Free Essay

Rpr Technology

In:

Submitted By Gayatri10
Words 5466
Pages 22
Resilient Packet Ring Technology

1

CHAPTER 1 INTRODUCTION

1.1 Background:
The nature of the public network has changed. Demand for Internet Protocol (IP) data is growing at a compound annual rate of between 100% and 800%1, while voice demand remains stable. What was once a predominantly circuit switched network handling mainly circuit switched voice traffic has become a circuit-switched network handling mainly IP data. Because the nature of the traffic is not well matched to the underlying technology, this network is proving very costly to scale. User spending has not increased proportionally to the rate of bandwidth increase, and carrier revenue growth is stuck at the lower end of 10% to 20% per year. The result is that carriers are building themselves out of business. Over the last 10 years, as data traffic has grown both in importance and volume, technologies such as frame relay, ATM, and Point-to-Point Protocol (PPP) have been developed to force fit data onto the circuit network. While these protocols provided virtual connections-a useful approach for many services-they have proven too inefficient, costly and complex to scale to the levels necessary to satisfy the insatiable demand for data services. More recently, Gigabit Ethernet (GigE) has been adopted by many network service providers as a way to network user data without the burden of SONET/SDH and ATM. GigE has shortcomings when applied in carrier networks were recognized and for these problems, a technology called Resilient Packet Ring Technology were developed.

Fig. 1.1 Packet Rings: Next step in packet based transport

Department Of Computer Engineering, MCERC, Nashik.

Resilient Packet Ring Technology

2

1.2 Introduction To Resilient Packet Ring (RPR):
RPR Technology is an emerging solution for metro data transport applications that can fully exploit fiber rings. It retains all the inherent advantages of a packet-based transport mechanism like Ethernet. Above all, this latest technology is suitable for data, voice, and video applications. The adoption of RPR technology is particularly critical to handle the rapid growth of data traffic in metropolitan networks.

RPR technology reduces operational and equipment costs, increases resiliency to faults and provides higher throughput, while allowing for rapid deployment and efficient bandwidth allocation. RPR technology is being designed specifically for metropolitan area networks of fiber optic rings and will be an important part of new metropolitan data networks. This new protocol will allow metropolitan area service providers to create high-speed, survivable ring networks optimized for IP and other packet data.
RPR retains the best attributes of SONET/SDH, ATM, and Gigabit Ethernet. RPR is optimized for differentiated IP and other packet data services, while providing uncompromised quality for circuit voice and private line services. It works in point-topoint, linear, ring, or mesh networks, providing ring survivability in less than 50 milliseconds. RPR dynamically and statistically multiplexes all services into the entire available bandwidth in both directions on the ring while preserving bandwidth and service quality guarantees on a per-customer, per-service basis. And it does all this at a fraction of the cost of legacy SONET/SDH and ATM solutions.
Table 1.1 Resilient Packet Ring Technology Key Features

Resilience Proactive span protection automatically avoids failed spans within 50ms. Services Support for latency/jitter sensitive traffic such as voice and video. Support for committed information rate (CIR) services. Efficincy Spatial reuse: Unlike SONET/SDH, bandwidth is consumed only between the source and destination nodes. Packets are removed at their Scalable Supports topologies of more than 100 nodes per ring. Automatic topology discovery mechanism

Department Of Computer Engineering, MCERC, Nashik.

Resilient Packet Ring Technology

3

CHAPTER 2 SONET AND ETHERNET

2.1 SONET

Fig. 2.1 SONET Access and fully meshed networks

Most metro area fiber is in ring form. Ring topology is a natural match for SONET-based TDM networks that constitute the bulk of existing metro network infrastructure. However, there are well-known disadvantages to using SONET for transporting data traffic (or point-to-point SONET data solutions, like Packet over SONET [POS]). SONET was designed for point-to-point, circuit-switched applications (e.g. voice traffic), and most of limitations stem from these origins. Here are some of the disadvantages of using SONET Rings for data transport: 2.1.1 Fixed Circuits: SONET provisions point-to-point circuits between ring nodes. Each circuit is allocated a fixed amount of bandwidth that is wasted when not used. For the SONET network that is used for access in Figure 2 (left), each node on the ring is allocated only one quarter of the ring’s total bandwidth (say, OC-3 each on an OC-12 ring). That fixed allocation puts a limit on the maximum burst traffic data transfer rate between endpoints. This is a disadvantage for data traffic, which is inherently bursty.

Department Of Computer Engineering, MCERC, Nashik.

Resilient Packet Ring Technology

4

2.1.2 Waste of Bandwidth for Meshing: If the network design calls for a logical mesh, (right), the network designer must divide the OC-12 of ring bandwidth into 10 provisioned circuits. Provisioning the circuits necessary to create a logical mesh over a SONET Ring is not only difficult but also results in extremely inefficient use of ring bandwidth. As the amount of data traffic that stays within metro networks is increasing, a fully meshed network that is easy to deploy, maintain and upgrade is becoming an important requirement. 2.1.3 Multicast Traffic: On a SONET Ring, multicast traffic requires each source to allocate a separate circuit for each destination. A separate copy of the packet is sent to each destination. The result is multiple copies of multicast packets traveling around the ring, wasting bandwidth. 2.1.4 Wasted Protection Bandwidth: Typically, 50 percent of ring bandwidth is reserved for protection. While protection is obviously important, SONET does not achieve this goal in an efficient manner that gives the provider the choice of how much bandwidth to reserve for protection.

2.2 Ethernet

Fig. 2.2 Ethernet Over Ring Technology

Ethernet does make efficient use of available bandwidth for data traffic, and does offer a far simpler and inexpensive solution for data traffic. However, because Ethernet is optimized for point-to-point or meshed topologies, it does not make the most of the ring topology. Unlike SONET, Ethernet does not take advantage of a ring topology to implement a fast protection mechanism. Ethernet generally relies on the spanning tree protocol to
Department Of Computer Engineering, MCERC, Nashik.

Resilient Packet Ring Technology

5

eliminate all loops from a switched network. Even though spanning tree protocol can be utilized to achieve path redundancy, it recovers comparatively slowly from a fiber cut since the recovery mechanism requires the failure condition to be propagated serially to each upstream node. Link aggregation (802.1ad) can provide a link level resiliency solution, but it is comparatively slow (~500ms vs.~50ms) and not appropriate for providing path level protection. Ethernet is also not good at implementing global “fairness” policies for sharing ring bandwidth. Ethernet switches can provide link-level fairness, but this does not necessarily or easily translate into global fairness.

2.3 Comparing RPR To Other Solutions
Resilient Packet Ring (RPR) technology was designed to combine SONET’s carrier-class functionalities with Ethernet’s high bandwidth utilization and granularity. Additionally, RPR technology offers fairness that has been lacking in today’s Ethernet solutions. RPR is a new MAC layer technology, being standardized in the IEEE 802.17 workgroup. This employs spatial reuse to maximize bandwidth utilization, provides a distributed fairness algorithm, and ensures high-speed traffic protection similar to SONET Automatic Protection Switching (APS). RPR allows full ring bandwidth to be utilized under normal conditions and protects traffi c in the case of a nodal failure or fi ber cut using a priority scheme, alleviating the need for SONET-based protection. Furthermore, because the RPR MAC layer can run on top of a SONET PHY, RPR-based networks can provide performance-monitoring features similar to those of SONET.RPR technology offers all of these carrier-class functionalities, while at the same time keeping Ethernet’s advantages of low equipment cost, high bandwidth granularity, and statistical multiplexing capability.

Department Of Computer Engineering, MCERC, Nashik.

Resilient Packet Ring Technology

6

Table 2.1 Comparison between Gigabit Ethernet and RPR Gigabit Ethernet Enterprise-class equipment Data service only Point-to-Point or mesh topology (No rings) RPR Carrier-class equipment Data, circuit or video service Point-to-Point, topology Protection in 50seconds Limited scalability Protection in 50 milliseconds or less 254 nodes per ring, multiple rings linear, ring or mesh

Table 2.2 Comparison between SONET/SDH and RPR SONET Manual topology configuration 16nodes per ring Fixed, dedicated management bandwidth Time division multiplexing RPR Auto topology discovery 254 nodes per ring Management bandwidth used as needed Stastical multiplexing

Manual provisioning of bandwidth and Manual or dynamic provisioning routes No service class awareness Fixed direction traffic routing All traffic is protected Differentiate services in eight classes Least cost traffic routing Per connection protection

Department Of Computer Engineering, MCERC, Nashik.

Resilient Packet Ring Technology

7

CHAPTER 3 NEED FOR A NEW TECHNOLGY
The rise in more widely distributed IP traffic has created a wealth of unpredictability, as any PC or server can become an end point, generating a multitude of network requests. Inefficiencies associated with carrying increasing quantities of data traffic over voice-optimized circuit-switched network technologies like SONET and ATM makes it difficult to provision new services and increases the cost of building additional capacity beyond the limits of most.

3.1 Quality concerns Service Providers today are concerned with several fundamental quality concerns as follows:


Reliability: The network must be reliable, providing redundant hardware, ring topology

support, and fiber protection and restoration capabilities.


Fairness: Fair bandwidth management and allocation must be independent of where a

subscriber sits on the network relative to other subscribers.


Scalability: The architecture must be scalable to thousands of end points and must

support a broad range of applications.


Performance: The network must be capable of supporting services with deterministic

and predictable performance, including real-time packet voice and video applications that require minimal latency and jitter.


Efficiency: The packet access network must incorporate service protection, but it must

be accomplished efficiently. The system must be cost efficient to operate.

3.2 Disadvantages of ATM
 

Less speed of transmission Poor scalability.

3.3 Disadvantages of SONET


Fixed circuits: SONET provisions point-to-point circuits between ring nodes. Each

circuit is allocated a fixed amount of bandwidth that is wasted when not used.

Department Of Computer Engineering, MCERC, Nashik.

Resilient Packet Ring Technology

8



Multicast traffic: On a SONET ring, multicast traffic requires each source to allocate a

separate circuit for each destination. A separate copy of the packet is sent to each destination. The result is multiple copies of multicast packets traveling around the ring, wasting bandwidth.


Wasted protection bandwidth: Typically, 50% of ring bandwidth is reserved for

protection. While protection is important, SONET does not achieve this goal in an efficient manner that gives the provider the choice of how much bandwidth to reserve for protection.

3.3 Disadvantages of Ethernet


Ethernet does not take advantage of a ring topology to implement a fast protection

mechanism.


Even though spanning tree protocol can be utilized to achieve path redundancy, it

recovers comparatively slowly from a fiber cut as the recovery mechanism requires the failure condition to be propagated serially to each upstream node.


Link aggregation can provide a link level resiliency solution, but it is comparatively Ethernet is also not good at implementing global “fairness” policies for sharing ring

slow and not appropriate for providing path level protection.


bandwidth. Ethernet switches can provide link-level fairness, but this does not necessarily or easily translate into global fairness.

Department Of Computer Engineering, MCERC, Nashik.

Resilient Packet Ring Technology

9

CHAPTER 4 RPR OPERATION

4.1 Key Features of RPR technology
1. Efficient support for ring topology. 2. Increases resiliency to faults and provides higher throughput. Fast recovery from fiber cuts and link failures. 3. Data efficiency, simplicity, and cost advantages. 4. Problems such as fairness and congestion control solved. 5. Efficient bandwidth allocation.

4.2 RPR Operation

Fig 4.1 RPR Terminology

RPR technology uses a dual counter rotating fiber ring topology. Both rings (inner and outer) are used to transport working traffic between nodes. By utilizing both fibers, instead of keeping a spare fiber for protection, RPR utilizes the total available ring bandwidth. These fibers or ringlets are also used to carry control (topology updates, protection and bandwidth control) messages. Control messages flow in the opposite direction of the traffic that they represent. For instance, outer ring traffic-control information is carried on the inner ring to upstream nodes. By using bandwidth-control messages, a RPR node can dynamically negotiate for bandwidth with the other nodes on the ring. RPR has the ability to differentiate between low and high priority packets. Just like other Quality of Service (QoS) - aware systems,

Department Of Computer Engineering, MCERC, Nashik.

Resilient Packet Ring Technology

10

nodes have the ability to transmit high priority packets before those of low priority. In addition, RPR nodes also have a transit path, through which packets destined to downstream nodes on the ring flow. With a transit buffer capable of holding multiple packets, RPR nodes have the ability to transmit high priority packets while temporarily holding other low priority packets in the transit buffer. Nodes with smaller transmit buffers can use bandwidth control messages to ensure that bandwidth reserved for high priority services stays available.

4.3

The RPR MAC
One of the basic building block of RPR is Media Access Control(MAC). As a Layer-2 network protocol, the MAC layer contains much of the functionality for the RPR network. The RPR MAC is responsible for providing access to the fiber media. The RPR MAC can receive, transit, and transmit packets.

Fig 4.2 RPR MAC Block Diagram

4.3.1 Receive Decision: Every station has a 48-bit MAC address. The MAC will receive any packets with a matching destination address. The MAC can receive both unicast and multicast packets. Multicast packets are copied to the host and allowed to continue through the transit path. Matching unicast packets are stripped from the ring and do not consume bandwidth on downstream spans. There are also control packets that are meant for the neighboring node; these packets do not need a destination or source address.

4.3.2 Transit Path: Nodes with a non matching address are allowed to continue circulating around the ring. Unlike point-to-point protocols such as Ethernet, RPR packets undergo minimal
Department Of Computer Engineering, MCERC, Nashik.

Resilient Packet Ring Technology

11

processing per hop on a ring. RPR packets are only inspected for a matching address and header errors.

4.3.3 Transmit And Bandwidth Control: The RPR MAC can transmit both high and low priority packets. The bandwidth algorithm controls whether a node is within its negotiated bandwidth allotment for low priority packets. High priority packets are not subjected to the bandwidth control algorithm.

4.3.4 Protection: RPR has the ability to protect the network from single span (node or fibre) failures. When failure occurs, protection messages are quickly dispatched. RPR has two protection mechanisms.

1 Wrapping: Nodes neighboring the failed span will direct packets away from the failure by wrapping traffic around to the other fibre (called ringlet). This mechanism requires that only two nodes participate in the protection event. Other nodes on the ring can send traffic as normal.

Fig. 4.3 Wrapped Traffic Flow

Department Of Computer Engineering, MCERC, Nashik.

Resilient Packet Ring Technology

12

2 Steering: The protection mechanism notifies all nodes on the ring of the failed span. Every node on the ring will adjust their topology maps to avoid this span. Regardless of the protection mechanism used, the ring will be protected within 50ms.

4.3.5 Topology Discovery RPR has a topology discovery mechanism that allows nodes on the ring to be inserted/removed without manual management intervention. After a node joins a ring, it will circulate a topology discovery message to learn the MAC addresses of the other stations. Nodes also send these messages periodically (1 to 10 seconds). Each node that receives a topology message appends its MAC address and passes it to its neighbor. Eventually, the packet returns to its source with a topology map (list of addresses) of the ring. Routers are able to use the Address Resolution Protocol (ARP) mechanism to determine which RPR MAC address belongs to the destination address of an IP packet. RPR switches and bridges will have a list of stations that they can reach through a RPR MAC address. The topology map will be used to determine which direction on the ring will provide the best path to the destination.

4.3.6 Physical Layer RPR packets can be transported over both SONET and Ethernet physical layers. The SONET/SDH physical layer offers robust error and performance monitoring. RPR packets can be encapsulated within the Synchronous Payload Envelope (SPE) using a High-level Data Link Control (HDLC) like or Generic Framing Protocol (GFP) encapsulation. A robust Layer-1 protocol, SONET/SDH provides information such as loss of signal and signal degrade for use by the RPR protection mechanism. When using a SONET/SDH physical layer, RPR can be carried over SONET/SDH TDM transport or dark fiber. Ethernet provides an economical physical layer for RPR networks. RPR packets are transmitted with the required inter-packet gap (IPG). RPR Systems using the SONET physical layer will not interoperate with Ethernet physical-layer-based systems on the same ring.

Department Of Computer Engineering, MCERC, Nashik.

Resilient Packet Ring Technology

13

4.4 MAC Frame Format

Fig. 4.4 RPR MAC Frame

4.4.1 Destination Address: This one or six byte address (see dual mode addressing) is the MAC address of the ring node to which the frame is being transmitted, and therefore does not change from link to link on the ring. This address can also be a broadcast address.

4.4.2 Source Address: This one or six byte address is the MAC address of the ring node from which the frame is being transmitted, and therefore also does not change from link to link.

4.4.3 Payload Type: This two-byte field tells the system what type of payload follows the RPR fields. For example. MPEG or ATM or Ethernet.

4.4.4 Class of Service (CoS): The three bit CoS field allows the identification of up to eight Classes of Services, including Expedited Forwarding (EF), six levels of Assured Forwarding (AF1 through AF6), and Best Effort (BE).

Department Of Computer Engineering, MCERC, Nashik.

Resilient Packet Ring Technology

14

4.4.5 Extension (E) Bit: This field indicates that there is an extension to the RPT header. This allows for fields that may be added in the future. 4.4.6 Time To Live (TTL): The one byte TTL field is included to allow the RPT ring topology. It ensures that under no circumstances do RPT frames continue to circulate in a loop indefinitely. 4.4.7 Flow ID (optional): The 20-bit flow ID field maps a virtual connection from ingress to egress over the RPT ring. It allows the simple manual or automatic setup of connection oriented services such as Time Division Multiplexed (TDM) circuit emulated services and Ethernet virtual leased lines through the packet-switched network. 4.4.8 Header Error Check (HEC): Borrowing a concept from ATM, the two byte Header Error Check (checksum) provides a way to test the integrity of the header, allowing for persistent delivery of frames despite errors in the payload. 4.4.9 Cyclic Redundancy Check (CRC): The four byte (32 bit) Cyclic Redundancy Check (CRC-32) works differently in RPT than it does for standard Ethernet.

4.5 Using RPR with SONET and Ethernet
Ethernet is the most common interface within enterprise networks. Although the optimal customer interface and LAN solution, Ethernet does not work well within metro networks.

Fig. 4.5 RPR over Ethernet Customer Interfaces

Department Of Computer Engineering, MCERC, Nashik.

Resilient Packet Ring Technology

15

Most RPR edge systems offer an Ethernet interface as the customer interface. SONET/SDH can be used to transport RPRs that use the SONET/SDH physical layer. A 2.5G RPR can be carried as two optical carrier (OC)–48/synchronous transfer mode (STM)–16 channels (inner and outer rings) inside an OC–192/STM–64 SONET/SDH ring. This allows customers to utilize their existing transport infrastructure to deliver legacy TDM services, while RPR delivers data services efficiently. New SONET advancements such as virtual concatenation and the link-capacity adjustment scheme (LCAS) allow more precise and dynamic allocation of bandwidth dedicated to RPR services.

4.6 Resilient Packet Ring – Emerging Metro Network Architecture
SONET does take advantage of the ring topology, but does not handle data traffic efficiently, wasting ring bandwidth. Ethernet, while a natural fit for data traffic, is in fact difficult to implement on a ring and does not make the most of the ring’s capabilities. Resilient Packet Ring is an emerging network architecture and technology designed to meet the requirements of a packet-based metropolitan area network. Unlike incumbent architectures based on Ethernet switches or SONET ADMs (Add-Drop MUXes), RPR approaches the metro bottleneck problem with a clean slate. In the past few years there have been fiber ring deployments in most metro areas. The challenge for service providers is to tap into the latent capacity available on these fiber rings and carve out as many profitable, revenuegenerating services as possible. This problem of effectively managing a shared resource (in this case the fiber ring is the resource that needs to be shared across thousands of subscribers in a metro area) is most efficiently solved at the MAC layer of the protocol stack. RPR (IEEE 802.17) will be a new MAC protocol designed for metro fiber ring networks. By creating a MAC protocol for ring networks, RPR attempts to find a fundamental solution to the metro bottleneck problem. Other solutions attempt to make incremental changes to existing products but do not address the basic problem and hence are inefficient. Neither SONET ADMs nor Ethernet switches address the need for a MAC layer designed for the metropolitan area environment. SONET employs Layer 1 techniques (point-to-point connections) to manage capacity on a ring. Ethernet switches rely on Ethernet bridging or IP routing for bandwidth management. Consequently, the

Department Of Computer Engineering, MCERC, Nashik.

Resilient Packet Ring Technology

16

network is either underutilized in the case of SONET or non-deterministic in the case of Ethernet switches.

4.7 Technical aspects of RPR
Technical aspects of RPR are multicast, spatial reuse, fairness, fast protection and quality of service. 4.7.1 Multicast One RPR multicast packet can be transmitted around the ring and can be received by multiple nodes. Mesh topologies require multicast packets to be replicated over all possible paths, wasting bandwidth. 4.7.2 Spatial Reuse RPT has the ability to switch traffic over multiple spans of the ring simultaneously. Hence, the bandwidth on a particular span between ring nodes is utilized asynchronously with regard to the bandwidth on other spans. This allows bandwidth to be added or dropped on a span-by-span basis, which ensures maximum utilization of bandwidth in the ring, especially when traffic patterns are highly distributed. For example, traffic passing from node A to node B will be dropped at node B, allowing new traffic to be inserted at node B for transmission to downstream nodes C, D, etc.

4.7.3 Fairness Fairness is one of the most important features in carrier-class networks. Fairness is achieved when the traffic characteristics of two service flows that have the same service level agreement (SLA) are identical, regardless of their network source and destination.

Department Of Computer Engineering, MCERC, Nashik.

Resilient Packet Ring Technology

17

The RPR protocol can guarantee fairness across the metropolitan network. Each node on the metro ring executes an algorithm designed to ensure that each node on the ring will get its fair share of bandwidth. However, ring nodes use the spatial reuse capability to use additional available bandwidth, which is greater than their fair share on local ring segments, as long as it doesn’t affect other ring nodes. More specifically, the ring supports weighted fairness, proportional to the bandwidth each user buys. Figure 4.7 demonstrates the operation of the fairness algorithm. Before employing the fairness algorithm, all nodes transmit at their peak usage rate. At some point Node 1 experiences congestion and requests upstream nodes to reduce their transmission rate to the allowed rate. After convergence, each node will receive its fair share of bandwidth, while nodes that can locally transmit higher rates, like nodes 2 and 3, without generating congestion on other nodes, continue to transmit their peak usage rate. Other data optimized technologies, such as Ethernet, do not provide the carrierclass fairness guaranteed in RPR-based networks. Ethernet switches prioritize traffic locally, on every interface on the ring, thus creating unfair conditions for traffic that has to traverse through several nodes on its way to the destination node.

Department Of Computer Engineering, MCERC, Nashik.

Resilient Packet Ring Technology

18

4.7.4 Fast Protection and Restoration The feature that more than any other makes RPR a carrier-class technology is its fast self-healing capability which allows the ring to automatically recover from a fiber cut or node failure. This is done by wrapping traffic onto the alternate fiber within the SONET-class 50msec restoration timeframe. RPR technology provides carriers with more than SONET-class fast protection and performance monitoring capabilities; it also enables them to achieve it without dedicating protection bandwidth, as in the case of SONET, thus eliminating the need to sacrifice 50% of the ring bandwidth for protection. Two mechanisms are proposed for fast protection in the RPR MAC - Wrap and Steer. Each of these mechanisms has its own advantages and limitations, and both can be used on an RPR ring utilizing the Selective Wrap Independent Steer (SWIS) scheme.

Figure 4.8 shows an example of the data paths taken before and after a fiber cut event when Wrap is being used. Before the fiber cut, node 3 sends traffic to node 1 via node 2 (Figure 9a). When the fiber cut occurs (between node 1 and node 2), node 1 will wrap the inner ring to the outer and node 2 will wrap the outer to the inner ring. After the wrap, traffic from node 3 to node 1 initially traverses through the non-optimal path (passing through node 2, back to node 3 and into the originally assigned port on node 1 Figure 9b). This is immediately done and can inherently meet the 50ms criteria, as it is a local decision of the nodes that identify the fault (in this case, nodes 1 and 2). Subsequently, higher layer protocols discover the new ring topology and a new optimal path is used (Figure 9c). This can take several seconds to converge in a robust manner, after which the double ring capacity is restored (even though not evenly distributed, depending on the location of the fault and the ring traffic pattern). Thus, unlike SONET rings that always pay the redundancy tax to achieve protection, after a failure; an RPR ring reduces its capacity only for several seconds.
Department Of Computer Engineering, MCERC, Nashik.

Resilient Packet Ring Technology

19

Other data optimized protocols, such as Ethernet, do not provide the SONET-class restoration time. Typically, spanning tree tools are used for protection in these cases. In a mesh topology, these tools provide protection time of the order of 1 second, but in ring topologies, protection time is degraded to the order of 10 seconds or more. In summary, RPR’s fast protection and restoration capability prevents service loss for high priority critical traffic. And just as SONET does, RPR enables carriers to continue to support their existing critical traffic over a data optimized network, without compromising their guaranteed 99.999% service availability. 4.7.5 Quality of Service Quality of Service (QoS) is required in order to let a carrier effectively charge for the services it provides. ATM promised to deliver multiple services due to its rich QoS feature set. However, a carrier’s service offering should be simple. Customers should clearly understand the service differentiators for which they’re required to pay. Often, a too-rich QoS feature set causes a complicated and incomprehensible service offering. Furthermore, different service quality features are required for different types of applications. Data transfer applications require low packet loss rate, while realtime applications, such as voice, require low latency and low delay variation. There are several parameters that more than others govern the characteristics of a delivered service: Service availability, delay, delay variation and packet loss rate. Service availability depends on the reliability of the network equipment, as well as on the network survivability characteristics. Delay occurs in a network when a packet waits in a switch queue for other packets to pass. Delay variation is the difference in delay of several packets belonging to a common traffic flow. High-frequency delay variation is called jitter while low-frequency delay variation is called wander. The most important parameter for a carrier selling bandwidth services is service availability. In order to remain competitive, a carrier must guarantee “five-nines” (99.999%) service availability, irrespective of other service characteristics. The respective requirement from the network is that all traffic flows should remain active under any circumstances, including during a protection event. During a protection event, and until high layer protocols converge, the available bandwidth on an OC-192 RPR ring reduces to 10Gbps. In order to guarantee service for every traffic flow under these circumstances, a portion of each flow’s bandwidth should be allocated on this guaranteed throughput. This way, even during a protection event, service availability is guaranteed and none of the services is preempted.
Department Of Computer Engineering, MCERC, Nashik.

Resilient Packet Ring Technology

20

Traffic delay is a minor issue in high throughput rings. An end-to-end delay of several tens of milliseconds is usually regarded as acceptable, while in an OC-192 ring, the expected delay for the longest Ethernet frames (1518 bytes) is shorter by three orders of magnitude (about 5(sec). Delay variation control is essential to ensure proper transport of TDM services over an RPR ring. Control can be achieved by synchronizing the nodes on the RPR ring by a common timing source.

Department Of Computer Engineering, MCERC, Nashik.

Resilient Packet Ring Technology

21

CHAPTER 5 ADVANTAGES, FEATURES AND BENEFITS RING NETWORK

5.1 Advantages

SONET does take advantage of the ring topology, but does not handle data traffic efficiently, wasting ring bandwidth. Ethernet, while a natural fit for data traffic, is in fact difficult to implement on a ring, and does not make the most of the ring’s capabilities. Packet Ring protocols, on the other hand, promise the best of both worlds. Packet Ring protocols create a full, packet-based networking solution that avoids the provisioning complications and inflexibility of SONET and provides the ring protection and global fairness features missing from Ethernet. The basic advantage of a Packet Ring is that each node can assume that a packet sent on the ring will eventually reach its destination node regardless of which path around the ring has taken. Since the nodes “know” they are on a ring, only three basic packethandling actions are needed: insertion (adding a packet into the ring), forwarding (sending the packet onward), and stripping (taking the packet off the ring). This reduces the amount of work individual nodes have to do to communicate with each other, especially as compared with mesh networking where each node has to make a forwarding decision about which exit port to use for each packet.

Department Of Computer Engineering, MCERC, Nashik.

Resilient Packet Ring Technology

22

5.2 Resiliency
Packet Rings have a natural resiliency advantage. A ring that is built using switches needs to distribute failure information across an entire network to recover fully from a fiber cut. In the Ethernet case, this can be accomplished using a spanning tree protocol. On the other hand, a Packet Ring protocol can use a “ring wrap” at the nodes surrounding the cut (see Figure 5.2).

Only nodes that are adjacent to the failure need to take any action. Wrapped traffic can reach the original destination by going around the ring in the opposite direction. Ring fail-over is often described as “self-healing” or “automatic recovery.” In practice, ringbased transport systems have reliably achieved

Similar Documents

Premium Essay

Organizational Plan

...Running Head: ORGANIZATIONAL TECHNOLOGY Organizational Technology Plan Overview Business today is faced with an array of workplace changes varying from downsizing to implementation of new equipment or methodologies. In the current recession Jake’s Plumbing has looked for ways to have a successful business, while still providing the customer excellent service. Jake’s Plumbing is an organization that can change and adapt to new technological advances that leads to the organization’s survival and success. This organization is going to adjust business practices and the organizational model to achieve long-term prosperity. Changes required to make Jake’s Plumbing superior to competitors may include hiring skilled workers, finding support with external and internal partners, and continuing to advance in the areas of technology, which helps them remain competitive. As this cycle of change continues and adjustments made to the organizational structure, Jake’s Plumbing will incorporate these changes into the organization so that their employees and customers benefit. Lane, (2008) stated “Organizations go through change all the time, some minor but very often major; sometimes in the name of economy and almost always in the interests of improvement – this can be in terms of service or returns (or, with any luck, both).” (Lane 2008, The Challenge of Supporting Staff, ¶2.) This organizational technology assignment will be to concentrate...

Words: 6417 - Pages: 26

Free Essay

Research and Innovation Policy of Brazil

...INNOVATION POLICY OF BRAZIL 1. Some Numbers: • Total area - 8.5 million km² • Population - 191 million • GDP (2010) - 3,7 US$ trillion • Investment in R&D - 1.25 % GDP in 2010 • Scientists and researchers - 231,000 in 2010 (headcount) • Scientific papers - 2.7 % of world scientific production • world's sixth largest by nominal GDP • eighth largest by purchasing power parity. • moderately free markets and an inward-oriented economy. • the largest in Latin American nations ere. • one of the fastest-growing major economies in the world with an average annual GDP growth rate of over 5 percent • together with Mexico, has been at the forefront of the Latin American multinationals phenomenon by which, thanks to superior technology and organization, local companies have successfully turned global. 2. Overview Brazil has many times in its history praised to be the land of the future. First, Brazil with population of 190 million, the past eight years “Bolsa Familia” social program have lifted over 40 million Brazilians out of poverty and into middle class. This creates interesting platform for creating context related innovations and scaling bottom-of-the-pyramid innovations (disruptive and reverse) globally. Second, Brazil was almost non-effected by financial crisis 2008, a signal for strong and stable macro-economic policies. This means that Brazil, first time in its history, is becoming an interesting country for long term investment and strategic cooperation...

Words: 1741 - Pages: 7

Premium Essay

Modern Technology

...mind, modern technology is a bane than a boon. It cannot be denied that the technological improvement brings forth to us some advantages. Firstly, it helps man communicate local or oversea by writing email, telephone or mobile. A student , for instance, who is studying abroad can talk to his family by chatting and web cam rather than waiting for a hand - writing letters. Secondly, the modern tools also support man in business and studying. It makes better condition to fulfill tasks faster and more convenient. For example, a student spend less time searching information and documents by clicking mouse on google rather than is stuck with many books in library. A business man can deal with his job by using laptop and internet whereas he can still enjoy holiday with his family. Nevertheless, for every solution technology provides twice as many problems are likely to cause. The modern technology is to some extent underlying causes of negative things in our society. It's Internet that provides an accessible medium for bad elements such as pornography, crimes and so on. the teenagers who are not conscious enough tend to imitate the sexual and violence clips and images on internet. A typical example of this is the massacre in an American school. A pupil killed his classmates by his father 's gun simply because he only acted as a clip he saw. Moreover, the average rate of girls who are pregnant is very soon because of sexual images 's influence. Modern technology is the key element...

Words: 398 - Pages: 2

Premium Essay

Disadvantages of Technology

...Technology has been a boon to mankind and it is a blessing in disguise. It has made the life of humans simple and easy to live. The effects of technology have largely been positive on human life. We have reached this modern era because of technology. The various technologies around us have made this world modern. In this modern life technological innovations have become integral to our lives Technological innovations are the most important aspect of human life and it is impossible to even think of our life without them. Technology is the greatest creation of humans and it has also enabled humans to create whatever they desire. I think that technology is indispensable in our modern life and it is a great positive force in our lives. The creativity in the field of technology has always resulted in remarkable innovations. We would not have reached such heights of development without the help of technology. Technology has influenced people in a positive sense. It has instigated people to create better and better innovations. We can never think of our lives without the basic amenities which technology has provided us with. Without such technology we would still be in the pre-historic age. We should be thankful to technology for our metamorphosis from a cave man to the modern man of present age. This modernism is the result of technology and it has made our life better and better with time. It is best tool that the humans have ever invented for self help. The technological inventions...

Words: 343 - Pages: 2

Premium Essay

Implementing Organizational Change Part Three

...Implementing Barcode Medication Administration in Hospitals Part Three Creating Change in Organizations/HCS587 April 1, 2013 Dr. Sonnia Oliva Change needs to be evaluated after implementation to determine its effectiveness. The organization and management need to continually monitor BCMA to make sure the organization is benefiting from it and to modify components if necessary. Outcome measurement strategies for BCMA are not conclusive but single studies show its positive impact on patient safety. Additionally, cost, quality, and staff satisfaction are important when determining the effectiveness of BCMA and they all support the use of BCMA as technology that increases patient safety. Effectiveness of Organizational Change Organizations evaluate the effectiveness of change after it is implemented to determine if the change is valuable or costly. Effectiveness of BCMA also needs to be determined to ascertain its ability to increase patient safety by decreasing medication errors. Empirical data on BCMA’s effectiveness is limited and data is also inconclusive. Although, data collection conducted by the Veteran Health Administration (VHA) was used to offer suggestions for improved effectiveness. From 1999 to 2003 data was collected by VHA on the barriers that was making BCMA less effective. Laboratory use, nursing informatics, and interviews were used to determine suggestions VHA would recommend to improve BCMA’s effectiveness. The data was given to the VHA’s...

Words: 1934 - Pages: 8

Premium Essay

Technology Advancement in Education

...have turned out to be. The advantageous methods of technology towards me in our daily life in regards with education have had a massive growth and an enormous impact on our daily lives. Some of the research questions that would come to mind would be: What the major influences technological advanced education had upon us or has the technological advanced education benefited students and teachers? The key finding about my issue from the sources I found as I explored my topic were very interesting. As I explored I realized that advancement in education makes the life easier for all education fields and it speed up the long process such as projects/assignments. Moreover it also enhances the education system by developed ideas. Technology is the development over time of techniques for making and doing things. According to the oxford dictionary; education is the process of training a person’s mind so that they can acquire knowledge. The combination of education and technology has been considered the main key to human progress. Education feeds technology, which in turn forms the basis for education. The acquiring of knowledge allowed man to develop technological aid to make life easier. To date this same technology has impacted on the education industry. In the current age we live in, technology has become an important component. Every day there is some new gadget or software that makes lives easier and improves on the technology and software that already exists. Making lives easier...

Words: 2131 - Pages: 9

Premium Essay

Term Paper for Innovation Management

...Against The Machine Author: Erik Brynjolfsson & Andrew McAfee Executive Summary “Race Against the Machine”, is an agglomeration of the mercurial amelioration in technology in the past decade. How this perturbs the inception of new jobs? Why it impinges the need for human labor? And proposition to sustain the race “with” the machines. Key Takeaways * How Technology and Innovation have affected Employment and the Economy * Impact of contemporary technology on wages, employment and economy * The receding need for human work force as technology exceeds its threshold * Divergence between skills of labor, superstars, capital and labor. * How to change track from racing against the machine, than to race with the machines Key Definitions * Complimentary Innovation: Innovations that are triggered with the development of antecedent innovations. * Skilled Based Innovation Change (SBTC): shift in the production technology that favors skilled over unskilled labor by increasing its relative productivity and, therefore, its relative demand. (Easley, 2008) * Customer Relationship Management (CRM): is a widely implemented model for managing a company’s integration with customers, clients, and sales Prospects. (Wikipedia , 2012) * General Purpose Technology (GPT): Are technologies are that can affect an entire economy, at a national or global level. (Wikipedia, 2012) * Enterprise Resource Planning (ERP): systems integrate internal and external...

Words: 3436 - Pages: 14

Premium Essay

Students Attitude Towards Science in Relation to Their Academic Performance Among Elementary Pupils

...PROBLEM AND ITS BACKGROUND Introduction This situation prompted the researcher to conduct a study on students’ attitude towards science and health in relation to their academic performance in an identified school. In today’s world, science encompasses many ways of gaining information which helps individuals know themselves and their environment better and develop and renew this information frequently. Teaching science and technology to individuals help them to learn how adopt and adapt an inclination which forces them to think objectively and make the right decision confronting different events and situations. This inclination provides a comfortable life for them as well as for their family and their environment (Akgun, 2001). If students learn science using a scientific procedure and skill they would be able to use these procedures and skills in their daily life. In this procedure, while students’ attitudes towards science increase, they develop their creativity skills. During the primary educational period, courses on science and technology achieve a great importance comparing to the other courses since these courses teach students the environment, natural events and scientific developments as well as critical thinking and problem solving. (Kaptan, 1999) An attitude is an inclination to gaining a skill and is identified as an individual characteristic that provide a background for accepting a positive subject or denying a negative one. Thus, by improving a positive...

Words: 306 - Pages: 2

Premium Essay

Information Technology Term Paper

...Phase 5 Individual Project 2013 Information Technology Management Table of Contents Business System Planning (Week 1) Introduction 4 Identify how the following critical success factors will be addressed by case study 5 Governance 5 Business plan alignment 6 Process improvement 6 Resource optimization 6 Operating excellence 7 Identify how the following critical success factors will be addressed by case study 7 Business management issues 7 Strategic and competitive issues 7 Planning and implementation concerns 8 Operational items 8 Identify how the variables defined by Strassmann's Model will be measured 8 Efficiency 8 Effectiveness 8 Competitivness 8 Profitability 8 Strategic Information Systems Assessment (Week 2) Create an analysis of strengths, weaknesses, opportunities and threats for case study 9 Case study continued 9 SWOT analysis of case study 10 SWOT analysis continued 11 12 13 Create an assessment of the forces that are presently governing competition for case study 14 Using Wiseman’s Framework of Strategy Development define the strategic thrusts and advantages 15 Information Systems Business Case (Week 3) Critical success factors for IT Manager 16 Continued. 17 General stratgy for IT goals and objectives of the case study. 18 General strategy on how IT department will support the goals and objectives of the case study 19 Information Technology Strategy Statement (Week 4) Business aspects 20 ...

Words: 6788 - Pages: 28

Premium Essay

English Only Debate

...EDU 225 Instructional Technology Benchmark Assessment and Rubric Targeted Essential Learning Students study and utilize a variety of technologies such as computer software and hardware and will develop a personal technology philosophy and classroom technology plan designed to enhance and shape their teaching skills and knowledge to better utilize emerging technology. (APTS 3, INTASC 6) Assessment Tool Selected 1) Comprehensive Classroom Technology Plan 2) Reflection Essay Specific Performance/Task(s) Select and implement appropriate technology and resources. (APTS 3.11) Select and use research-based strategies to engage learners. (APTS 3.12) Relevancy of Task to Teacher Candidate Demonstrate the effective use of technology to foster active inquiry, promote collaboration, and support interaction in the classroom. Assessment: Student Prompts/Teacher Directions Comprehensive Classroom Technology Plan (e-Portfolio Assignment) In Modules 2-6 you will be drafting the component parts of a Comprehensive Classroom Technology Plan for use in a 21st century classroom. The Comprehensive Classroom Technology Plan will include the sections listed below. Drafts of these sections will be submitted throughout the course for instructor feedback and will be revised for inclusion in the Benchmark Assessment, due in Module 7. A Reflection Essay will also be prepared to accompany the plan. The plan is composed of the following components: * Section One: Mission and Vision...

Words: 3012 - Pages: 13

Free Essay

Email Usage and Benefits

...An organization can benefit greatly from the use of email. Not only can employees communicate with both clients and coworkers, they can do so more efficiently than without. Email is a very powerful tool to use in business or even in everyday life. When a company needs its employees to share information together, rather than to take hard copies of a sheet to each individual person, a mass email can be sent out that goes to each employee company wide at the click of a button. Very efficient. This is not to say that there are no cons to emailing. Employers should monitor their employees well. There are a number of reasons why a company might not want an employee emailing without limit or restriction. For example, should an employee use the email system for their personal benefit or gain, their productivity could be reduced or temporarily cease. They could make mistakes while trying to cover up both jobs at once or while attempting to multi-task. Aside from personal usage and lost productivity, the companies information, or even clients information could be compromised. An emails path is usually predetermined, however, do to hackers and identity thieves, it may not always go only to who one may wish or think. An alternative to emailing is instant messaging. It is even faster. Emails often need to be refreshed or checked regularly for incoming messages where as im’s come right though. An im can be as instantaneous and quick as the person typing is capable of. While it is very fast...

Words: 477 - Pages: 2

Premium Essay

Trends Assement Hcl Technologies

...Purpose HCL Technologies provide a range of outsourcing services, business process outsourcing, and infrastructure services. The purpose of this paper is analyze trends and economic forces that impact changes in the global marketplace, analyze the impact of market trends in driving innovations in organizational, structure, culture, and process, and also to analyze leadership in relation to the effectiveness of general management planning and decision making. Majority of my information will come from HCL Technologies case study with Nayar’s insights about the subject. Analyze trends and economic forces that impact changes in the global marketplace. The product that HCL Technologies sells is a service that customers use to make their business better. Staying with the latest trends is very critical in a service based business like HCL Technologies. The first trend I would like to talk about is Technology trends. Technology trends can drive innovation and influence decision making in the IT service industry. According to Hickman (2010)" Developments in technology lead to new products and services and improve how they are produced and delivered to the end user. Innovations can create entirely new industries and alter the boundaries of existing industries." A future trend that will spread rapidly in the IT industry will be Cloud Computing. There will soon be away a business can obtain and maintain software, hardware, and computing capacity. According to the Nayar Case study...

Words: 1539 - Pages: 7

Premium Essay

Technology in the 20th Century

...Technology in the 20th Century HUM/300 Technology in the 20th Century Technology is rapidly evolving and has been for many years. Scientists and inventors are always on the lookout to invent something to make the average person’s daily life easier. The 20th century brought many technological advances in the world from the television to the air conditioner. Many of the technologies so fundamental to everyday life came from advancement during this time. The author of the paper will discuss three technological developments in the 20th century including: the airplane, the automobile, and the computer. The Airplane For centuries humans wanted to invent a device that would allow them to fly like birds. Kites, gliders, and air balloons were many of man’s creations to attempt to derive the privilege of flying. Two men, Wilbur Wright and Orville Wright, were the first to find some success in inventing a device that enabled flying. On December 17, 1903, the Wright brothers flew there invention for the first time. However, this was only a small start because their aircraft did not fly very high and it only stayed in the air for about a minute. Although this was a small triumph in the goal of flight it marked the beginning of the technological advances that produced the modern airplane. When the Wright brothers invented their aircraft they received immediate recognition and other inventors and aviators worked hard at inventing a better aircraft. In 1909, Louis Bleriot, a French...

Words: 848 - Pages: 4

Free Essay

Da Da

...Choose a topic and write an essay of 3-4 pages: 1 Don't tell people how to do things, tell them what to do and let them surprise you with their results.” (US Gl. George S. Patton) 2 Management is working in the system; leadership is working on the system. 3 Managers gain authority by position, leaders gain it by influence and character. 4 Every manager should be a leader, while every leader must know management. 5 Leadership and management must go hand in hand. 6 People hate each other because they are afraid of each other; they are afraid of each other because they don’t know each other; they don’t know each other because they don’t COMMUNICATE” (Martin Luther King) 7 What makes a leader? 8 There is an abundance of managers in the world but very few truly have the characteristics of a leader. 9The challenges we face today are not economic, environmental, social, or legal; they are challenges of character and leadership.  10 Management is nothing more than motivating other people. 11 Good managers increase productivity—great leaders, peak performance. 12 Inventories can be managed but people must be led. 13 Management is neither an art nor science. It is both, and the real trick is to determine the right mixture at the right time! 14. ’Never tell people how to do things. Tell them what to do and they will surprise you with their ingenuity!’ (General George S. Patton) 15. The best executive is the one who has sense enough to pick...

Words: 2076 - Pages: 9

Free Essay

Elman

...Science In China. Benjamin A. Elman. Cambridge, MA: Harvard University Press, 2006. Pp xiii. 336. Benjamin Elman’s book is a complex history of interactions between the European West and Imperial China involving the transmission of scientific, medical, and technological knowledge over a period of roughly three-hundred years, lasting through the Qing dynasty. Previous to the sixteenth century, China was ripe with science and technological innovation; however, the history of modern science has been viewed with a Eurocentric account, consequently dismissing and undervaluing China’s role in modern science’s development. Elman explains this phenomenon throughout his book as the “failure narrative”; why did China not develop modern science and technology at the rate of its Western counterparts? Elman believes that cultural and historical factors resulted more often than not in an inconsistent and turbulent transmission of scientific, medical, and technological information from the West to China, resulting in a miscommunication of fundamental theories from both sides. Elman’s book focuses on two groups, Jesuit advisers and Protestant missionaries, whom he recognizes as the primary transmitters of modern scientific knowledge from Europe to China prior to the start of the twentieth century. In the early seventeenth century, Jesuits made their way to China and collaborated with literati and the imperial court with their knowledge of astronomy and cartography, helping with the Ming calendar...

Words: 1058 - Pages: 5