+ All Categories
Home > Documents > Emerging technologies for fiber network survivability ... · for fiber network survivability...

Emerging technologies for fiber network survivability ... · for fiber network survivability...

Date post: 29-Sep-2020
Category:
Upload: others
View: 1 times
Download: 0 times
Share this document with a friend
15
C Emerging Technologies for Fiber Network Survivability Reducing network protection costs, while maintaining an acceptable level of survivability, has become an important challenge for network planners and engineers. Technology advancement is certainly crucial for meeting this challenge, especially in the future B-ISDN environment. Tsong-Ho Wu etwork survivability is an issue of great concern to a telecommuni- cations industry eager to deploy high-capacity fiber networks [l- 41, since loss of services in high- capacity fiber systems due to disasters and catastrophic failures could be devas- tating and result in significant revenue loss. How- ever, providing protection against fiber network failures could bevery expensivedue to the high costs associatedwith fiber transmission equipment. Thus, reducing network protection costs while main- taining an acceptablelevel of survivabilityhas become an important challenge for network planners and engineers.Technologyadvancement is certainlycru- cialfor meeting this challenge, especially in the future B-ISDN environment. Technologies of interest for fiber network survivability include Syn- chronous OpticalNetwork (SONET), Asynchronous Transfer Mode (ATM), and passive optical tech- nologies (includingopticalswitching and Wavelength Division Multiplexing (WDM)). These technologies provide the network protection technology base for each layer of the B-ISDN transport network defined in CCITTRec. 321: physical layer (SONET in North America), ATM layer, and a possible optical layer, as shown in Fig. 1. This article will review technology and archi- tectures that may be used to implement cost- effective survivable fiber networks for each transport layer, and discussthe interworking system between survivability mechanisms across differ- ent layers and associated open issues. Standards development, product availability and the current status of deployment will also be reviewed. The first section reviewsaclass of survivablefiber network architectures that has been deployed or is scheduledto be deployed.Next is a review of emerg- ing technologies for these survivable architecture implementations. These emerging technologies include SONET, ATM, and passive optical tech- nology. The next section discusses the issue of multiple layer interworking on SONET/ATM networks. A summary is given in the final section. ' TSONG-HO wuis with the Network Control Research Department at Bellcore. 58 0163-6804/95/$04.00 1995 0 IEEE ____ - A Class of Survivable Network Architectures he fiber-hubbed architecture has been consid- T ered as an economical transport architecture for intraLATAnetworks. This architecture can best uti- lize the economical scale of high-capacity fiber systems by reducing the amount of expensive fiber terminating equipment needed. In this architecture, each central office (CO) is connect- ed to a hub through a fiber-optic system. At the hub, a digital cross-connectsystem (DCS) partitions incomingtraffic by destination and routes channels, overfiber, to the appropriate end office.Aggregating interoffice traffic onto a single fiber pair greatly reduces the costs for small COS that require links to other offices. The fiber-hubbed architecture is economically attractive, but at the expense of ser- vice vulnerability, since a single fiber cut or a hub officefailure would isolate a large area served by the failedfacilityor COfromcommunicatingwithother communities. To alleviate survivability concerns caused by the fiber-hubbed network architecture, severalmod- ifications to the hub architecture and alternative sur- vivable architectures have been explored in the past fewyears. These survivable architecturesinclude automatic protection switching (APS) with diverse protection (APSDP), self-healingrings (SHRs), and dynamically path rearrangeable mesh architec- ture. Some proposals (e.g., APS and rings) have already been implemented and deployed in local exchange carrier (LEC) networks. These survivable network architectures are generally dividedinto two categories: dedicated facil- ity restoration and dynamicfacilityrestoration. Ded- icated facility restoration uses the dedicated protection facility for service restoration, while dynamic facility restoration uses the spare capaci- ty within working facilities for service restoration. The former restoration category includes APS and rings, while the latter includes dynamic path rearrangeable mesh architecture and dual hom- ing. There are tradeoffs between the flexibility (thus, system complexity) and the additional spare IEEE Communications Magazine February 1995 ~ Page 000001 Mercedes-Benz USA, LLC, Petitioner - Ex. 1042
Transcript
Page 1: Emerging technologies for fiber network survivability ... · for fiber network survivability include Syn- chronous Optical Network (SONET), Asynchronous Transfer Mode (ATM), and passive

C

Emerging Technologies for Fiber Network Survivability Reducing network protection costs, while maintaining an acceptable level of survivability, has become an important challenge for network planners and engineers. Technology advancement is certainly crucial for meeting this challenge, especially in the future B-ISDN environment.

Tsong-Ho Wu

etwork survivability is an issue of great concern to a telecommuni- cations industry eager to deploy high-capacity fiber networks [l- 41, since loss of services in high- capacity fiber systems due to

disasters and catastrophic failures could be devas- tating and result in significant revenue loss. How- ever, providing protection against fiber network failures could bevery expensive due to the high costs associatedwith fiber transmission equipment. Thus, reducing network protection costs while main- taining an acceptable level of survivability has become an important challenge for network planners and engineers. Technology advancement is certainly cru- cial for meeting this challenge, especially in the future B-ISDN environment. Technologies of interest for fiber network survivability include Syn- chronous Optical Network (SONET), Asynchronous Transfer Mode (ATM), and passive optical tech- nologies (including optical switching and Wavelength Division Multiplexing (WDM)). These technologies provide the network protection technology base for each layer of the B-ISDN transport network defined in CCITTRec. 321: physical layer (SONET in North America), ATM layer, and a possible optical layer, as shown in Fig. 1.

This article will review technology and archi- tectures that may be used to implement cost- effective survivable fiber networks for each transport layer, and discuss the interworking system between survivability mechanisms across differ- ent layers and associated open issues. Standards development, product availability and the current status of deployment will also be reviewed.

The first section reviews aclass of survivable fiber network architectures that has been deployed or is scheduled to be deployed. Next is a review of emerg- ing technologies for these survivable architecture implementations. These emerging technologies include SONET, ATM, and passive optical tech- nology. The next section discusses the issue of multiple layer interworking on SONET/ATM networks. A summary is given in the final section.

'

TSONG-HO wuis with the Network Control Research Department at Bellcore.

58 0163-6804/95/$04.00 1995 0 IEEE _ _ _ _ -

A Class of Survivable Network Architectures

he fiber-hubbed architecture has been consid- T ered as an economical transport architecture for intraLATAnetworks. This architecture can best uti- lize the economical scale of high-capacity fiber systems by reducing the amount of expensive fiber terminating equipment needed. In this architecture, each central office (CO) is connect- ed to a hub through a fiber-optic system. At the hub, a digital cross-connect system (DCS) partitions incoming traffic by destination and routes channels, over fiber, to the appropriate end office. Aggregating interoffice traffic onto a single fiber pair greatly reduces the costs for small COS that require links to other offices. The fiber-hubbed architecture is economically attractive, but at the expense of ser- vice vulnerability, since a single fiber cut or a hub office failure would isolate a large area served by the failedfacilityor COfromcommunicatingwithother communities.

To alleviate survivability concerns caused by the fiber-hubbed network architecture, several mod- ifications to the hub architecture and alternative sur- vivable architectures have been explored in the past few years. These survivable architectures include automatic protection switching ( A P S ) with diverse protection (APSDP), self-healing rings (SHRs), and dynamically path rearrangeable mesh architec- ture. Some proposals (e.g., APS and rings) have already been implemented and deployed in local exchange carrier (LEC) networks.

These survivable network architectures are generally divided into two categories: dedicated facil- ity restoration and dynamic facility restoration. Ded- icated facility restoration uses the dedicated protection facility for service restoration, while dynamic facility restoration uses the spare capaci- ty within working facilities for service restoration. The former restoration category includes APS and rings, while the latter includes dynamic path rearrangeable mesh architecture and dual hom- ing. There are tradeoffs between the flexibility (thus, system complexity) and the additional spare

IEEE Communications Magazine February 1995 ~

Page 000001 Mercedes-Benz USA, LLC, Petitioner - Ex. 1042

Page 2: Emerging technologies for fiber network survivability ... · for fiber network survivability include Syn- chronous Optical Network (SONET), Asynchronous Transfer Mode (ATM), and passive

capacity required for each restoration category. In general, the more sophisticated techniques require less spare capacity but slow down the restoration procedure. Figure 2 depicts four survivable network architectures which are described next.

APS Diverse Protection (APSIDP) The APS approach shown in Fig. 2(a) has the advan- tageofbeingtotallyautomaticandiscommonlyused to facilitate maintenance and protect working services. The 1:N diverse protection structure is an alternative to the commonly used 1:N protec- tion structure, where N working fiber systems share one common protection fiber system. The only difference between these two structures is the location of the fiber protection system. The 1:Npro- tection structure places the protection fiber in the same route as that of working systems, and the 1:N diverse protection structure places the pro- tection fiber in a physically diverse route. In a 1:N system, a cable cut may cut the protection fiber as well as the working fibers. If a fiber cable cut occurs and a l :N diverse protection scheme is used, part of service can survive because one of the N working systems can be restored through the diversed, protected route. This diverse pro- tection scheme is attractive in intraLATA net- works because electronics costs dominate total costs and remain unchanged when attempting to achieve higher survivability. A 1:l diverse protec- tion arrangement, which provides 100 percent survivability for fiber cable cuts, requires more facil- ities and equipment than the 1:N diverse protec- tion arrangement.

Dual Homing In contrast to the single-homing approach, which aggregates demands from a CO to destination COS through an associated home hub, “dual homing” is an office backup concept that assigns two hubs to each office and requires dual access to other offices. In the dual-homing approach, demand originating from a special CO is split between two hubs: a home hub and a designated foreign hub. In the case of a home hub failure, an office that uses dual-homing can still access other offices through the backup hub. Fig. 2(b) shows such a dual-hom- ing architecture. Dual homing does not automati- cally accomplish restoration by itself, but may be used in conjunction with DCSs that restore ser- vices at the path layer.

Self-Healing Rings (SHRs) The SHR (see Fig. 2(c)), like the 1:l diverse pro- tection structure, is totally automatic and pro- vides 100 percent restoration capability for a single fiber cable cut and equipment failure through its ring topology and simple, but fast, protection switching scheme. It can also provide some sur- vivability for hub DCS failures or major hub fail- ures (e.g., flooding or fires).

Dynamic Path Rearrangeable Mesh Architecture The dynamic path rearrangeable mesh architec- ture uses DCSs to reroute demands around a failure point. Unlike APS/DP and rings, DCS restoration does not require standby protection facilities ded- icated to working systems for restoration. Instead, it uses spare capacities within working systems to

ATM layer

Higher layer I Virtual channel (VC)

Virtual path (VP)

Physical layer

Optical layer*

*Optical layer is currently not in B-ISDN transport model. SDH - Synchronous digital hierarchy

restore affected demands. Figure 2(d) showsan exam- pleofDCSrestoration. InFig.2(d), demandsbetween locations A and B are normally routed over a link between DCS#1 and DCS#2, but are rerouted through DCS#3 if a cable cut occurs on that link. Acentralized or distributedcontrol systemmayopti- mize the use of the available spare capacities by refer- ring to a database that contains the status of the network (both working and spare capacities). The penalties for this efficient use of spare capacities, comparedwith other architectures, are the time and complexity needed for the controller(s) to com- municate with the network DCSs, as well as main- tenance of the database.

Emerging Technology Impact on Survivable Fiber Network Architecture Implementation

ince discussions of this section follow the con- S cept of the B-ISDN transport model, it would be useful to defiie three network protection schemes (i.e., protection switching, rerouting and self- healing) here based on CCITT Rec. 1.311 [46].

Protection switching - Protection switching is the establishment of a pre-assigned replace- ment connection by means of equipment without the network management control function. The equipment may reside in either the connecting or terminatingpointsoftherelatedpathleve1.Anexam- ple of protection switching is APS and self-heal- ing rings.

Rerouting - Rerouting is the establishment of a replacement connection by the network man- agement control connection. When a connection failure occurs the replacement connection is routed depending on network resources available then. An example of rerouting is the centralized con- trol DCS network restoration.

Self-healing - Self-healing is the establish- ment of a replacement connection by the network without the network management control func- tion. When a connection failure occurs, the replacement connection is found by the network elements and rerouted depending on network resources available at that time. Examples of self- healing include the distributed control DCS net- work restoration. Note that some proposed DCS

IEEE Communications Magazine February 1995 59

Page 000002

Page 3: Emerging technologies for fiber network survivability ... · for fiber network survivability include Syn- chronous Optical Network (SONET), Asynchronous Transfer Mode (ATM), and passive

- The perceived advantages of the SONET ring in tems of costs, suwiva bility, and control have made the SHR architecture a popular option in LEC networks.

restoration schemes use both re-routing and self- healing capabilities during network restoration.

SONET Protection Layer SONET is a standard in North America that defines optical interface, rate, and format specifi- cations for broadband optical signal transmis- sions [5]. SONET is designed to transport a wide variety of signal types with a basic signal format containing fixed overhead to support various "in- b a n d operations features. Network survivability is among some initial applications that were pro- vided by SONET. For example, SONET technol- ogy, along with high-speed (e.g., 2.4-Gb/s) VLSI technology, makes add-drop self-healing rings prac-

I I

I I

Working system 1 Working system 2

Workingosystem N

(a) l :N APS Diverse protection Architecture ) Backup

Special office - Physical fiber link --+ Logical routing path

(b) Dual homing

(c) Ring architecture

DCS#l DCS#2

CO 1 CO 2

Normal route Alternate route

(d) DCS Mesh restoration ~~

4 Figure 2 . Survivablefiber network architectures.

tical and economical for use in intraLATA net- work applications [6].

SONET APS - The SONET APS protocol was initially proposed in 1986 and was standardized in ANSI TlX1.5 in 1992 [7]. Two types of APS architectures (1:N APS and 1+1 APS) are defined in the SONET standard [7,8]. The 1:N AF'S archi- tecture allows one of the N (permissible values for N are from 1 to 14) working channels to be bridged to a single protection channel. Unlike asynchronous APS systems that use out-band signaling, the SONET APS protocol uses in-band signaling for protec- tion switching through K1. and K2 bytes within the SONET line overhead. The K1 byte requests a channel for the switch action, and the K2 byte confirms the channel that is bridged onto the pro- tection line.

The SONET APS protocol uses a three-phase protocol for bidirectional protection switching oper- ations, which can be summarized as follows. When a failure is detected or a switch command isreceived at the tailend (i.e., thereceivingend), the protection logic compares the priority of this new condition with the request priority of the working channel (if any) that requests the use of the pro- tection channel. The comparison includes the pri- ority of any bridge order (i.e., of a request on the received K1 byte). If the new request is of higher pri- ority, the K1 byte is loaded with the request and the ID number of the channel requesting the use of the protection line. The tail end then sends out the K1 byte on the protection line.

When this new K1 byte has been verified (i.e., received identically for three successive frames) and evaluated (by thepriorityorder) at the head end (i.e., the transmitting end), the K1 byte is sent back to the tail end with a reverse request (to confirm the channel requesting the use of the protection channel). A bridge is also ordered at the tail end for that channel. This action initiates a bidirec- tional switch. At the head end, the indicated channel is bridged to protection. When the chan- nel is bridged, the K2 byte is set to indicate the number of the channel on protection.

At the tail end, when the channel number on the received K2 byte matchesthe number of the chan- nel requesting the switch, that channel is selected for protection. This completes the switch to the pro- tection channel for one direction. The tail end also performs the bridges, as ordered by the K1 byte and indicates the bridged channel on the K2 byte. The head end completes the bidirectional switch by selecting the channel from protection when it receives a matching K2 byte. Note that K1 and K2 bytes always travel over the protection line in pre- sent SONET standards [7]. Protection switching, including Kl/JS2 operations and switch reconfigu- ration, must be completed within 50 ms [8].

Another type of APS that is also defined in the SONET standard is 1+1 protection switching, which is a form of 1:l APS with the head end per- manently bridged. Thus, a decision to switch is made solely by the tailend. For bidirectional switching, the K1 byte is used to convey the signal condition to the other side, and the actual switching is decided by the tail end.

SONET Self-Healing Rings - In the past, the ring architecture has been restricted from interof-

62 IEEE Communications Magazine February 1995

Page 000003

Page 4: Emerging technologies for fiber network survivability ... · for fiber network survivability include Syn- chronous Optical Network (SONET), Asynchronous Transfer Mode (ATM), and passive

fice applications because these metallic, low- capacity systems may make the ring uneconomi- cal and difficult to adapt to the rapidly growing traffic in the telecommunications interoffice network envi- ronment. Even in the present pre-SONETfiberworld, the ring is used only in LANs, not in interoffice networks, because of its relatively low speed (approx- imately hundreds of Mb/s), complex control scheme (as compared to the conventional facility protection switching architectures), and complex scheme to add-drop tributary signals from a high-speed sig- nal. Recently, standardized SONET technology and associated flexible high-speed add-drop multi- plexing technology (due to its synchronous frame format structure) have made SHR architectures prac- tical because of SONET's simpler control scheme, ease of adding-dropping tributary signals, and high-speed add-drop multiplexing capability (e.g., OC-48withabitrateof2.488Gb/s),whichmaymeet the intraLATA interoffice demand requirement. The perceived advantages of the SONET ring in terms of costs, survivability, and simpler control have made the SHR architecture a popular option in the deployed of LEC networks. The first SONET self-healing ring was deployed by Cincinnati Bell in 1991, and operated at the OC-3 rate. Note that external controllers and the external telemetry system needed for asynchronous rings are not needed for the SONET ring because the failure mes- sage is conveyed and protection switching is trig- gered through the SONET line or path overhead.

SONET rings can be classified by the routing prin- ciple and the SONET overhead used for trigger- ing protection switching [9]. A ring is called a unidirectional ring if bidirectional working signals follow opposite physical routes around a ring, while bidirectional working signals in a bidirectional ringfollowthesame physicalroute. Due to thisrout- ing principle, a unidirectional ring and a bidirectional ring require one fiber and two fibers, respectively, to support their working traffic. Each ring type can be protected through path protection switch- ing operating at SONET path layer, or line protection switching operating at the SONETline layer. Today, onlyundirectional ringswith path protection switch- ing and bidirectional ringswith line protection switch- ing are defined in ANSI TlX1.5 and Bellcore requirements [10,11] and are commercially avail- able in the U.S. market place. These ring types are currently under discussions in ITU-T Study Group 15 [12]. For convenience, a unidirectional self-healing ring (USHR) mentioned in this paper is referred to as a unidirectional, path-switched ring. Similarly, a bidirectional self-healing ring (BSHR) mentioned here is referred to as a bidi- rectional, line-switched ring.

In a undirectional path switched ring, two fibers are needed between adjacent nodes: one forworking and theother for protection. Apath (e.g., STS-1) in the transmitting side is duplicated and sent to both fibers in opposite directions. Thus the receiv- ing end always receives two identical path signals with different delays. The receiving end always choos- es a path from the default ring (e.g., the outer ring) but switches to the other ring if the ADM detects an alarm signal (e.g., path AIS) or a poor BER. The unidirectional, path switched ring may perform protection switching at the STS-1 or VT1.5 level depending upon applications.

Bidirectional self-healing rings (BSHRs) are fur-

_ _

Servers, points of

,/' -ion,,_), &hub Headends, sites

/ ~ dub sites, / & Trunkincl rinq distribution // //CL\ - y-flN Customers

Distribution ring

I I /

rings

/ __I

Subscriber plant

I---

Figure 3. A ring-to-ring architecture for cable Wtransport.

ther divided into 2-fiber and 4-fiber BSHRs. For a 4-fiber ring, two fibers are used for working traffic, while another two fibers serve as standby fibers that provides 1:l pfotection against equipment or fiber facility failures. The 2-fiber BSHR uses only half the capacity of the fiber system for working traffic and reserves the other half as the pro- tection capacity. To perform protection switching against network failures for a 2-fiber BSHR, a form of the Time Slot Interchange (TSI) capabili- ty is needed to move signals from time slots of the affected fiber to the reserved (spare) time slots of the other fiber. Note that standby fibers or capac- ities in BSHRs (as well as other 1:l systems) are allowed to carry lower priority traffic that will be dropped during the network restoration process.

The application roles between USHRs and BSHRs have been extensively studied. It is gener- ally agreed that a USHR may be more economi- cally attractive in areas where demands are homed to one central location, while BSHRs may be attractive in areas where demands are more uni- formly distributed [9]. This appears to imply that USHRs may be more appropriate in feeder networks and peripheral networks (e.g., from CO to the hub), and BSHRs may be more practical in interoffice networks with a non-hubbing struc- ture. Thus, it is expected that different types of rings may be deployed in the same LATA net- work. This trend raises the issue of ring inter- working, which is currently being discussed in the ANSI T1X1.2 standards group [13]. We will dis- cuss this ring interworking issue later.

SONET self-healing ringswere originally designed to support bothvoice services and private lines. How- ever, the same ring structure has been imple- mented to support reliable transport for Cable TV signals. Figure 3 shows an example of the ring-to-ring broadcast architecture. If this broadcast ring architecture uses SONET technology, the SONET ADM at each node requires a drop-con- tinue feature that drops signals for local process- ing and passes through the identical signals to the downstream node.

SONETDCSSelf-Healing Mesh Networks-The operations of the DCS mesh network reconfigu- ration can be performed in a central or distribut- ed manner. The centralized DCS control scheme has a central controller performing the network

IEEE Communications Magazine February 1995 I-

._ ____ 63

Page 000004

Page 5: Emerging technologies for fiber network survivability ... · for fiber network survivability include Syn- chronous Optical Network (SONET), Asynchronous Transfer Mode (ATM), and passive

,

Network size 1

~ Spare capacity needed

Per-node cost

Fiber counts

Connectivity needed

I

I

, Restoration time

1 Mixed line rates I -

Software complexity

Areas impacted by software failure

Protection against major failure

Scalability

Planning/operations complexity

'

- The differences among suwiva ble architectures have resulted in a well- accepted two-tier transport network model composed of

2 nodes Up t o few tens of nodes Global

1 Most Moderate Least

Moderate (OLTM/APS) Lowest (ADM) Highest (DCS) 1 Moderate Highest Moderate I

Lowest Moderate Most (mesh)

- 50 ms - 50 ms Seconds/minutes ~

Possible for 1 N/APS No Yes i

Least Moderate Most

2 nodes Nodes on the ring Wider areas ' Worst Medium Best

Easiest Most difficult Moderate

Least Moderate/least* Most

__

I

I I I

I

a core sub-

network and a peripheral su 6-network.

reconfiguration process, whereas the distributed DCS control scheme executes the network recon- figuration procedure at each DCS node. Central- ized DCS mesh restoration systems [14, 151 have been implemented by several LECs and long-dis- tance carriers. The restoration speed is about 5 to 10 minutes for 100 STS-1 (or DS3) pathsrestored. This restoration time can be significantlyreduced by using the distributed control approach. The concept of dis- tributed DCS restoration was first proposed by Grover in 1987, and was later modified and reported in [ 161. This proposal uses the physical layer signaling. Another scheme was later proposed in [17] that uses section data communications channel (DCC) for signaling and a restoration protocol similar to the X.25 protocol. Later, several other schemeswere proposed based on the above two pro- posals [18-23,521.

There are two restoration techniques, called line restoration and path restoration, depending on which layer is being used as the protection layer. Line restoration uses the line layer information to trigger the restoration process and restores all affected paths in the affected facility regardless of the sources and destinationsofthese affected paths. Incontrast, path restoration restores affected STS paths on an end-to-end basis. For the purpose of this paper, this section describes a generic line restora- tion algorithm for distributed control self-healing mesh networks. The restoration algorithm for path restoration is similar to that for line restoration. For the distributed self-healing control architecture, each DCS stores local information that includes working and spare capacities associated with each link terminating at that DCS. The actual imple- mentation couldvary depending on the specific algo- rithm considered. Due to dependence between the routing assignment and the capacity alloca- tion in SONET DCS mesh networks, the dis- tributed restoration system generally executes a three-phase protocol during a complete restora- tion cycle. When a failure is detected, one of two ends of the failed facility is designated as the sender,

and the other end is designated as the chooser. All other nodes that participate in the restoration process are called tandem nodes. In the restora- tion process, the sender first broadcasts (floods) restoration messages to all adjacent nodes. To restrict the number of restoration messages and con- strain the algorithm execution time, selective message flooding is implemented, for example, through limiting the number of hops that could be travelled for restoration messages. The tan- dem node updates received restoration messages and re-broadcasts them to other adjacent nodes based on the particular flooding algorithm used. When the message reaches the chooser, it implies that one or more rerouting paths for restoration are iden- tified. The chooser then sends acknowledgment (ACK) messages back to the sender to reserve the sparecapacityfor the selectedrestorationroute.

When the sender node receives the ACKandver- ifies the restoration path, it sends a confirmation message back to the chooser node through the select- ed restoration path. When the tandem node receives the confirmation message, it reconfigures its DCS switching matrix according to instructions stored in the confirmation message. After the chooser receives the confirmation message, it changes its DCS switching matrixand cross-connects the affect- ed STS paths from the failed facility to newly identified alternate routes. The restoration pro- cess is completed when all the affected paths are restored (provided that enough spare capacity exists). Note that reservation of DCS ports for the alter- nate routes can be made either in the first or sec- ond phases in each of the DCS nodes involved, whereas cross-connections are made in the last phase.

Theviabilityof using the distributed control DCS self-healing mechanisms in intraLATA networks in terms of economics, operations, andreliabilitywas studied extensively by Bellcore in 1992, and study results have been summarized in [24]. This report verifies that the DCS self-healing network is eco- nomically attractive in areaswhere high demand and high connectivity are involved. Also, it is indicat-

64 IEEE Communications Magazine February 1995

Page 000005

Page 6: Emerging technologies for fiber network survivability ... · for fiber network survivability include Syn- chronous Optical Network (SONET), Asynchronous Transfer Mode (ATM), and passive

ed in [24,25] that currently proposed SONET dis- tributed DCS restoration systems may not be able to completely restore services within two sec- onds’ in large metropolitan LATA networks, as long as the present DCS system architecture (i.e., seri- al processing and serial cross-connection) and its switching hardware technology remain unchanged. The network restoration time here includes the distributed control restoration algorithm (protocol) execution time and the DCS cross-connect time for network reconfiguration, where the DCS cross-connection time may be a dominant factor of the total restoration time in metropolitan LEC networks [24-251. The slow cross-connection time of present DCS systems is primarily due to the inherent serial processinghoss-connect architec- ture and a slow cross-connection hardware sys- tem (e.g., about 100 ms-300 ms for each STS-1 path cross-connection).

To meet the two-second restoration objective, two basic requirements have been identified in [24, 251. The first requirement is to design a DCS self-healing algorithmwith a minimum set of restora- tion messages. The second requirement is to enhance the DCS performance by using a parallel CPU-based processing architecture with a parallel path cross- connection capability. Alternately, the two-sec- ond service restoration objective may be met by implementing priority service restoration. This restoration objective may also be relaxed based on hybrid network restoration architectures. These hybrid restoration architectures deploy fast restoration mechanisms ( A P S or rings) to meet spe- cific customer needs on top of DCS mesh net- works with distributed control that provide high survivability, enhanced protection against node fail- ures and the adequate restoration time for most other customers. Which approach should be used depends on the cost for these system enhance- ment and the revenue expected from services supported by the distributed control DCS net- work restoration system. Also, it is suggested in [24] that using the SONETSectionDCCchannelfor signaling will contribute several seconds to the restoration execution time just for its OS1 proto- col stack handling. Several alternatives for effi- cient signaling suggested in [24] include the use of the unassigned SONET overhead byte or out- of-band signaling such as DSO or DS1.

SONET Integrated Survivable Transport - Table 1 shows relative comparisons among the SONET APS/DP, SHR, and DCS self-healing networks.

The APS/DP and rings have the similar capability to restore services very quickly (i.e., within 50 ms). Their major difference is in the growth impact and costs. Rings have a greater concern for system exhaustion, since all ADMs on the ring need to be upgraded in that situation. Thus, it makes APS/DP systems more appropriate in areas where point-to-point demand is extremely high, while rings are appropriate for areas where the growth rate is stable and relatively slow. Compared with the SHR, the DCS self-healing network requires less protection capacity, but requires longer restora- tion time and more complex planning and opera- tions systems. The restoration time for the DCS self-healing network may range from seconds to min- utes, whereas the restoration time for the SHR is

Peripheral subnetwork Core subnetwork (star and/or ricg) ~ ~ (DCS mesh network)

JFigure 4. A GGgerjiber transport network model.

within 50 ms. The spare capacity savings for the DCS self-healing network are primarily due to the sharing of spare capacities across the entire network. This sophisticated system provides tremendous advantages when it functions properly, but may cause problemsin amuchwiderarea (comparedwith A P S and rings) when a software failure occurs. To avoid bringing the entire DCS network down due to software failures, sectionalization may need to be incorporated to improve the DCS network’s reli- ability.

The differences among survivable architec- tures, summarized in Table 1, have resulted in awell- accepted two-tier transport networkmodel, as shown in Fig. 4. This two-tier transport network is composed of acore sub-network and a peripheral sub-network. The demand, network connectivity, and the network growth are primary factors for the two-tier net- work partition. The core sub-network, which favors DCS self-healing and/or high-speed APS/DP architectures, is a network having high con- nectivity, carrying high demand and a high growth rate. The peripheral sub-network,whichfavors rings and/or low-speed APS/DP, is usually deployed in areas where connectivity, demand and the growth rate are low. Examples of the core and peripheral subnetworks in today’s fiber facility network are the hub-to-hub subnetwork (having a DCS mesh structure) and the CO-to-hub subnetwork (hav- ing either a starfiubbingstructurewith diverselypro- tected routes or a ring structure), respectively.

SONET Architecture lnterworking - As explained in the previous section, a networkmay use different types of survivable network architec- tures due to economics and demand distribution. Thus, how these different survivable network architectures interwork together becomes a cru- cial issue to ensure end-to-end service integrity during network failure conditions. The architecture intenvorking issues are currently under study in ANSI TlX1.2 [13]. The purpose of this study is to bet- ter understand the potential impact of ring inter- working on various architectures (e.g., ring-to-ring, ring-to-DCS mesh), network interfaces and appli- cations, and to provide recommendations on ring interconnection practices.

Figure 5 shows three ring interconnection

The 2-second restoration time is chosen as the ser- vice restoration objective for DCS distributed restoration [26], since all public switched voice and data services will be dropped when the outage lasts two or more seconds, and a Canier Group Alarm (CGA) will be gem erated. Once the CGA is generated, the switch will take about 10-20 seconds to restart the transmission system for accepting new calls.

IEEE Communications Magazine February 1995 65

Page 000006

Page 7: Emerging technologies for fiber network survivability ... · for fiber network survivability include Syn- chronous Optical Network (SONET), Asynchronous Transfer Mode (ATM), and passive

configurations defined in TlX1.2 [13]. Figure 5(a) shows an interworking configuration between two unidirectional path switched rings. In this configuration, the signal associated with inter- ring traffic is dropped at one serving node and continued onto.the second serving node using the drop and continue function. At both serving nodes, path selector functions choose independently the best of two incoming signals to drop into the next ring. Note that the path selectors can be set up to

\ E ’ = my PS

/

il ’ Ring #2

Ring #1 ,,

i7 Bridge disabled

\ )

m m ~

Path selector

(a) Path switched ring to path switched ring

Rinq I I Serviceselector I 1

(b) Line switched ring to line switched ring

i Service selector (J , Ring #1

1 Ring #2 Path selector

m

Bidirectional ring I I I (E) Path switched ring to line switched ring

I Figure 5 . Ring intenvorking configurations (TlX1.2 1131).

.-

select the same path signal or set up opposite of each other as a default.

Figure 5(b) shows aconfiguration and a proposed method for interconnecting two bidirectional line switched rings. Similar to interconnected path switchedrings, eachringusesaprimary serving node and a secondary serving node for interconnec- tion. The node at which the service would nor- mally exit the ring is designated as tkfe primary node and has an associated secondary node. This designation is made on a per service basis (e.g., STS-1). Theserviceexitingtheringisdroppedat the primary node and is also passed through the node (drop and continue) toward the secondary node. In the current proposed method, only primary nodes have service selectors that are required for inter- ring traffic entering or being added to the bidi- rectionalline switched ring. In the bidirectional ring, the service selector chooses between two copies of the service signal entering the ring at different points to determinewhichsignal should be permitted to continue around the ring. If the service selec- tor detects a signal failure on the primary signal, the service selector will “gang switch” to the appropriate signals coming from the secondary node. The secondary add signal is cross-connected toward the drop and continue (primary) node. Note that duplicate copies of the signal are dropped from the primary and secondary nodes of the ring. This allows interconnection between a unidirectionalpath switched ring and a bidirectional line switched ring, as shown in Fig. 5(c), without any changes to‘* - path switched ring requirements.

ATM Protection Layer Restoration schemes at the ATM layer are still in the research and development stage. However, both ITU-TandANSmlS1.5 haveinitiatedsome efforts to study ATM network protection issues. Since restoration systemscurrently deployedinLATAnet- works are performed at the SONET/SDH layer, it would be natural to ask why we need additional ATM layer protection systems. To understand the insight of this question, it is necessary to understand the difference between SONET/STM transport and SONET/ATM transport. One major difference between STM and ATM virtual path (VP) transport systems is in the path struc- ture. STM transport uses a path structure that tightly links the physical connection and its capac- ity through TDM frames and their physical inter- faces, while ATMIVP transport uses a logical path structure within which connections are linked to physical interfaces, but the connection capacity can be varied depending on applications. This path structure may simplify ATM/VP design and consequently increase linkutilization, when com- pared with STM transport.

At the ATM layer, ATM cells can be trans- ported and cross-connected either at the virtual chan- nel (VC) layer or the VP layer, depending on applications, traffic patterns and the network size. As far as survivability is concerned, VP restora- tion is simpler and faster than VC restoration and has been a focus of ATM restoration systems cur- rently proposed in the telecommunications indus- try [2]. Thus, the following discussions will primarily focus on VP restoration. The concept of VC restoration is similar to that for VP restoration.

Unlike STM transport, for which the capacity

..

IEEE Communications Magazine February 1995 L Page 000007

Page 8: Emerging technologies for fiber network survivability ... · for fiber network survivability include Syn- chronous Optical Network (SONET), Asynchronous Transfer Mode (ATM), and passive

assignment is tied into the routing assignment, an ATM VP route is established by setting the rout- ing table at VP connection points between VP connection ends, and VP capacity is not explicitly assigned at the VP connection points at VP estab- lishment due to itslogical pathstructure. The capac- ity assignment of ATM VP transport is handled by separate management procedures, such as call admission control and usage monitoring, which are carried out at ingress VP connection end-points. Thus, intermediate VP connection points on the VP route perform no processing for VP capacity management, and so are not affected by changes in the VP capacity allocation. The independence between the route assignment and the capacity allocation makes some ATM layer protection schemes more efficient and flexible than their STM counterparts.

Protection Switching - Protection switching at the ATM layer is an issue currently under study in ITU-T Study Group 13 and ANSI TlS1.5. The open technical issues associated with ATM layer protection switching include:

Protection switching communication mechanisms (OAM cell, or ATM connections using AAL-5). Method of specifying a protection route (fragment or end-to-end). Undirectional or bidirectional protection switching for point-to-point and point-to-mul- tipoint systems (e.g., multicast video). l:N, 1:l and 1+1 protection switching. Inter-layer management for protection switch- ing triggering (SONET to ATM layer, includ- ing the protection control message exchange protocol and its protection scheme). “Hitless” protection switching system imple- mentation and analysis. Besides the technical issues listed above,

application feasibility issues will have to be addressed before any practical ATM protection switching system can be realized. These applica- tion feasibility issues include: how ATM protec- tion switching is different from today’s SONET APS; and how ATM protection switching can best interwork with SONET APS. These two issues are equivalent to identifying appropriate applica- tion areasfor both SONET/APS and ATM protection switching.

The OAM cell2 has been suggested by some of ITU-T’s contributions as a way to convey signal- ing messages for protection switching. However, it is also possible to use user cells with AAL Type-5 to carry signaling messages for protection switching. &Type-5 is recommended by ITU-T as aformat to carry BISDNsignalingmessages. Whether OAM cells or User AALType-5 cells should be used for protection switching remains to. be deter- mined, and may depend on the definition of “fragmentation” for protection switching, the band- width, and delay requirements. As suggested, ATM protection switching could be performed on a fragment or end-to-end basis. The definition of “fragment” for protection switching is under study in ITU-T SG13. There are three possible “frag- mentation” definitions proposed in [49]. The first definition, called “OAM” definition, is to use the same definition as that for ATM performance or fault management where the end points of the segment generate and terminate OAM cells. The

1 1 Protection switching unit VP LineNP

1 Protection switching cell OAMIAAL-5 AAL-5

Spare capacity needed Moderate Most

I Engineering complexity Moderate Least

ATM node failure protection Possible No t Network design flexibility Less Less

~ -___-

I __ ---

VP

AAL 5

Less

Most I

- ----- -

--+

Possible

Most ’

OAM segment may include one or more VP links, where a VP link is a logical link between two adjacent VP cross-connect systems (VPXs) or VP ADMs. The second definition, called “line” definition, for protection switching fragmenta- tion, is the same as those used by SONET APS, where a fragment is defined as a VP link, if the VP layer is used as protection switching. In this case, AAL Type-5 may be a reasonable choice, since the end points of the fragment may not be an OAM segment, making it impossible for them to generate OAM cells for triggering protection switching. The last defi- nition, called “general” definition, is to have a protection switching fragment use any arbitrary por- tion of the end-to-end connection for protection. Tradeoffs among these three possible definitions are summarized in Table 2 [49].

Although the signaling formats and protocols for protection switching at the ATM layer are still under discussion in the standards group, several hitless switching protocols have been proposed for in- service maintenance and protection switching in ATM VP-based transport networks [27,28,47, 49). For facility maintenance, a VP must be moved from the original route to an alternate route without interrupting the cell stream on the original route. After maintenance is complete, the VP is switched back to the original route without service interruption. For VP protection switching, when the network component fails, the working VP is rerouted to the alternate route, and this VP will be switched back when the failed component is repaired. The revertive mode of protection switching allows the network to best utilize its resources as designed in the capacity provisioning phase.

The key factor that makes VP hitless switching possible is synchronization between the original route and the alternate route. The cell sequence integri- ty across VCs within a VP is also required for hit- less path switching. In ATM networks, the synchronization signals can be inserted to replace the unassigned cells. Several synchronization methods for hitless path switching are proposed in [27, 28,471. Among synchronization alterna- tives, snap-shot synchronization may be the simplest one, although it requires buffers to adjust the dif- ference of delays between the original and alter- nate routes if the original route is longer than the alternate route.

Note that if a VP link is a SONET link (i.e., no SONET equipment exists between two end points of the VP link), the switching control mechanism can use the existing SONET/SDH K1/K2 protocol [28,47] to perform the protection

Note that if OAM cells are used to c a q thepro- tection switching message, two @pes of OAM cell for- mats are needed. One is associated with fault man- agement’s OAM cells designed for “hard” fail- ures, and the other is associated with perf&- mance management’s OAM cells for “soft” fail- ures. This is because pro- tection switching should be designed to recover the network from either “hard” failures (e.g., cable cuts) or ‘Soft” failures (e.g., poor BER).

IEEE Communications Magazine February 1995 67

Page 000008

Page 9: Emerging technologies for fiber network survivability ... · for fiber network survivability include Syn- chronous Optical Network (SONET), Asynchronous Transfer Mode (ATM), and passive

- The ATM W X - based network architecture could potentially meet the two-second service restoration objective.

switching function. Several tradeoffs between SONET/SDH and ATM VP protection switching control mechanisms for ATM VP transport networks have been discussed in [49], and this is still an open issue requiring further study.

ATM Self-Healing Rings - SONET self-heal- ing rings described earlier use STM technology for time slot allocation, and these time slots are dedicated to each node. As mentioned earlier, SONET rings are primarily designed to provide very fast (less than 50 ms) and cost-effective pro- tection for private lines andvoice services. However, when high-speed broadband data services and LAN interconnection services are gradually intro- duced into the network, STM ring transport starts to show its inability to handle these burst types of traffic efficiently. This is primarily caused by the STM transport’s hierarchical, physical path struc- ture and its lower degree of flexibility in manag- ing the bandwidth granularity. To alleviate this inefficient use of bandwidth for burst-type broad- band services, bandwidth management schemes based on the ATM VC [29] and the VP layer [30, 311 have been proposed for working traffic band- width management. Although the bandwidth management schemes proposed above can be theoretically applied to both unidirectional and bidi- rectional rings, bidirectional rings may be pre- ferred in terms of the minimum bandwidth allocation requirement due to a natural match between the inherent point-to-point VP charac- teristics and the point-to-point routing principle of bidirectional rings [4,48].

Protection of ATM rings can be implemented at the SONET or ATM layer. SONET layer pro- tection may use the SONET path layer for the unidirectional self-healing ring or the line layer for bidirectional self-healing rings, which is con- sistent with existing SONET standards defined in TlX1.5 and Bellcore requirements [10,11]. In the SONET path protection layer, either S T S - ~ C , STS-12c or STS-48c protection may be possible, where STS-3c protection is primarily proposed for network evolution from existing SONET self- healingrings to ATM VP self-healing rings. Current Bellcoregenericrequirementworkon ATMVPrings using SONET layer protection focuses on bidi- rectional self-healing ring architectures because they require less spare capacities than their unidirectional counterpart [48].

If the VP layer is used for unidirectional ATM VP ring protection, the same self-healing proto- col as defined in the SONETpath-switchedself-heal- ing ring [lo] may be applied, except that the path selection is triggered by the VP-AIS (alarm indi- cation signal), rather than the STS (or VT) A I S . Com- pared with SONET layer protection, VP layer protection may be more flexible and simpler. For example, assume that there are 20 STS-1s required for a node pair, it would require 20 STS-1 path splitters and selectors at each end node of that node pair for the SONET/STM path switched ring, but it would only need a VP splitter and selector for the VP at each end node of that node pair. However, the VP self-healing protocol needs to be standardized for the multi-vendor environment. Whether the SONET or VP layer shouldbe used as the protectionlayerforATMrings remains to be determined.

ATM Self-Healing Mesh Networks -As described earlier, the distributed SONETsurvivable mesh net- work architecture is considered as part of an inte- grated survivable transport network architecture. However, its inability of meeting a two-second service restoration objective in metropolitan LATA networks may make it impractical to support ser- vicesrequiringveryfastrestoration. This slowrestora- tion time is due to its slow cross-conbect time that functions as adominant factor of the total restora- tion time. The slow cross-connection time of present DCS systems is primarily due to the inherent seri- al processing/cross-connect architecture and a slow cross-connection hardware system (e.g., about 100ms-300ms foreachSTS-1 pathcross-con- nection) .

ATM VP is a proposed concept that may sig- nificantly reduce the cross-connection time for network reconfiguration for distributed control mesh- type restoration systems due to its logical routing scheme on the self-routing switching fabric and its inherent parallel switching (cross-connection) capability. Independence between the alternate route selection and the capacity assignment for ATM VP networks may help simplify the design of the self- healing protocol, which makes the one-phase restora- tion protocol possible [27], compared with the three-phase restoration protocol used in SONET DCS distributed control networks. However, this one-phase ATM VP self-healing protocol may not provide the same reliability as its SONET DCS self-healing counterpart, unless the restora- *. 7

tion message of the ATM one-phase protocol performed by ATM VP cross-connect systems (VPXs) is protected from transmission errors. The penalty for introducing link-by-link retrans- mission for restoration message protection is measured as approximately several ms per link [32], which may be insignificant compared with the total networkrestoration time. Also, the signaling channel using user information AAL-5 cells for restoration message exchange proposed in [32] has a much higher bandwidth for restoration message exchange, and more signaling cells can be generated within a time cycle of 125 ps than its SONET/STM counterpart. Furthermore, unlike the SONET DCS that can only support path cross- connection with a single bit rate (e.g., STS-l), the ATM VPX may cross-connect VPs with any band- width. This feature may make control and man- agement of the ATM VPlayerrestorationeasier and faster than in STM-based networks without penal- izing bandwidth utilization for normal conditions. Thus, the ATM VPX-based network architecture is a potential candidate architecture that may meet the two-second service restoration objec- tive. Interested readers may refer to [2,27,50, 511 for detailsofsome ATM self-healing algorithms.

Optical Layer Protection Passive optical technology has been suggested as practical in reducing survivable fiber network costs [33]. The reason that passive optical tech- nology is attractive as a network survivability option is a natural match between two major fast net- work protection requirements (i.e., minimum or no processing, and high capacity transport) and the basic characteristics of passive optical tech- nology. Passive optical components of interest to network survivability include optical switching

68 IEEE Communications Magazine Februaty 1995

Page 000009

Page 10: Emerging technologies for fiber network survivability ... · for fiber network survivability include Syn- chronous Optical Network (SONET), Asynchronous Transfer Mode (ATM), and passive

Diverse protection fiber routp

____-- I w,;Tk,g H OPM

OPM Working

OLTM

Splitter -~ ~~

Working r TX __ -~ OLTM

RX .-qo - 04

f IPSC IPSC

** The switching decision made by POWC based TX = transmitter, RX = receiver on information from PSC or a separate power loss detection control system t----) Afiber pair

Protection control link

7

> 0 n

~

1

Figure 6. An example of 1:l optical diverseprotection with N=3.

OPM = Optical protection module OPSC = Optical protection switching controller PSC = 1 N APS controller IPSC = Integrated protection switching controller

systems, wavelength division multiplexers, and opti- cal amplifiers. The network using passive optical technology as the protection mechanism is some- times referred to as apassiveprotectednetwork [33].

Passive Protected APS - The automatic pro- tection switching function of the diversely pro- tected (DP) network architecture protects the network from fiber cable cuts, which is controlled by an automatic protection switching system (APS). In practice, point-to-point fiber systems with greater than the Gbiscapacity usuallyrequire 1:l protection that may become very expensive, since it requires not only duplicate fiber facilities, but also terminating electronics equipment. For intraLATA networks, the equipment cost is the dominant factor of total fiber transport costs. To reduce the protection cost, while retaining high survivability for cable cuts like 1:1/DP, a cost-effective 1:l optical diverse protection (1:1/ODP) architecture was proposed in [34]. This architecture uses optical switch- es for 1:l fiber cable protection and maintains 1:N electronic protection using a 1:N APS sys- tem. Figure 6 depicts an example of 1:1/ODP with N=3. In Fig. 6, the 1:3 A P S system protects three working terminals, and three diverse protection lines connected at the optical protectionmodules (OPMs). Each OPM includes a 50/50 power splitter (PS) on the transmit side and a 1 x 2 optical switch on the receive side. The PS splits an optical signal into both working and protection systems; the 1 x 2 optical switch, acting as a selector, switches demand from failed fibers to corresponding diverse protection fibers, when a cable containing workingfiberpairsiscut. Assume that there are four 2.4 Gb/s 1:1/DP systems needed in the considered

fiber span. The use of 1:1/ODP may reduce the protection cost of the conventional 1:1/DP system by up to 70 percent [34], although the 1:1/ODP system may be less survivable than the 1:1/DP systemwhen two or more electroniccomponents fail simultaneously. This type of passive protected APS systems is commercially available and is being deployed in some public carriers.

Passive Protected Self-Healing Rings - As described earlier, the SONET self-healing ring is viewed as a cost-effective survivable network architecture, and some ring architectures have been deployed in LEC networks. Among SONET self- healing ring alternatives, the four-fiber bidirectional self-healing ring (BSHR/4) has the largest avail- able capacity and the highest reliability, and canwork with today’s operations system with minimum changes, compared with other self-healing ring alter- natives. The BSHR/4 is made up of one working ring with two fibers and one protection ring with another two standby fibers. However, the conven- tional BSHR/4 implementation requiring duplicated equipment (i.e., ADMs) in each node makes it relatively expensive compared with other SONET ring architectures. Like the 1:1/ODP concept, the cost of this ring protection can be significantly reduced by using passive optical technology, while pre- serving the capacity and reliability advantages of the BSHW4. An example of such an architecture, called Passive Protected SONET BSHR/4 architecture (BSHR4/PPR), has been reported in [35].

Figure 7 depicts a generic BSHR4/PPR archi- tecture for aring network of seven nodes and its oper- ations for asingle link failure scenario. ABSHR4PPR is composed of two parts: a SONET ring for bidi-

- The four-fiber bidirectional self healing ring has the largest available capacity and the highest reliability, and can work with today’s operating system with minimum changes.

IEEE Communications Magazine February 1995 69

Page 000010

Page 11: Emerging technologies for fiber network survivability ... · for fiber network survivability include Syn- chronous Optical Network (SONET), Asynchronous Transfer Mode (ATM), and passive

- A desirable cha ra cteristic of optical amplifiers used in the BSHR4lPPR is that they should be able to accept a large varia- tion of input power and provide a near constant output powers.

rectional working signals, and a totally passive protection ring for bidirectional protection sig- nals. One SONET ADM is required for each working ring node to carry bidirectional traffic. The protection ring is composed of optical switch- es, aswellasopticalamplifiersifthe ringsizeislarge. The passive protection ring is essentially an opti- cal add-drop protection ring, where optical switches at the two ends of the failed facility act as optical “add-drop” components, and optical switch- es at intermediate ring nodes act as optical “pass- through” components. The optical signal add-drop iscontrolled by SONETADMson theworking ring. The high-speed loopback function is performed through 1 x 2 and 2 x 2optical switches. Optical protection switches eliminate the need for dupli- cated ADMs. One or more optical amplifiers, which are optional components of the BSHR4/PPR, may be needed for optical signal amplification if the protection ring is large. Although the optical amplifier(s) is placed in the ring topology, it does not form an optical signal amplification ring (loop), since the optical signal carried on the protection ring is added and dropped at two different optical switches. A desirable characteristic of optical ampli- fiers used in the BSHR4/PPR is that they should be able to accept a large variation of input power (from different ring nodes) and they should pro- vide near constant output powers (to simplify the receiver design). Compared with a typical seven- node OC-48 (2.4 Gb/s) ring 150 miles long using the conventional implementation (i.e., using a 1 + 1 ADM in each ring node), the BSHR4PPR may reduce the protection cost by approximately 76 percent [35]. However, theBSHR4/PPR,whichuses 1:N protection for electronic components, may be less survivable than the conventional BSHR4 in a scenario involving simultaneous failures of multiple electronic components.

The passive protected self-healing ring archi- tecture can be implemented from a traditional bidirectional four-fiber self-healing ring or upgraded from the bidirectional two-fiber self-heal- ing ring by doubling its capacity with a much lower cost penalty. The capacity constraint of this passive protected ring is limited to the capacity of the working ring; thus, it may still face the same engi- neering concerns when the capacity is exhausted. To alleviate this growth concern, the concept of “optical ADM” used in BSHR4/PPR can be implemented by using wavelength division multi- plexing (WDM) technology. Several examples of WDM self-healing rings have been proposed in [36-391. These WDM rings potentially could be imple- mented at high-demand growth areas; however, their cost and performance need to be improved signif- icantly before the technology can be considered a practical approach.

Passive Protected DCS Mesh Networks - According to earlier discussions, the distributed con- trol DCS network may not meet the two-second service objective in metropolitan LATA net- works, if present DCS system architecture and cross- connect technology remain unchanged. It has also been suggested that the parallel DCS pro- cessing, parallel cross-connect architecture and/or ultra-fast cross-connect technology (i.e., less than 10 ms), with a minimum number of restoration mes- sages being processed, may be needed to meet

I

H Figure 7 . An ooperation ofpassiveprotected ring architecture (BSHR4IPPR) for single link failure (Note: only one direction is shown in the figure).

this two-second service restoration objective [25]. Of course, this implies that a significant development effort in upgrading present DCS systems is needed. Also, it is expected that up to 30 percent more cost will be added to the existing DCSs and OLTMs due to the spare capacity needed for performing the self-healing function [43]. Combining these twoconcerns, itwould make SONETDCS distributed. restoration less attractive for areas that require two- second restoration and cost-effective protection.

The optical network reconfiguration tech- nique may provide a cost-effective alternative in reducing both the network restoration time and net- work costs. This improvement is due to the use of a passive optical system as a protection system for link and nodefailureswhose system reconfiguration is performed in the all-optical domain and is con- trolled by electronic network components (e.g., SONETDCS). This passive protected network essen- tially uses the physical facility protection method, except that it does not duplicate electronic equip- ment, thus reducing equipment cost. One exam- ple of such a passive protected DCS mesh network architecture has been reported in [43]. This proposed passive protected DCS self-healing mesh network architecture is composed of two parts: an elec- tronicworking DCS network and apassive protected optical DCS network. The working DCS network may use existing asynchronous DCSs (e.g., DCS 3/3), near-term SONET DCSs (e.g., SONET B-DCSs), or future ATM VPXs for working channel rout- ing in normal conditions and to establish the restora- tion path when network components fail. The protection optical DCS network transports ser- vice signals in case of network failures. The keycom- ponent in the passive protection DCS network is a special optical cross-connect system (OCS) [43] at each node whose reconfiguration is controlled by the electronic DCS or ATM VPX at the same node. The objectives of this passive protected DCS network architecture are to use an inexpensive OCS to eliminate the need for 20-30 percent higher equipment costs (both OLTM and DCS) for protection, to simplify the restoration operations by using a single restoration path concept, as opposed to the conventional multiple restoration path

70 IEEE Communications Magazine February 1995

Page 000011

Page 12: Emerging technologies for fiber network survivability ... · for fiber network survivability include Syn- chronous Optical Network (SONET), Asynchronous Transfer Mode (ATM), and passive

simple (APShings) most- simple I i Protection protocol complexity moderate I moderate (DCS mesh)+ I

moderate I least

i Restoration time 1 t---- ~- ~~- ~ -- Spare capacity needed

fast (APShings) slow fast

moderate most*

(DCS mesh)

j Electronic equipment needed I less I more

1 Equipment availability I 1 Protection Targets

- 1 I less I

available sopn available now development stage

node and link node and link link only

~ Network management system5/OSs I developing 1 exist I none I ~ Reliability I good I good I need improvement I

* Dedicated protection fiber is needed ** Assume optical protection switching is controlled electrically +One-phase protocol for ATM layer protection, and one-phase (pre-planned) 3-phase protocol (dynamic

restoration) for SONET layer protection

W Table 3. Comparison of different layerprotection schemes.

approach, and to use fast optical switching technology to reduce time for protection signal cross-con- nects. This optical switching time may be in few milli- seconds for today’s electrically controlled mechanical optical switches, which is equivalent to the effect of the next generation switching fabric for the DCS (about 10 ms per STS path 124-251). This proposed passive protected architecture may workwith any SONETDCSor ATMVPXself-heal- ing protocol, as described previously. Details of the network architecture and analysis can be found in [43].

Another optical protected DCS self-healing architecture using WDM technology at the ATM VP layer has been proposed in [44]. This new archi- tecture uses a new optical path concept, called virtual wavelength path (VWP). The VWP scheme, which assigns wavelengths on a link-by-link basis, implements a concept similar to VP grouping for fast ATM network restoration [27] but with a much simpler control and provisioning process. This architecture allows the VWP concept to be implemented with commercially available optical technologies, and also allows for consolidating the layered transport architecture and optical technologies.

Comparison of Layered Protection Schemes Table 3 shows a relative and preliminary compar- ison among different layer protection schemes.

In general, the optical protection layer is still in a very early stage due to its premature technol- ogy and lack of network management and opera- tions systems support, although potentially it may restore services very quickly with a reason- able cost, compared with SONET and ATM layer protection. ATM layer protection would require less spare capacity than SONET layer protection at the expense of the slower restoration time and more complex control systems (one exception may be ATM VP self-healing networks versus SONET DCS self-healing networks). How to best use the combination of these three layer protec- tion schemes in the same network remains to be an open issue.

Standards and Requirements

Table 4 summarizes available standards and Bell- core requirements for survivable network archi- tectures at the SONET and ATM layers. As shown in Table 4, ANSI T1 standards for SONET APS and bidirectional rings have been completed. Requirements for the SONET undirectional path-switched ring architecture have been defined by Bellcore [lo], since it does not require stan- dards efforts. The SONET DCS distributed restoration scheme is still in an early research and development stage, and is not being consid- ered in current ANSI standards. SONET APS systems and self-healing rings of up to OC-48 (both unidirectional and bidirectional rings) have been deployed in LATA networks. For ATM layer protection, APS is currently under discussion in both ITU-TStudy Group 13 and ANSI TlS1.5, while the need for ATM self-healing ring protection is under discussion in a working group of TlS1.5. A Bellcore generic requirement document for ATM VP rings using SONET layer protection was released inDecember 1994[53]. Nostandardsactivityisunder way for the VP and/or VCseK-healing mesh schemes. No standards and Bellcore requirements exist for passive protected network architectures at the optical layer,

Although there are no standards or Bellcore requirements for passive protected networks, sev- eral Bellcore requirements exist for key components of these passive protected network architectures. For example, Bellcore TR-NWT-001073 (issued in January 1994) defines generic requirements for optical switches, and TR-TSY-000901 (issued in August 1989) defines generic requirements for WDM components.

Layer Interworking on SONETIATM Networks

o better understand how each layer may inter- T act with each other on SONET-based ATM networks, it would be helpful to explain an integrated network management and control system mode

- The optical network reconfigura- . tion tech- nique may provide a cost-effective altemative in reducing both the network restoration

time and .. . network costs.

IEEE Communications Magazine February 1995 71

Page 000012

Page 13: Emerging technologies for fiber network survivability ... · for fiber network survivability include Syn- chronous Optical Network (SONET), Asynchronous Transfer Mode (ATM), and passive

SONET 1 APS

T1 X1.5/95-001

ATM 1 APS

(Draft GSHR-I)

Study Group (1 5) D GR-1400-CORE 3/94 , D 4 I

C Study Group (1 5) D GR-1230-CORE 12/93 D I

Optical I Mesh __ --

I/C - D = Draft, C = Comolete

No Standards Available

Working Group D 16.0 D (TlS1.5)

Working Group D - - (TlS1.5)

FA-”-1353 12/92 R&D

R&D

GR-2837-CORE 12/94 R&D

No Standards and Requirements Available ~

No Standards and Requirements Available

R&D

R&D

1, T, R&D) - D = Deployed, T = Trial, R&D = Research & Development I W Table 4. Standards and Bellcore requirements for survivable network architectures.

as shown in Fig. 8. The model shown in Fig. 8 depicts an interworking scenario among ATM trans- port, control systems and a network management system. Network control systems here are net- work protection systems that may be implement- ed at the SONET layer and the ATM VP layer. The network protection systems at each layer are managed and triggered by the layer management system at each layer, which is then coordinated by the plane management system. The layer man- agement system includes fault management for the “hard” network failures and performance management for “soft” failures (e.g., perfor- mance degradation). The fault and performance management systems at each layer are used to trigger either protection switchingat the optical layer, SONETlayer, or ATM layer, or the re-routing scheme at the network layer that is service and applica- tion specific. The function of system (or plane) man- agement is to collect the failure information, interpret the failure messages, identify and isolate the fail- ure location(s), coordinate the timing of generat- ing next higher layer AIS messages, and take necessary actions to recovery failures.

Following is an example that shows the role of system management on network protection across layers. When a cable is cut, the SONET line ter- minating equipment receives LOS (loss of sig- nal). Here, there are two options: it starts to perform line protection switching (if any), or immediately generates the path AIS and sends it to the down- stream path terminating equipment. When the path terminating equipment receives the path AIS, it could initiate SONET path layer restoration (if any), or immediately generate the VP-AIS. Again, when the virtual path terminating equipment (VPT) receives the VP AIS, it could immediately trigger VP layer restoration and does not generate the next high- er layer AIS (i.e., VC-AIS) until it completelyrestores affected signals or a pre-determined time-out

period expires. Alternatively, it would immediate- lygenerate the VC-AIS and pass it to the equipment-. 7

terminating the network layer function (in this case, STP and SCP if the application is for signal- ing). At the network layer, the system could choose to initiate network re-routing (if any) or just do nothing. At the time this paper was writ- ten, there was no standard to guide the timing for generating the next higher level AIS messages from the SONET physical layer to the network layer. However, Bellcore requirements [45] and TlS1.5 agreements in response to a Bellcore contribu- tion have clarified that the VC-AIS is not sent until physical layer protection switching is given a chance to clear the problem. Note that this sce- nario is based on an assumption that SONET APS and SONET self-healing rings would be uni- versal protection systems for SONET/ATM net- works. In reality, SONET APS and SONET self-healing rings may not be applicable to DCS- based mesh networks. Therefore, the waiting period of 50 ms before generating ATM layered alarms would become an unnecessary provision for DCS-based mesh networks that typically carry a majority of demands in the core of LEC net- works. In ITU-T, the working group responsible for ATM protection switching agreed in the March 1994 meeting that the ATM layer’s AISs should be generated when needed without awaiting period of 50 ms. Thus, an alignment in this timing issue between ITU-T and TlSl is needed.

Ifno inter-layer coordination function exists (e.g., no control is applied to control timing for gener- ating the next higher layer AIS messages), the AIS will be passed through each layer after it is generated, triggering the protection switching or self-healing scheme at each layer (optical, SONET, ATM and the network layer) simultaneously. This may create a situation for network resource competition that then causes network congestion or

72 IEEE Communications Magazine February 1995

Page 000013

Page 14: Emerging technologies for fiber network survivability ... · for fiber network survivability include Syn- chronous Optical Network (SONET), Asynchronous Transfer Mode (ATM), and passive

* -

: Network protection schemes Transport network

I i I

SSCOP AAL CPCS +-+

SAR . E : E *+

Optical layer I APS, rings, mesh

Protection switching message protection schemes

Layer management includes fault management and performance management r I

Q ’ f LM% g! (ATM)

4--) : Control link I Sparecapacity I

vc VC re-routing ATM e VP +.+ APS, USHWBSHR, VPX mesh

USHR, DCS mesh

CPCS = Common part convergence sublayer SSCOP = Service specific connection

oriented protocol SAR = Segmentation and reassembly

: LM% Physical (SONET) :(SON ET)

Path

Link APS, BSHR Section

W Figure 8. An integrated network management and network protection model for SONETIATM networks.

assignment and

even network failures. Thus, some inter-layer coordination function is needed to ensure that either the network or ATM layer performance remains at the acceptable level.

Another open issue is how to build a cost- effective survivability scheme across layers (from the optical layer up to the network layer). This issue involves the identification of unnecessary layer protection that may depend on application requirements, the protection message processing and generating speed, the network size, traffic patterns, and the network budget. For example, in STM transport, transport overhead used to generate SONET layer protection switching is generated and transmitted every 125 ps, while ATM transport allows for many OAM cells being gen- erated and transmittedwithin a 125-ps time interval as long as the capacity is available. Unlike the STM transport’s OAM fixed capacity, the ATM layer OAM capacity can be assigned dynamically based on needs of the particular maintenance activity or procedure invoked. Thus, ATM transport would be able to convey necessary network protection switching messages faster than its STMcounterpart. In [42] it was suggested that ATM VP transport may provide a significant improvement over STM transport for failure detection speed in the range of bit error rate of 10-3 to 10-5 (e.g., it takes about two seconds and 1 ms to detect BER of l0-4or better for STM transport and ATM VP trans- port, respectively). This potentially allows for faster network response to “soft” failures by using ATM OAM mechanisms and to “hard” failures by using the SONET line or path AIS mechanism.

bandwidth management

Summary e have reviewed possible survivable net- w work architectures and technology for each

layer of the SONET/ATM transport network. These layers include the SONET (physical) layer, the ATM

- layer and a possible optical layer. Tradeoffs and open issues among different survivable architectures for each layer and across different layers have also been discussed. Survivability mechanisms at the ATM layer and a multi-layered system between survivability mechanisms across different layers are still in an early research and development stage. Thus, it is hopeful that the information provided here will help stimulate research, devel- opment and standards activities in defining a cost-effective multi-layered survivable SONETIATM transport network.

Acknowledgments The authorwould like to thankHaim Kobrinski, Joe Sosnosky and Joe E. Berthold for their valuable com- ments on the draft, and Carol Adams for prepar- ing some figures for this paper.

References [ l I R. L. Pickholtz (Ed.), ”Special issue for Surviving Disaster,“ /E€€

[21 T-H. Wu. et. al.. (Eds.). “Integrity o f Public Telecommunications

[31 “Draft Proposed Technical Report on Network Survivability Perfor-

[4lT-H. Wu,FiberNetworkServiceSurvivability,(ArtechHouse, May1992). [SI R. Ballart and Y-C. Ching, ”SONET: Now It’s the Standard Optical

Network,” /€E Commun. Mag., vol. 27, no. 3, March 1989, pp. 8-1 5. I61 T-H. W u and M. Burrowes. “Feasibility Study o f a High-speed

SONET Self-Healing Ring Architecture in Future Interoffice Fiber Networks,“ /€€E Commun. Mag., vol. 28, no. 11. Nov. 1990, pp. 33-42.

[71 Draft proposed American National Standard SONET Automatic Pro- tection Switching contained in ANSI TlXl.5/93-057.

[81 Bellcore Technical Adversory, TA-NW-000253, Synchronous Optical Networks (SONET) Fiber Optic Transmission Systems Require- ments and Objectives, issue 6, Sep. 1990.

191 T-H. Wu and R. C. Lau, “A Class of Self-Healing Ring Architectures for SONET Network Applications,” IEEE GLOBECOM ’90, Dec. 1990, San Diego, CA, pp. 403.2.1-403.2.8.

[ l o ] Bellcore Generic Requirements, GR-1400-CORE, SONET Dual-Fed Unidirectional, Path Switched Ring (UPSR) Equipment Generic Criteria, Bellcore, March 1994.

[111 “SONET Bidirectional Line Switched Rings Standard Working Document,” TlX1.5/92-004, Feb. 3, 1992.

[12lCOMXV-D.514(USContributionto ITU-TSSStudyGroup 1 5), ”Updat- ed Proposal for Bidirectional Multiplex Section Switched Self- Healing Rings Based on the SDH,“ Sep. 1993.

Commun. Mag., vol 28, no. 6 . June 1990.

Networks,“ /E€€ JSAC, Jan. 1994.

mance,”T1A1.2/93-015R1, March 1, 1993.

- The layer management system includes fault man- agement for the %hard” network failures and perjormance management for “soft”

failures. 1. .

IEEE Communications Magazine February 1995 73

Page 000014

Page 15: Emerging technologies for fiber network survivability ... · for fiber network survivability include Syn- chronous Optical Network (SONET), Asynchronous Transfer Mode (ATM), and passive

- Suwiva bility mechanisms at the ATM layer and a multi-layered system between suwiva bility mechanisms across different layers are still in an early research and development stage.

[131 "T1 Technical Report on SONET Ring lnterworking - Baseline DOC- ument." TlXl.2/93-006Rl, Aug. 2, 1993.

[141 D. Doherty, W. Hutcheson. and K. Raychaudhuri," High Capacity Digital Network Management and Control," Proc. /€E€ GLOBE- COM '90, San Diego, CA, Dec. 1990, pp. 301.3.1-301.3.5.

I151 J Yamada, and A. Inoue, "Intelligent Path Assignment Control for Network Survivability and Fairness," Proc. /€€E ICC '91, Denver, CO, June 1991, pp. 22.3.1-22.3.5.

1161 W. D. Grover, et. al., "Development and Performance Assessment of a Distributed Asynchronous Protocol for Real-Time Network Restora- tion,"IEEEJSAC,vol. 9, no. 1, Jan. 1991, pp. 112.125.

I171 C. H.Yang, andS. Hasegawa, "F1TNESS:AFailureImmunizationTech- nology for Networkservice Survivability,"Proc. l€€€GLOBECOM '88, Ft. Lauderdale. FL, Dec. 1988, pp. 1549-1 554.

1181 B. A. Coan, M. P. Vecchi, and L. T. Wu. "A Distributed Protocol to Improve the Survivability of Trunk Networks," Proc. XI11 Interna- tional Switching Symposium, May 1990, pp. 173-1 79.

I191 H. Komine, et. al., "A Distributed Restoration Algorithm for Multi- Link and Node Failures of Transport Networks," Proc. /€€€GLOBE- COM'90, San Diego, CA, Dec. 1990, pp.403.4.1-403.4.5.

I201 H. Sakauchi, et. al., "A Self-Healing Network wi th an Economical Spare-Channel Assignment," Proc. IEEE GLOBECOM '90. San Diego, CA, Dec. 1990, pp. 403.1.1 -403.1.6.

[211 H . Fujii, T. Hara. and N. Yoshikai, "Characteristics o f Double Search Self-Healing Algorithm for SDH Networks," IEICE CS91-48, 1991.

[221 J. D. Bicknell. C. E. Chow, and S . Syed, "Performance Analysis of Fast Distr ibuted Network restoration Algorithms," Proc. IEEE GLOBECOM '93, Houston, TX, Dec. 1993.

[231 National Communications System (NCS) TIB 92-14, Level II Report- ed byAT&T. CDRL007, "Network management of Stressed Intelligent Networks," Sep. 1992.

[241 Bellcore Special Report, "Digital Cross-Connect Systems in Trans- port Network Survivability," SR-NW-002514, Issue 1, Jan. 1993.

[251 T-H. Wu, et. al.. "The Impact of SONET DCS System Architecture on Distributed Restoration," IEEEJSAC, Jan. 1994, pp. 79-87.

[261 J. Sosnosky, "Service Applicationsfor SONETDCS Distributed Restora- tion," IEEEJSAC, Jan. 1994, pp. 59-68.

[271 R. Kawamura, K. Sato, and I. Tokizawa. "High-speed Self-Healing Techniques Utilizing Virtual Paths," 5th International Network Planning Symposium, Kobe, Japan, May 1992.

[281 K.Yamaguchi,et. al.. "ATMTransport SystemsBasedon Flexible, Non- Stop Architecture,"Proc. I€E€GLOB€COM, Nov. 1993, pp. 1468-1 475.

[291 Y. Maeda. K. Kikuchi, and N. Tokura. "ATM Access Network Archi- tecture," Proc. IEEE ICC '97, Denver, CO, June 1991.

[30lT-H. Wu, D. Kong,and R. C. Lau,"ABroadbandVirtual PathSONEVATM Self-Healing Ring Architecture and its Economic Feasibility Study," Proc. /E€€ GLOBECOM, Dec. 1992.

[311Y. Kajiyama,N.Tokura.andK. Kikuchi,"ATMSelf-HealingRing,"Proc. IEEE GLOBECOM. Dec. 1992

[321 N. Yoshikai and T-H. Wu. "Control Protocol and Its Performance Analysis for Distributed ATM Virtual Path Self-Healing Networks." IEEEJSAC, Aug. 1994, pp. 1020-1030.

L331 T-H. Wu. "Rolesfor Optical Components in Survivable Fiber Networks." Digest o f Optical Commun. Conf. (OFC '92). CA, Feb. 1992, pp. ThLl.

[341 T-H. Wu, and S . Habiby, "Strategies and Technologies for Plan- ning a Cost Effective Survivable Fiber Network Architecture Using Optical Switches," / € € € I . of Lightwave Techno/., vol. 8, no. 2. Feb. 1990, pp 152-1 59.

[351 T-H. Wu, and W. Way, "An Enhanced Novel Passive Protected SONET Self-Healing RingArchitecture."l€EE 1. ofLightwave Techno/. , vol. 10, no. 9, Sep. 1992, pp. 1314-1322.

[361 T-H. Wu, D. 1. Kolar, and R. H. Cardwell, "High-speed Self-Healing Ring Architecturesfor Future Interoffice Networks," IEEE GLOBECOM '89, Nov. 1989, pp.23.1.1-23.1.7.

I371 S. Wagner, and T. E. Chapuran, "Multiwavelength-Ring Networks for Switch Consolidation and Interconnection," Proc. I€€€ ICC '92, Chicago, June 1992.

138) K. T. Koal, "Integrated Video and Information Transport into Sur- vivable Interoffice Networks," Proc. /€€€ ICC '94, 1994.

I391 A. F. Elrefale, "Self-Healing WDM Ring Networks wi th All-Optical Protection Path," Digest o f Optical Commun. Conf. (OFC '92). CA, Feb. 1992, pp. ThL3.

[40] K. Sato. S . Ohta, and I. Tokizawa. "Broadband ATM Network Architecture based o n Virtual Paths," / €€E Trans. o n Commun., vol. 38, no.8.Aug. 1990, pp. 1212-1222.

[411 K. Sato, H. Ueda. and N. Yoshikai, "The Role of Virtyal Path Cross- connection,"l€E€Mag. ofLightwaveTelecom. Sys.,vol. 2, no. 3,Aug.

[42 ] J. Anderson eta/ . . "Fast Restoration of ATM Networks," I € € € JSAC, Jan. 1994. pp 128-1 38.

[431 T-H. Wu. "A Passive Protected Self-Healing Mesh Network Architecture and Applications." /E€€ Trans. o n Networking, Feb. 1994, pp. 40- 52.

[441 K. Sato, S . Okamoto, and H. Hadama, "Network Performance and lntegritywith Optical Path LayerTechnologies."l€E€J5AC. Jan. 1994, PF. 159-170.

[45] Bellcore Generic Requirements, "Generic Requirement for Operations of Broadband Switching Systems." GR-1248-CORE, Aug. 1994

[461 CCl l l Recommendation 1.31 1, "6-ISDN General Network Aspects," Temporary Document 5G (XVIII). Jan. 1993.

[47] H. Ohta and H. Ueda, "Hitless Line Protection Switching Method for ATM Networks," Proceedings o f ICC '93, May 1993, pp. 272- 276.

[481 J. Sosnosky. "Potential Network Applications for Virtual Path SONET ATM Rings," Proc. National Fiber-optic Engineers Confer- ence (NFOEC), vol. 3, June 1994, pp. 375-387.

1491 Y. Fujita. T-H. Wu, and H. Fowler, "ATM Protection Switching Sys- tems and Applications."Proc. Int'l5witchingSymposium, April 1995.

1501T. Van Landegem, P. Vankwikelberge, and H. Vanderstraeten, "ASelf- Healing ATM Network Based on Multilink Principles," IEEE JSAC, Jan. 1994, pp. 139-148.

1511 M. M. Slominski and H. Okazaki. "Guided Restoration of ATM Cross-Connect Networks," Proc. ICC, New Orleans, May 1994, pp. 466-470.

[521 C-H. E Chow et al., "A Fast Distributed Network Restoration Algorithm," Proc 12th ln t ' l Phoenix Conf. o n Computers a n d Commun., March 1993

[531 Bellcore Generic Requirements, "ATM Virtual Path Functionality in SONET Rings-GenericCriteria,"GR-2837-CORE. issuel. Dec 1994..

1991, pp. 44-54.

. Biography TSONG-HO Wu received a B S . in mathematics from the National Taiwan University in 1976, and M.S. and Ph.D. degrees in operations research f rom the State University o f New York at Stony Brook in 1981 and 1983, respectively He has been with the Networkcontrol Research Depart- ment at Bellcore. Red Bank, New Jersey, since 1986. where he i s responsible for broad band fi ber network design. survivable network archi- tectures, emerging technology applications for SONET and ATM virtual path-based networks, ATM-based control and signaling transport for Video Dial Tone services, and PCS mobility management. From 1983 to 1986 he was with United Telecommunications, Inc. (now Sprint) in i ts data communications division as a senior research scientist, where hewas responsible for project managementand research for planning and design- ing a new advanced nationwide packet-switched data network. From 1978 t o 1979 he taught at the Department of Mathematics o f the National Taiwan University. His current research interests include broadband ATM/SONET transport and control network architectures and their applications t o signaling for broadband video services and PCS mobility management

74 IEEE Communications Magazine February 1995

~ __ .- __ - _ _

Page 000015


Recommended