VP) flows (F4) and Virtual Channel (VC) flows (F5)

    between connection endpoints that are defined as end to end OAM flows. There are also F4 and F5 OAM flows that

    occur across one or more interconnected VC or VP links that

    are called segment OAM Flows. VP flows (F4) utilize

    different VCI to identify whether the flow in either end toend (VCI = 3) or segment (VCI = 4). Recall that the first 16

    VCIs are reserved for future tandardization. For a VC flow(F5), a specific VCI cannot be used because all VCIs are

    available to users in the service. Therefore, the Payload Type

    (PT) differentiates between the end to end (PT=100) and

    Segment (PT=101) flows in a VCC.

    Table 1 summarizes the OAM type and function type fields in

    the OAM cells from Figure 4. The three OAM types are faultmanagement, performance management, and activation /deactivation. Each OAM type has further function types with

    codepoints as identified in Table 1. For the fault management

    OAM type there are Alarm Indication Signal (AIS), Remote

    Defect Indication (RDI) (also called Far End ReportingFailure (FERF), and continuity check function types. For the

    performance management OAM type there are forwardmonitoring and backward reporting types, or a third type that

    is a combination of these two, called monitoring and

    reporting. The third OAM type defines activation and

    deactivation of the other OAM types. Currently, there are

    activation and deactivation function types for performance

    management and the continuity check.

    Virtual Channel Connection (VCC)

    VC Link VC Link

    VP Link VP Link

    Transmission Path

    Digital Section (Line)

    Regenerator Section

    ATMLayer

    Physical

    Layer

    F5

    F4

    F3

    F2

    F1

    Virtual Path Connection VPC

    Figure 3 : ATM Management Plane Reference Architecture

    G C

    F VPI VCI PT L HEC OAM Function Function specific Reserved CRC-10

    C P Type Type Fields

    5 bytes 4 bits 4 bits 45 bytes 6 bits 10 bits

    Same as

    User Cell

    VCI=3 (Segment)

    VCI=4 (End to end)

    F4 (VPC) OAM Cell Format

    G C

    F VPI VCI PT L HEC OAM Function Function speci fic Reserved CRC-10

    C P Type Type Fields

    5 bytes 4 bits 4 bits 45 bytes 6 bits 10 bits

    Same as

    User Cell

    PT=100 (Segment)

    PT=101 (End to end)

    F5 (VCC) OAM Cell Format

    Figure 4 : ATM OAM Cell Types and Format

  • 8/8/2019 ATM-Architech

    4/7

    OAM Type Function Type0001 AIS 0000

    0001 RDI/FERF 0001

    0001 Continuity Check 0100

    Fault Management

    0001 Loopback 1000Performance management 0010 Forward Monitoring 0000

    0010 Backward Reporting 0001

    0010 Monitoring& Reporting 0010

    1000 Performance Monitoring 0000Activation/Deactivation

    1000 Continuity Check 0001

    Table 1: OAM Types & OAM Function Types

    Note that there are a significant number of unassignedcodepoints in the OAM and function types. The definition of

    OAM cellformats, functions, and protocols is ongoing andevolving in standards and specification development . For this

    reason , the ATM Forum UNI specification recommends that

    these OAM functions be implemented in software.

    FAULT MANAGEMENT

    + AIS and RDI/FERF Theory and OperationFigure 5 illustrates the ATM OAM cell AIS and RDI/FERF function

    specific fields. The meaning of each field is described below.

    Failure Type is an indication of what type offailure has occurred. Currently no specificvalues are standardized.

    Failure Location is an indication of where thefailure occurred. Currently no specific values

    are standardized.Failure Type * Failure Location* Unus ed

    1 byte 9 byte s 35 bytes

    * Default Coding = 6A Hex for all octetsFigure 5 : Funct ion Specific Fields for AIS and RDI/FERF

    Figure 6 illustrates the operation and theory of the Alarm

    indication Signal (AIS) and Far End Reporting Failure(FERF) {for equivalently Remote Defect Indication (RDI)}

    ATM OAM cell function types. We cover two examples, (a)

    where a failure occurs in both directions simultaneously, and

    (b) where a failure occurs in only one direction. In bothexamples there is a VP (or VC) connection between node 1

    and node 4.Part (a) illustrates the typical failure of both directions of the

    physical layer between nodes 2 and 3 that causes the

    underlying VPs and VCs to simultaneously fail. The failures

    in each direction are indicated as Failure A and Failure B in the figure so that the resulting AIS and RDI/FERF cells

    can be traced to the failure location. A node adjacent to thefailure generates an AIS signal in the downstream direction to

    indicate that an upstream failure has occurred, as indicated in

    the figure. As can be seen from example (a), both ends of theconnection (nodes 1 and 4) are aware of the failure because of

    AIS alarm that they receive. However, by convention, each

    generates a RDI/FERF signal.

    Example (b) illustrates the purpose of the FERF (or RDI)signal. In most communications applications the connection

    should be considered failed, even if it fails in only one

    direction. This is especially true in data communication.

    Example (b) illustrates the case of a failure that affects only

    one direction of a full duplex connection between nodes 2 and3. Node 3, which is downstream from the failure, generates anAIS alarm, which propagates to the connection end (node 4),

    which in turn generates the RDI/FERF signal. The RDI/FERF

    signal propagates to the other connection end (node 1), which

    is now aware that the connection has failed. Without theRDI/FERF signal, node 1 would not be aware that there was a

    failure in the connection between nodes 2 and 3. This methodwill also detect any combination of single direction failures.

    Note that the node(s) that generate the AIS signals know

    exactly where the failure is, and could report this to a

    centralized network management system, or take a distributedrerouting response.

    a) Failure in Both Directions

    b)Failure in One Direction

    Figure 6: Illustration of AIS and RDI/FERF theory and Operation

    + Loopback Operation and Diagnostic UsageFigure 7 illustrates the ATM OAM cell Loopback function-

    specific fields.

    A summary of the ATM OAM cell Loopback function-specific fields is:

    Loopback Indication is a field that contains 01when originated, and is decremented by the receiver. It should

    be extracted by the sender when it is received with a value of

    00. This prevents the cell fromlooping around the networkindefinitely.

    Correlation Tag is a field defined for use by theOAM cell originator since there may be multiple OAM cells

    in transit on a particular VPC/VCC, and this allows the sender

    to identify which one of these has been received.

    1 432

    Upstream from ADownstream from A

    RDI/FERF-B AIS-A

    Failure A

    Failure B

    FERF-AAIS-BDownstream from B

    Upstream from B

    Downstream from A

    1 432

    Upstream from A

    AIS-A

    Failure A

    RDI-FERF-A

  • 8/8/2019 ATM-Architech

    5/7

    Loopback Location ID is a field provided to thesender and receiver for use in segment loopbacks to identify

    where the loopback should occur. The default value of all 1sindicates that the loopback should occur at the end point.

    Source ID is a field provided so that theloopbacksource can be identified in the cell. This can be used by nodes

    to extract OAM cells that they have inserted for extractionafter they have loopback to the source.

    Loopback

    Indication

    Correlation

    Ta g

    Loopback

    Location ID

    Source

    ID

    Unused

    1 byte 9 bytes 12 bytes 12 bytes 16 bytes

    Figure 7 ATM OAM Loopback Function- Specif ic Fields.

    As seen in the preceding section, AIS and RDI/FERF are

    most useful in detecting and identifying to the connection

    endpoints that a failure has occurred.

    Figure 8 illustrates how these loopback primitives can beused to diagnose a failure that would not be detected by AIS

    and RDI/FERF at any node. An example of such a failurewould be a misconfigured VP or VC cross-connect. The

    example shows two endpoints and two intervening networks,

    each with three nodes. Part (a) shows the verification of end

    to-end continuity via an end-to-end loopback to endpoint 1. Ifthis were to fail, then network 2 could diagnose the problem

    as follows. Part (b) shows verification of connectivitybetween a node in network 2 to endpoint 2 via an end-to-end

    loopback. If this fails, then the problem is between network 2

    and endpoint 2. Part (c) shows verification of connectivity to

    endpoint 1 via an end-to-end loopback. If this fails, there is aproblem in the link between endpoint 1 and network 1 , a

    problem in network 1 , or a problem in the link betweennetwork 1 and 2. Par (d) shows verification of connectivity

    across networks 1 and 2 via a segment loopback. If this

    succeeds, then the problem is the access line from endpoint1

    to network 1. Part (e) shows verification of connectivity fromentry to exit in network 1. If this succeeds, then the problem

    is in network 1. Verification within any of the networks couldalso be done using the segment loopback.

    + Continuity Check

    The continuity check can detect failures that AIS cannot,such as an erroneous VP aross-connect change, as illustrated

    in Figure 9 .Part (a) shows an VP connection traversing three

    VP cross-connect nodes with VPI mappings shown in thefigure carrying only Continuity Check (CC) cell traffic. In

    part (b) an erroneous cross-connect is made at node 2,

    interrupting the flow of CC cells. In part (c) node 3 detects

    this continuity failure and generates a VP-RDI/FERF OAMcell in the opposite (upstream) direction.

    a) Intial Virtual Path Connection

    b) Erroneous Change

    c) Fault Notification

    Figure 9: Illustration of Continuity Check (CC) OAM Cell Usage

    + RESTORATIONThe standard currently do not specify what can be done in

    respnse to a fault at the ATM layer. There are SONET andSDH standards, however, that define physical layer protection

    switching on a point-to-point, 1:N redundant basis or a ring

    configuration. There are also restoration stagtefies for partialmesh networks. These same concepts could also be applied to

    restore ATM connections. Resoring Virtual Paths (VPs) that

    carry a large number of Virtual Channels (VCs) would be anefficient way to perform ATM-level restoration. We briefly

    discuss these three restoration methods with reference toFigure 10.

    The term 1:N (read as one for N) redundancy means that

    there is one bidirectional protection channel for up to N

    working bidirectional channels, as illustrated in Figure 10 (a).If a working channel fails, its endpoints are switched to the

    protection channel. If a failure occurs and the protectionchannel is already in use or unavailable, then the failed

    working channel cannot be restored.

    Unused

    0000000

    0/1

    7 bit 1 bit

    EndPoint

    1

    EndPoint

    2

    Node

    1

    Node

    3

    Node

    2

    End

    Point

    1

    End

    Point

    2

    Node1

    Node

    3

    Node

    2

    End

    Point

    1

    End

    Point

    2

    Node1

    Node

    3

    Node

    2

    VP=1 VPI=17 VPI=31 VPI=1

    VP=1 VPI=17 VPI=13 VPI=1

    VP=1 VPI=17 VPI=13 VPI=1

    CC

    CC

    CC

    End Point 1 Network 1 Network 2 End Point 2

    a.

    b.

    c.

    d.e.

    Figure 8 : Usage of Loopback in Verif ication/Problem Diagnostic

  • 8/8/2019 ATM-Architech

    6/7

    Figure 10 (b) illustrates a bidirectional ring. Traffic from node1 to node 3 is sent in both directions around the ring. At each

    node signals may be added as shown by the plus sign inside

    the circle, or dropped as shown by the minus sign inside the

    circle. At the receiver (node3) only one of the signals is

    selected for output. Upon detection of a failure the receiverwill switch to the other, redundant signal, as shown in theexample for a failure between nodes 2 and 3.

    a)Point to Point

    b)Bi-directional Ring

    c) Parital mesh

    Figure 10 (C) illustrates a partial mesh network. In the

    example, traffic between nodes 3 and 4 initially follows theroute shown by the solid line. A failure between nodes 1 and

    2 impacts the node 3 to 4 traffic on its current route. This can

    be detected in a centralized, distributed, or hybrid network

    management system to find a new route shown by he dashedline in the example. Longer distance networks tend to have

    the type of lattice structure shown in the example and tend touse this type of restoration . In the example of Figure 10(c),

    1:2 redundancy is provided for some routes.

    The mirror image of this capability is in place for traffic betweennodes 3 and 1. Note that the ring architecture achieves 1:1redundancy, or in other words, only half of the transmissionbandwidth is available to traffic. These types of ring architectures are

    economically attractive for metropolitan areas and can be furtheroptimized for ATM using Virtual Path level Add Drop Multiplexing

    (ADM) to improve multiplexing efficiency

    REFERENCES[1] David E. MC DySan and Darren L. Spohn , "ATM theory andApplication", McGraw-Hill series on Computer Communication,International Editions 1995, Printed in Taiwan.[2] Othmar Kyas, "ATM Networks", International Thomson Computer Press,

    ITP An International,Thomson Publishing, First printed 1995, Reprinted1995,Printed in the UK by the Alden Press, Oxford.[3] Document on Internet :

    http://www.tmo.hp.com/tmo/pia/VXIbus/PIAProd/datasheets/English/HPQ0SS1.html

    + Test & Measurement , Product Information HEWLETT PACKARD[4]Dr.Kon MIYAKE, Standardization ^ Technology on B-ISDN & ATM

    Network, Nippon Telegraph and Telephone Corporation(NTT), Technical

    Seminar on ITU-T Standardization(Tss-96) Nov,1996.

    FailureWorking

    Protection

    Working

    1

    N

    1

    N

    N+1

    Failure

    1 2 3

    45

    6

    Restored

    RouteInitial Route

    1

    2

    3Initial Route

    Restored Route

    Figure 10 : Basic Restoration Method Examples

  • 8/8/2019 ATM-Architech

    7/7