0% found this document useful (0 votes)
75 views

Ring Protection

Ethernet Ring Protection (ERP) provides highly reliable, loop-free protection for Ethernet ring topologies. ERP uses two links between nodes to form a ring. During normal operation, the Ring Protection Link (RPL) owner blocks one of the links to prevent loops. If a link fails, the RPL owner unblocks the RPL to maintain connectivity until the failed link is repaired. ERP coordinates protection using Ring Automatic Protection Switching (R-APS) messages to signal node states and failures in less than 50 milliseconds.

Uploaded by

ionutccie
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
75 views

Ring Protection

Ethernet Ring Protection (ERP) provides highly reliable, loop-free protection for Ethernet ring topologies. ERP uses two links between nodes to form a ring. During normal operation, the Ring Protection Link (RPL) owner blocks one of the links to prevent loops. If a link fails, the RPL owner unblocks the RPL to maintain connectivity until the failed link is repaired. ERP coordinates protection using Ring Automatic Protection Switching (R-APS) messages to signal node states and failures in less than 50 milliseconds.

Uploaded by

ionutccie
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

Ethernet Ring Protection Ethernet Ring Protection

I
N
T
E
R
N
A
L

U
S
E

O
N
L
Y
Ethernet Ring Protection
2
ERP
Defined in the International Telecommunication Union Telecommunication
Standardization (ITU-T) G.8032 recommendation, ERP provides highly reliable, stable,
and loop-free protection for Ethernet ring topologies. ERP is a solution for an Ethernet
ring where each ring node (switch) connects to two adjacent nodes, participating in
the same ring, using two independent links. The minimum number of nodes on a ring
is two. Because ERP can provide sub-50 ms, loop-free protection for a ring topology, it
can viably replace any spanning tree protocol on the ring. Using an Ethernet fiber ring
of less the 1200 km and less than 16 nodes, the switch completion time at the time of
failure should be less than 50 ms. Copper links can also be used, but we recommend
that you use connectivity fault management (CFM) to help detect failures between
nodes.
I
N
T
E
R
N
A
L

U
S
E

O
N
L
Y
Ethernet Ring Protection
3
Ring Protection Link
To protect the Ethernet ring, a single link between two nodes acts as the ring
protection link (RPL) on the ring. One of the adjacent nodes, which is referred to as the
RPL owner, controls the state of the RPL. During normal operation with no failures
(idle state), the RPL owner places the RPL in the blocking state, which results in a
loop-free topology. If a link failure occurs somewhere on the ring, the RPL owner
places the RPL in a forwarding state until the failed link is repaired. Once the failed
link is repaired, the Junos operating system acts in a revertive manner, returning the
RPL to the blocking state.
I
N
T
E
R
N
A
L

U
S
E

O
N
L
Y
Ethernet Ring Protection
4
RPL-Owner Node
The RPL owner controls the state of the RPL. During the idle state, it is the only node
that sends periodic Ring Automatic Protection Switching (R-APS) messages to notify
the other nodes about the state of the RPL. The next few slides discuss the details of
the Automatic Protection Switching (APS) protocol and R-APS messages.
Normal Node
A normal node is any other node on the ring besides the RPL owner. It listens to and
forwards R-APS messages. Also, if a local ring link failure occurs, a normal node
signals all other nodes that the failure has occurred using R-APS messages.
I
N
T
E
R
N
A
L

U
S
E

O
N
L
Y
Ethernet Ring Protection
5
APS
To coordinate the effort of protecting the Ethernet ring, each node participates in the
APS. Each of the two ports on each node must be configured for a dedicated channel
a virtual LAN (VLAN) or a bridge domainto communicate using the APS protocol.
Although the APS protocol uses a single VLAN to communicate, the changes in the
forwarding state of interfaces that occur as a result of the exchange of R-APS
messages affect the entire port of a node (all VLANs). ITU-T G.8032 specifies the use
of the CFM frame format as described in the Operation, Administration, and
Maintenance (OAM) material. To allow differentiation between an R-APS message
from a CFM message, an R-APS message uses a destination address of
01-19-A7-00-00-01, as well as an opcode of 40.
I
N
T
E
R
N
A
L

U
S
E

O
N
L
Y
Ethernet Ring Protection
6
R-APS Data Fields
Currently, APS has no specified type, length, and values (TLVs). The slide shows the
data fields found in an R-APS message. The following list describes each data field:
Request/State (4 bits): Currently only two values are defined. A value of
0000 is used when a node wants to signal that it detects no failure on
the ring (No request). A value of 1011 is used when a node wants to
signal that an interface has failed (Signal Fail state).
Reserved 1 (4 bits): This value is always 0000. This field is reserved for
future use.
RPL Blocked (1 bit): Usage for this field is shown on the slide. Only the
RPL owner can signal RPL Blocked.
Status Reserved (6 bits): This value is always 000000. This field is
reserved for future use.
Node ID (6 octets): This field is a MAC address unique to the ring node.
Reserved 2 (24 octets): This value is all zeros. This field is reserved for
future use.
I
N
T
E
R
N
A
L

U
S
E

O
N
L
Y
Ethernet Ring Protection
7
Idle State
When no failures occur on the Ethernet ring, all nodes are in the idle state. During the
idle state, the RPL owner places the RPL in a blocking state. Also, the RPL owner
sends periodic (every 5 seconds) R-APS messages that signal that no failure is
present on the ring (Request/State =no request), that all switches should flush their
MAC tables (Do not flush = 0), and that the RPL is currently blocked (RPL Blocked = 1).
All other switches flush their MAC tables once (on the first received R-APS message)
while unblocking both of their ring ports.
I
N
T
E
R
N
A
L

U
S
E

O
N
L
Y
Ethernet Ring Protection
8
Signal Failure: Part 1
A signal failure occurs when a node detects a failure on a ring port. In the example,
Node B and Node C detect a failure on the link between them. The Junos OS does not
currently support hold interval. In other words, Node B and Node C react immediately
to the failed link. The nodes switch from the idle state to the protection state, block
the failed ports, flush their MAC table, and signal to all the other nodes that a signal
failure has occurred using R-APS messages. The R-APS messages tell the other nodes
that a failure has occurred (Request/State = signal fail) and that the nodes should
flush their MAC tables (Do not flush= 0). Node B and Node C continually send R-APS
messages every 5 seconds until the signal failure condition clears.
I
N
T
E
R
N
A
L

U
S
E

O
N
L
Y
Ethernet Ring Protection
9
Signal Failure: Part 2
Upon receiving the signal fail R-APS messages from Node B and Node C, all other
nodes (including the RPL owner) switch to the protection state, flush their MAC tables,
and stop sending R-APS messages. The RPL owner unblocks the RPL and listens for
subsequent R-APS message from Node A and Node B.
I
N
T
E
R
N
A
L

U
S
E

O
N
L
Y
Ethernet Ring Protection
10
Restoration of a Failed Link: Part 1
When the failure is repaired between Node B and Node C, they begin sending out new
R-APS messages. The R-APS messages tell the other nodes that the failure (Request/
State = no request) is no longer present and that they should not flush their MAC
tables (Do not flush = 1). Node B and Node C keep the previously failed ports in the
blocked state (preventing a loop) until they receive R-APS messages from Node A as
described in the following slide.
I
N
T
E
R
N
A
L

U
S
E

O
N
L
Y
Ethernet Ring Protection
11
Restoration of Failed Link: Part 2
Upon receiving the no request R-APS messages from Node B and Node C, Node A
starts a restore timer. The default is 5 minutes. You can configure the restore timer in
1-minute steps between 5 and 12 minutes. Once the restore timer expires, Node A
blocks the RPL and transmits RPS messages that signal to the other nodes that no
failure is present on the ring (Request/State = no request), that the RPL has been
blocked (RPL Blocked = 1), and that the other nodes should flush their MAC tables (Do
not flush = 0). Once they receive the R-APS messages from Node A, the other nodes
flush their MAC tables and unblock any ring ports that had been blocked. At this point,
all switches will be in the idle state.
I
N
T
E
R
N
A
L

U
S
E

O
N
L
Y
Ethernet Ring Protection
12
ERP Configuration Options
The slide shows all of the options available when configuring ERP. You must configure
an east-interface and a west-interface. You need not configure the two
interfaces in any specific order. You can specify global or ring-specific versions of the
three intervals (timers) for ERP:
guard-interval (disabled by default): Configurable in 10 ms
intervals from 10 ms to 2000 ms. It is used to prevent a node from
receiving outdated R-APS messages. Once an R-APS message is
received, the guard timer starts. Any R-APS messages that arrive before
the expiration of the guard timer drop.
hold-interval: We described this interval on the previous slides.
restore-interval: We described this interval on the previous slides.
I
N
T
E
R
N
A
L

U
S
E

O
N
L
Y
Ethernet Ring Protection
13
RPL Owner Configuration
The slide shows a typical configuration for the RPL owner node. First, you must
configure the two interfaces that participate in the Ethernet ring for the APS channel
(VLAN and bridge domain). In this case, VLAN 100 is used as the communication
channel between nodes. Configure ERP under [edit protocols
protection-group]. The following are a few things to note about the ERP
configuration for the RPL owner:
You must configure the RPL owner node specifically as the
ring-protection-link-owner;
The interfaces are interchangeable with regard to selecting them to act
as the west-interface and east-interface as long as you
specify one of them as being the ring-protection-link-end; and
For trunk-mode interfaces, you must also specify the VLAN.
I
N
T
E
R
N
A
L

U
S
E

O
N
L
Y
Ethernet Ring Protection
14
Normal Node Configuration
The slide shows a typical configuration for a normal node.
I
N
T
E
R
N
A
L

U
S
E

O
N
L
Y
Ethernet Ring Protection
15
ERP Status
The slide shows all of the possible commands to monitor ERP. We discuss each one
on the next few slides.
I
N
T
E
R
N
A
L

U
S
E

O
N
L
Y
Ethernet Ring Protection
16
R-APS Information
The command on the slide shows the details of the R-APS messages to which the local
node is currently listening or which it is forwarding. Based on the output, you can tell
that the local node (Node A) is the RPL owner because the R-APS message originates
from it and it is advertising that the RPL is currently blocked.
I
N
T
E
R
N
A
L

U
S
E

O
N
L
Y
Ethernet Ring Protection
17
Interface Status
The command on the slide shows the state of the local node interfaces in relation to
ERP. Note that the Admin State shows that it is IFF ready. This state means that
the Ethernet flow forwarding function (the control channel) is available to forward
R-APS traffic.
I
N
T
E
R
N
A
L

U
S
E

O
N
L
Y
Ethernet Ring Protection
18
Local Node Details
The command on the slide shows the APS State of the local node, as well as some
of the locally configured timer values.
I
N
T
E
R
N
A
L

U
S
E

O
N
L
Y
Ethernet Ring Protection
19
APS Statistics
The command on the slide shows the quantities of specific events that have occurred.
You can reset these values to 0 by issuing the clear protection-group
ethernet-ring statistics group-name name command.
I
N
T
E
R
N
A
L

U
S
E

O
N
L
Y
Ethernet Ring Protection
20
I
N
T
E
R
N
A
L

U
S
E

O
N
L
Y

You might also like