Beruflich Dokumente
Kultur Dokumente
Suggested readers:
PNOs studying potential upgrade possibilities for their SDH networks
System engineers and network planners
Experts on standard bodies of ITU-T SG13 (Q 19), SG15 (Q 16, 17, 20) and
ETSI TM-1WG2/WG3
Researchers engaged in the field of optical transmission networks and
technologies
May 1999
EURESCOM PARTICIPANTS in Project P709 are:
Finnet Group
Swisscom AG
Deutsche Telekom AG
France Tlcom
MATV Hungarian Telecommunications Company
TELECOM ITALIA S.p.a.
Portugal Telecom S.A.
Telefonica S.A.
Sonera Ltd.
Preface
(Prepared by the EURESCOM Permanent Staff)
The advances in optical fibre transmission technology over the past years have kept
pace with the demand for increased bandwidth. In particular the introduction of the
WDM technology enables Telecom Operators to upgrade the capacity of their
networks by an order of magnitude. The evolution of photonics makes the
development of optical switching and routing structures in the core and metropolitan
part of the transport network possible.
As a consequence, the development of an optical network infrastructure will enable
the flexible, reliable and transparent provision of transport services for any type of
traditional and innovative services and applications. Taking into consideration the
current trends, the objective of network planning is to find the best possible balance
between network implementation cost, network flexibility, network availability and
survivability, subject to service requirements and topological constraints.
The aim of the P709 EURESCOM Project is to investigate a number of alternative
strategies for the planning of the optical transport network - with massive deployment
of WDM, OADM, and small size OXC- that will be used in a middle term future.
This is the second Deliverable (D2) of P709. D2 summarises the most important
factors that have to be taken into account when preparing the planning of optical
networks. Restoration and protection techniques implemented in optical networks are
assessed in terms of requirements, constraints on network planning and upgrading, as
well as their interaction with client layer functionalities. A study of resource allocation
and impact on network planning and upgrading is also presented.
We should remind the reader that the first P709 Deliverable (D1) provided an
overview over network architectures, which potentially may be used in the future and
D3 will give an analysis of the existing network planning methods, plus guidelines for
planning future optical networks.
The present Deliverable (D2) is a very useful study for Optical Network planners &
system engineers, and experts on Standard Bodies of ITU-T SG15 and ETSI TM1
(WG2 & WG3).
Table of Contents
Preface............................................................................................................................. i
Table of Contents ..........................................................................................................iii
Abbreviations ................................................................................................................. v
1 Introduction ............................................................................................................ 1
2 Overview of SDH architectures.............................................................................. 2
2.1 What is a network architecture? ................................................................... 2
2.2 SDH network layers ..................................................................................... 4
2.3 Classes of SDH network architectures ......................................................... 4
2.4 Trail protection............................................................................................. 5
2.4.1 Linear VC trail protection ............................................................... 5
2.4.2 Linear Multiplex Section protection................................................ 5
2.4.3 MS Dedicated Protection Rings ...................................................... 5
2.4.4 MS Shared Protection Rings ........................................................... 6
2.5 Subnetwork connection protection............................................................... 7
2.5.1 General characteristics of SNC protection ...................................... 7
2.5.2 SNC protection with inherent or non-intrusive monitoring ............ 8
3 Overview of optical architectures......................................................................... 10
3.1 What is an optical network architecture? ................................................... 10
3.2 Classes of architectures .............................................................................. 10
3.3 Capabilities and limitations of optical network architectures .................... 12
3.4 Architectures selected in P709 ................................................................... 12
3.5 Coloured Section Ring ............................................................................... 12
3.5.1 General .......................................................................................... 12
3.5.2 Description .................................................................................... 13
3.5.3 Protection ...................................................................................... 14
3.5.4 Functional model........................................................................... 15
3.5.5 Implementation.............................................................................. 15
3.5.6 Design rules................................................................................... 17
3.6 Optical Multiplex Section Shared Protection Ring .................................... 20
3.6.1 General .......................................................................................... 20
3.6.2 Description .................................................................................... 20
3.6.3 Functional model........................................................................... 21
3.6.4 Implementation.............................................................................. 22
3.6.5 Design rules................................................................................... 24
3.7 MWTN mesh.............................................................................................. 24
3.7.1 General .......................................................................................... 24
3.7.2 Description .................................................................................... 24
3.7.3 Functional model........................................................................... 25
3.7.4 Implementation.............................................................................. 26
3.7.5 Design rules................................................................................... 28
3.8 Conclusion ................................................................................................. 29
4 Dimensioning methods......................................................................................... 30
4.1 Dimensioning methods for multiple-ring OMS-SPRing or SDH
SPRing networks........................................................................................ 30
4.1.1 Types of suitable networks............................................................ 30
4.1.2 Routing problems in multiple-ring networks ................................ 31
Abbreviations
AIS Alarm Indication Signal
APS Automatic Protection Switching
DAt Dispersion Accommodation (in optical transmission section
layer)
DAc Dispersion Accommodation (in optical channel layer)
DCC Data Communication Channel
EMF various Equipment Management Functions
FFS For Further Study
LOS Loss Of Signal
MCF Message Communication Function
Mod Modulation/demodulation (O/E conversion)
OA&M Operation, Administration and Maintenance
OCH Optical CHannel section
OCH/Client_A Optical CHannel/Client Adaptation function
OCHOH Optical CHannel OverHead
OCH_T Optical CHannel Termination function
OM Optical Multiplexing
OMS Optical Multiplex Section
OMS/OCH_A Optical Multiplex Section/Optical CHannel Adaptation function
OMSOH Optical Multiplex Section OverHead
OMS_T Optical Multiplexer Section Termination function
opt. DCC Optical Data Communication Channel
OSC Optical Supervisory Channel
OTS Optical Transmission Section
OTSOH Optical Transmission Section OverHead
OTS/OMS_A Optical Transmission Section/Optical Multiplex Section
Adaptation function
OTS_T Optical Transmission Section Termination function
RDI Remote Defect Indication
SDH Synchronous Digital Hierarchy
TMN Telecommunication Management Network
WA Wavelength Assignment
WDM Wavelength Division Multiplex
1 Introduction
The scope of this Annex consists in proposing optical/electrical based architectures
and describing the management capabilities as well as dimensioning methods. Such
architectures correspond to the ones depicted in Deliverable 1.
The second chapter concerns an overview of SDH architectures. It describes different
SDH layers and their functionalities. Functional models are described according to
ITU-T recommendations namely G805 and G803. Different protections schemes are
given and compared.
An overview of optical architecture is presented in the third chapter. The concept of
optical architectures is given and classification methods as well. The optical network
layers are detailed and the architectures selected in Deliverable 1 of P709 are
developed. General information, functional models, proposed implementations as well
as design rules are given.
The dimensioning methods chapter provides a description of different architectures
mainly optical based ones as well as optical meshed networks. The dimensioning
problem is presented for each architecture under studies assumptions. Algorithms for
dimensioning MS-SPRing and OMS-SPRing based networks are presented and
theoretical references provided.
Concerning the meshed optical networks, the presentation focuses on node
dimensioning according to the assumptions described in Annexes A and B of this
Deliverable. Numerical results are also provided on the European network described
in Annex C of this Deliverable.
Thereafter, in addition to P615 project, a brief analysis of the management
possibilities of the optical layers in the conjunction with the client SDH electrical
layer is given. The informations management model used to control the optical layer
is described. Finally, the interactions between SDH layer capabilities and the optical
one are also described.
In the previous chapters, dimensioning optical networks is presented. As SDH is
client layer of the optical layer and according to the subject covered by this Annex,
such two layers should be dimensioned together. Dimensioning are different from the
ones used for the pure SDH networks or the pure optical networks. However, adapted
algorithms for dimensioning optical/electrical networks are presented. Finally
evaluated networks under given assumptions are presented.
Specific path
layer network
Specific path
layer network
Transmission media
layer network
T1304500-95/d06
the network. However, the topologies at other layers will be virtual (or logical)
topologies, defined by the interconnectivity between the network nodes.
Network architectures are formally represented by functional models. Functional
models follow the definitions and rules presented in the following ITU-T
Recommendations :
G.805 Generic Functional Architecture of Transport Networks (General
rules for all kinds of networks)
G.803 Architectures of Transport Networks based on the Synchronous
Digital Hierarchy (SDH) (Application of G.805 to SDH networks)
Draft G.otn Architecture of Optical Transport Networks (Application of
G.805 to optical networks)
In a functional model we can find the different network functionalities allocated to
different network layers. The layers contain transport processing functions, and
interact vertically according to a client/server relationship. Within each network layer
there may be different subnetworks interconnected by links in a horizontal
relationship. The following figure presents an illustrative functional model.
Trail
AP AP
Client to
Client to server
server adaptation
adaptation
Trail
AP AP
Server
Trail Trail layer
termination termination network
SNC LC LC LC SNC
TCP CP CP CP CP TCP
T1304480-95/d04
Lower Order
VC-11 VC12 VC-2 VC-3 Path Layer
Path
Layer
SDH subnetwork connection protection (at any path layer, on any physical
structure)
Trail protection is used to protect Multiplex Section Trails or VC Trails. It can be
applied to rings or point-to-point links. MS protection protects against failures in
specific Multiplex Sections, thus protecting all VCs simultaneously. VC trail
protection, on the other hand, is an end-to-end protection technique, and can be
applied to individually chosen VCs.
Subnetwork Connection Protection can be used to protect a portion of a path between
two Connection Points (CP) or between a CP and a Termination Connection Point
(TCP) or the full end-to-end path between two TCPs. It differs from VC trail
protection in the technique used to monitor the quality of the protected signal.
Contrary to trail protection techniques, SNC protection does not have inherent signal
quality monitoring capabilities, which results in the need to use specific monitoring
techniques. SNC protection schemes are classified according to the monitoring
technique adopted.
Protection techniques can also be bidirectional or unidirectional, as well as revertive
or non-revertive. Bidirectional protection switches both directions of traffic to
protection channels, even if only one traffic direction is affected by a failure.
Unidirectional protection switches only the affected traffic direction to protection
channels in case of a unidirectional failure. Revertive protection switches the traffic
back to the normal channels after correction of a failure. Non-revertive protection
keeps traffic running on protection channels after correction of a failure.
In the following sections we will analyse in more detail the different SDH protection
architectures.
Linear MS protection can be dedicated or shared. In the shared case, an MS trail with
protection capacity is available to protect one of a set of working MS trails. Linear MS
protection allows the simultaneous protection of all VCs in an MS trail in a point-to-
point link. This kind of protection technique can also be unidirectional or
bidirectional, allowing extra traffic to be carried over the protection trail in the
bidirectional case.
A B C A B C
F E D F E D
MS Shared Protection Rings can have two or four fibres. The two-fibre version will be
described here. Each of the two fibres (one carrying clockwise and the other counter-
clockwise traffic) has a capacity which is divided equally between working channels
(time-slots) and protection channels (time-slots). The working channels on one fibre
are associated with the protection channels on the other fibre and vice versa. Only one
set of section overheads are carried on each fibre. In a two fibre scheme, where the
ring is rated at STM-16, each span can carry eight AU-4s of priority (protected) traffic
on the working channels. Under normal conditions the protection channels can be used
to carry additional low-priority traffic (e.g. PSTN) which is dumped when protection
capacity is required. Traffic will normally be routed on the most direct route to its
destination node, although sometimes the longer routing will be preferred due to
capacity limitations and in order to balance the traffic load on the ring. Connections
are made through SDH ADMs at the path layer level according to the destination
node.
In the event of a span failure, priority traffic is switched from the working channels of
one fibre to the protection channels of the other fibre. This operation, conducted at the
node immediately preceding the broken span, causes the traffic to change direction
and go the long way around the ring until it reaches the node on the other side of the
broken span. The traffic is then switched back on to the working channels of the
original fibre where it continues to its destination node. Bidirectional switching and an
APS protocol are essential for the proper operation of the protection scheme in an MS-
SPRing.
Figure 5a depicts a 6 node ring under normal conditions with bi-directional traffic
between nodes A and D while Figure 5b shows the same traffic under span failure
conditions.
Note that multiplex section shared protection can also be used to protect against
intermediate node failures. In the case of multiple cable cuts, the ring splits into two or
more segments, and service can be maintained between any two nodes providing they
are in the same segment.
A B C A B C
F E D F E D
Administrative borders
between operators
VC trail
Contrary to trail protection techniques, SNC protection does not have inherent signal
quality monitoring capabilities, which results in the need to use specific monitoring
techniques. SNC protection schemes are classified according to the monitoring
technique adopted. Currently, there are two kinds of monitoring techniques for SNC
protection described in [1]: inherent monitoring (SNC/I) and non-intrusive monitoring
(SNC/N)
In SNC/I the protection switching criteria are derived from the server layer
information. For example, a Server Signal Fail (SSF) indication can be used by the
SNC protection system to initiate a protection switching action. Thus, the failure
detection is performed by the server layer and the protection switching is performed
by the client layer. This kind of protection protects traffic against failures in the server
layer. If SNC/I is used to protect a VC-4, the server layer is the MS layer. If the path
to protect is a VC-12, the server layer is a HOP (e.g.: VC-4).
SNC/N implements a trail termination in the path layer itself. This trail termination is
only able to read the path overhead to monitor the path status, not being able to alter
in any way the bytes in this overhead. Thus the name of the technique. SNC/N is able
to protect the path against failures in the server layer, and failures and degradations in
the client layer. The failure detection and the protection switching are performed bu
the client layer.
The comparison of the different SDH protection architectures allows the following
conclusions to be drawn:
For uniform or adjacent node traffic paterns the MS-SPRing provides more
capacity than MS-DPRings or path protected rings.
For hubbed traffic paterns the most appropriate architectures are the MS-DPRing
and the path protection.
Path protection can be applied to all transmission rate (STM-n, with n=1,4,16)
and can be used with all topologies where two physically independent trails are
available.
The APS protocol of MS-SPRings is optimised for AU-4 operation (in Europe).
Therefore, add & drop should preferentially be performed at the VC-4 level.
MS-SPRings are only advantageous, when compared to MS-DPRings, when
working at the STM-16 level, because at the STM-4 level the number of available
AU-4s is not enough to provide real benefits.
Two-fibre MS-SPRings cannot operate at the STM-1 level.
After this overview of SDH architectures, the second section will present an overview
of optical architectures.
IP
ATM
SDH PDH
WDM
Figure 7. Interrelation of client layers and the WDM layer
4. Optical Protection
1. Electrical Protection and
and Optical Routing
Electrical Routing (e.g.: all-optical network)
(e.g.: present-day SDH systems)
3. Optical Protection
and
SDH protection Electrical Routing
not available (e.g.: optically protected ring)
Present time
3.5.1 General
fibres: 2
physical topology: ring (max. number of nodes limited by number of
wavelengths and by SDH protection mechanism)
logical topology: mesh
routing: SDH path layer followed by optical channle layer
protection: Linear MS (1+1 MSP assumed)
span failure: yes
multiple span failure: only if both spans are in the same SDH MS
intermediate SDH node failure: no if node is used for o/e/o redirection
intermediate opt. node failure: yes (looks like span failure to SDH nodes)
3.5.2 Description
The Coloured Section Ring, invented and patented by France Telecom, employs
wavelength division multiplexing to improve the capacity of standard SDH two-fibre
rings. This architecture is an example of optical routing and electrical protection.
The standard SDH node (an SDH ADM) is supplemented by a two-channel OADM or
two single-channel OADMs as shown in Figure 9. The OADMs do not possess any
cross-connect functionality. Each node on the ring (see Figure 10a) is directly
associated with two other nodes using two unique wavelengths. Any other nodes on
the ring can be reached by going through either of these two directly linked nodes.
They in turn will be linked to other nodes, etc. Note that Figure 10a) depicts
wavelengths linking adjacent nodes, however, in order to maximise the capacity of the
ring, it is preferable to have direct links on the busiest routes (e.g. say A to D, and A to
F), and indirect on the quieter routes (i.e. traffic from A to B, C and E would route via
D or F). Traffic undergoes o/e/o wavelength conversion at the directly-linked nodes
and at any other intermediate nodes preceding the destination node.
OADM 1 OADM 2
Figure 9. Schematic of add & drop node used in the coloured section ring.
Working traffic is shown by the thick lines and protection traffic is shown by the
thin lines, however, their capacities are identical. Here, the OADM functionality
has been broken into two separate single channel OADMs, but could also be
fulfilled by a 2-channel OADM. The OADMs by themselves have no cross-
connect functionality, but through signals are switched to different wavelengths
by the SDH ADM
The size of the ring in terms of number of nodes is directly limited by the number of
wavelengths available (one wavelength per node), therefore a sixteen wavelength
system can support 16 (or fewer) nodes. An additional restriction may occur
depending upon the particular SDH protection mechanism employed.
With this basic scheme, the maximum capacity that can be allocated between any two
nodes on the ring is limited to two optical channels (two wavelengths), say 2 x 2.5
Gbit/s for an STM-16 system. Of course, this extreme situation would prohibit this
particular pair of nodes communicating with any other nodes on the ring, and in
general we would limit the capacity between any two nodes to a level much less than
two channels. However, if additional capacity is needed at one site, there is no reason
why we cannot site several optical nodes at the same geographic site.
Traffic entering the ring at an SDH ADM is connected through a particular interface
(east or west in a simple two-port ADM) according to the destination address. At this
point, the signal is allocated to a wavelength which ensures it is only connected to one
of the other SDH ADMs on the ring. If this node is not the final destination, traffic is
connected through to the other optical interface of the SDH ADM and is reallocated to
another wavelength. This process repeats until a connection is made between the
originating and destination nodes. Note that although optical routing is used to bypass
many of the en-route SDH ADMs, SDH path layer routing is used at the other
intermediate nodes where opical/eletrical/optical wavelength conversion occurs.
3.5.3 Protection
The coloured section ring uses linear MSP to protect traffic. Dedicated protection
(1+1) with single-ended switching has been assumed for the effects of this discussion.
In the event of a span failure, traffic is protected by duplicate traffic which is sent the
long way around the ring on the same wavelength (the protection route), see Figure
10b. Therefore the SDH ADMs require duplicate optical interfaces for both directions
(east & west) and switches on the receive side to allow connection either to the
working or protection routes.
In general the scheme cannot protect against multiple span failures, but where one
wavelength is used to cross several spans and the second span failure occurs on the
same multiplex section as the first span failure, then traffic will remain protected. The
coloured section ring can also be affected by intermediate node failures, e.g. nodes
where wavelength conversion occurs using the SDH ADM. These failures cannot be
protected against by the multiplex section protection. At other intermediate nodes,
traffic would not be affected by failure of the SDH ADM, but would be affected by
complete OADM failure. However, this latter type of failure may be protected by the
multiplex section protection scheme.
SDH ADM
OADM
A B C A B C
F E D F E D
The basic functional architecture of the CS ring node is illustrated in Figure 11. The
architecture of the 1+1 MSP is based on information provided in ITU-T Standards
G.783 and G.841. The MSPC ellipse represents the switch required to receive traffic,
and also the permanent connections to send duplicate traffic for protection purposes.
HP
MSPC
MS
RS
OC
OMS
Figure 11. Functional architecture of a coloured section ring node showing the
duplicate protection circuit (shaded), and the MSP switch on the receive side
The MSPC switch (receive side) is activated by a Signal Degrade or Signal Failure
alarm which is normally detected in the trail termination function in the Multiplex
Section layer (lower termination function in the MS layer, below the MSPC). An APS
protocol is not used unless dual ended switching is required (i.e. 1:1 protection instead
of 1+1, see G.841).
3.5.5 Implementation
The Coloured Section Ring associates optical routing on a 2-fibre ring with linear
SDH multiplex section protection. It is an example of an architecture with optical
routing and electrical protection.
This architecture is based on an SDH ring where ADMs are optically interconnected.
The basic principle is to associate a wavelength with each SDH Multiplex Section
(between two ADMs regardless of their physical location in the ring), using Multiplex
Section Protection. Protection is done in the SDH layers using linear MS protection.
Working and Protection Multiplex Sections are diversely routed on the ring utilising
the same wavelength on different fibres (Figure 12).
The benefits of CS-Ring architecture rely on an increased transmission capacity by
implementing WDM and on a new level of flexibility to define a node logical order to
reduce the transit traffic through the nodes.
Working Section 1
Node 2
Node 1
Protection Section 2
Section 1
Section 4
Node 4 Node 3
Section 3
OADM
Drop n* i Add
N* i
N* i
Figure 13. Functionality of an Optical Add Drop Multiplexer with spectral reuse
Table I shows the insertion loss at the different ports of an OADM with two drop or
add wavelengths in case of fixed filtering and spectral reuse.
Number of add or drop wavelengths input - output input - drop port ; add port - output
2 wavelengths 2 dB 1 : 1.5 dB ; 2 dB
2 : 2 dB ; 1.5 dB
optical layer of a node is 2 dB and the insertion loss of working signal drop/add port is
1.5 dB (2 dB for protection signals).
OA
maximum length of a span between two neighbouring nodes without and with
optical amplification (OA) implemented in the nodes.
maximum length of the protection path
On the other hand there are not only physical but different kinds of capacity
limitations that can be identified in an architecture. These capacity limitations can
depend on the applied technology or on the architecture itself, thus it should be
specified architecture by architecture.
The capacity limitations can be described with the following specifications:
Maximum number of available wavelengths in the architecture (if it is limited
only by the current state of the technology and not the given implementation of
the architecture, it should be noticed so)
Maximum number of the available wavelengths in one node (if it is limited only
by the current state of the technology and not the given implementation of the
architecture, it should be noticed so)
Maximum capacity of an optical channel (i.e. maximum capacity that can be
carried by one wavelength)
The physical limitations and the capacity limitations are studied in this chapter. The
maximum number of available wavelengths in each architecture and per node is
specified.
The general assumptions adopted to calculate the ring maximum length are :
fibre attenuation : 0.28 dB/km (according to G.692)
an optical connector at each end of a fibre section : 0.3 dB mean loss and 0.1 dB
standard deviation. As many connectors are used in a ring, a statistical basis is
adopted (ETSI recommendation M 1009) assuming 3 times the standard deviation
to calculate the related insertion losses. In the Tables, all results are rounded at
the upper integer number of dB.
Using OA at each node, two extra connectors are considered to enable the
implementation of the amplifier board.
A 28 dB optical budget is considered enabling transmission rate up to STM-16
with joint engineering. With OA in each node, the protection span can be
considered as a multi-wavelength link with in-line amplifiers for the related
wavelengths. To evaluate the span length, we considered an attenuation range
between the OAs from 22 dB to 33 dB. According to commercial products, a 33
dB attenuation range is feasible with only one in-line amplifier and 22 dB
attenuation range is feasible with typically 6 in-line OAs and 8 wavelengths.
The span lengths with OA reported in Table II and Table III are rather pessimistic
because they are based on G 692 recommendation and commercial system capabilities
using +13 dBm or +15 dBm output level Optical Amplifiers.
Physical limitations
In CS-Rings, the primary parameter is the number of nodes that is equal to the number
of wavelengths. This number is limited either by the maximum number of nodes in an
SDH ring (16) or the maximum number of wavelengths in a wavelength multiplexer
allowed by the current state-of-the-art technology; we assume a node implementation
according to Figure 16.
3.6.1 General
fibres: 2
physical topology: ring
logical topology: mesh
routing: optical and SDH path layer
protection: optical multiplex section shared protection
(dual-ended switching)
span failure: yes
multiple span failure: yes
node failure: yes
3.6.2 Description
Protection at the optical multiplex level could be beneficial. It would enable protection
of all optical channels simultaneously, with a low number of optical switches, giving it
a cost advantage over electrical protection. Of course, such an advanced functionality
requires a proper management system. Although OMS-protection does not protect
against defects in the network layers, like multiplexing / demultiplexing, it protects
against cable-cuts, which is an increasingly important issue for public network
operators.
a) b)
A B C A B C
E D E D
1, 3, 5, ...
2, 4, 6, ... Fibre failure
1 An alternative to shared protection is dedicated protection when a dedicated fibre is used for
protection traffic only.
on the other fibre. Therefore the eight working channels on one fibre have the same
wavelengths as the eight protection channels on the other fibre and vice versa. The
operation of this protection mechanism is illustrated in Figure 17.
Additionally, the OMS-SPRing provides optical traffic routing based on wavelength
selection by the nodes.
HPC
HP
MS
RS
Shared
OMSP
OC 2 fibres
OMSPC
OMS
WEST EAST
OTS
Figure 18. Two-fibre OMS-SPRing node with cable cut on east side
The functional model shown here is based on the SDH MS-SPRing functional model
depicted in G.841. The standard G.681 implies that the OMS and OTS functions
should handle the same number of wavelengths. This model appears to violate this
restriction in G.681, but it is believed that it circumvents G.681 by using functions
having an identical channel capacity in the OMS and OTS layers, but that the OMS
Adaptation function is only part-populated, e.g. it would be an OMSA_16 function in
the case of a 16 wavelength system, but it would only accommodate working channels
or protection channels, not all 16.
The challenge in EURESCOM Project P615 was to study the functional model of the
node shown in Figure 18, and convert it to a physical picture of a ring network. It
should be noted that switching occurs on both sides of a cable cut (dual-ended
switching).
3.6.4 Implementation
This part deals with the implementation of a two-fibre OMS-SPRing with a meshed
logical node connectivity: each node has a link with all the other nodes on a dedicated
wavelength. The transmission capacity on each of the two fibres is shared between
working and protection traffic. Therefore, in a 7 node ring, 6 wavelengths are needed
per fibre. OADMs are implemented in each node for wavelength routing and dual
ended optical switching enables protection in case of cable cut. Management of the
optical layer is not considered in this chapter. Figure 19 presents a typical
implementation of the optical layer in a node. Wavelength allocation is studied in
Deliverable No. 2 of EURESCOM P615. Opto-mechanical 22 swiches are suited for
protection as far as insertion losses are low (1 dB typical) and switching speed is in the
20 ms range.
The proposed node configuration includes one OADM per fibre and a 22 cross-bar
optical switch implemented at each side of the node. Optical amplifiers can be used.
The best place for the amplifiers seems to be between the OADM and optical switch
in order to use both optical amplifiers in protection state to cope with the extra losses.
OS1
EDFA OS2
OADM
OADM
OADM
OS4 OS3
In both nodes, only half of the fibre capacity is used to transport working traffic, the
other half being reserved for protection.
Regarding the optical amplification, the best location seems to be before the optical
switches, but it should be noted that insertion losses are increased in the protected
state.
In a 5 node architecture, 3 wavelengths are needed in each node for a full logical
mesh. Insertion losses are 2 dB for a wavelength through an OADM. For 5 node
architecture comparisons, we assume 2 dB insertion losses between the add and drop
ports.
Figure 21 and Figure 22 depict the node configuration in working and protection
switched states in order to compare them on the insertion loss basis.
2dB 4dB 3 dB
1dB 1dB
OADM
2dB 2dB
3 dB
2dB 2dB
OADM
2dB
Figure 21. Cross-bar node configuration in a 5 node OMS SP ring (Working state)
2dB
1dB 1dB
OADM
2dB 2dB
Cable Break
2dB 2dB
OADM
6dB 2dB
Figure 22. Cross-bar node configuration in a 5 node OMS SP ring (Protection state)
Multilayer filters are adopted for architecture comparison with 1 dB loss per dropped
channel because they are available and they exhibit the lower insertion losses and
costs than grating devices.
The configuration shown in Figure 23 was used to obtain the information presented in
Table III on physical limitations of OMS-SPRings.
OS1 OS2
Number of nodes 4 5 6 7 8 9 to 16
Max span length without OA. 4 2 - - -
longest protection path without OA 16 11 - - - -
Max. span length with OA 92 78 59 51 36 for further study
3.7.1 General
3.7.2 Description
employing the optical network layers. MWTN was seen from the outset as a broad-
band network designed to overlay existing networks. The fundamental building block
of the MWTN architecture is the Optical Cross-Connect (OXC) node (Figure 24).
Optical cross-connects are particularly useful for meshed network architectures, where
nodes have to route traffic from three or more directions.
The MWTN OXC node has the ability to redirect (route) traffic according to
wavelength. Inbound traffic is selected first by its incoming route, and second by
wavelength. Optical cross-connects are then used to redirect this traffic onto outgoing
routes. Therefore each optical channel can be selected and redirected as required. In
addition, optical channels may be added or dropped using a conventional digital cross-
connect (DXC).
Traffic is transferred between the OXCs and the DXC via tuneable receivers and
transmitters. The DXC may also be used for fine granularity processing (down to the
VC-12 level), such as grooming, AU routing, and monitoring. The DXC can also be
used to perform wavelength conversion, since all-optical wavelength conversion is not
included in the OXC functionality. Both the OXCs and the DXC can be used to restore
service in the event of a network failure.
TUNEABLE FILTERS OSSs
DXC
TUNEABLE Tx Rx
DROP ADD
Figure 24. Reconfigurable OXC proposed by the MWTN consortium. The node
shown handles traffic from three directions. Both pre- and post-amplification
(triangles) are used to boost signals. Optical channels are selected by tuneable
filters and power equalised (not shown) before cross-connection. Traffic may be
added / dropped or groomed using the DXC in conjunction with the tuneable
transmitters (Tx) and receivers (Rx)
For a WDM system employing n wavelengths, the node requires n OXCs to have full
cross-connect functionality. Each OXC must have an input (and corresponding output)
port for each fibre accessing the node with additional ports for each DXC.
The functional model of the MWTN mesh comprises routing functionalities in the
electrical and optical layers. The DXC switch is located above the SDH Multiplex
Section layer but below the Higher-Order Path functions. The OXC function is located
between the OMS and OC functions because the optical channels can be selected
using tuneable filters.
HP
MS
RS
OC
OMS
OTS
Figure 25. Functional model for the MWTN OXC illustrated in Figure 24. OC
protection has not been shown in this diagram, but could be represented by an
expanded OC layer with additional termination and adaptation functions, along
with an OCPC matrix
3.7.4 Implementation
input fibre 1
input fibre m
Space Tunable AO
Switch filtre Wl converter
1 1
m
input fibre 1
n
input fibre m
to local node
from local node
Supervisory and management
input fibre 1
input fibre 3
The maximum fibre span is 100 km. As only 8 wavelengths are used per fibre, P615
assumed the implementation, in each node, of only one Optical Amplifier in each fibre
link. No in-line amplifiers were needed.
The implementation described in Figure 28 exhibits 3 fibres with 4 wavelengths per
fibre There are also add/drop possibilities for local node and the total number of
optical channels crossing the optical cross-connect is 16. The related cost is 16*(the
average cost of one optical channel in an OCC) and we must add the cost of the line
terminal equipments and of the electrical DXC4/4. For a bi-directional link, this cost
must be multiplied by 2. So, for the Optical Cross-Connect, an average cost is defined
as a number of optical channels crossing the OCC.
3.8 Conclusion
This chapter defined what is meant by optical network architecture: a network
architecture that implements some or all network functionalities in the optical layers of
the layered model. Choosing the traffic routing and protection functionalities as
classification criteria, the chapter then proposed a classification method for
architectures, taking into account whether the chosen network functionalities were
allocated to the electronic or optical layers of the functional model.
Then, the network architectures selected by EURESCOM Project P709 were identified
and, for each one, a detailed description was presented. The description included an
overview of the architectures functionalities, a functional model, a discussion of
implementation options and basic design rules.
The optical and electrical architectures are now well known. The next section will
study the problem of dimensioning and some methods to solve it will be proposed.
4 Dimensioning methods
Any nodes which are inside the network boundary must have no traffic
terminating, and must also be even (i.e. the sum of link capacity adjoining that
node must be even). In a network made of rings, this is always the case.
Unfortunately this can rule out many large networks, but if the ring design is
performed carefully, many smaller networks (less than ~20 nodes) meet these
requirements. As shown in Figure 29, rings can be chosen to intersect one another.
Once the geographical placement of rings have been determined, and the ring
capacities (e.g. STM16 MS-SPRing, STM64 MS-SPRing, 16 or 40 OMS-SPRing),
then the number of stacked rings required to carry the given traffic demands must be
calculated. The next section outlines the possible problems in such an approach.
1 3
4
5
Figure 29. Example of a multiple ring network suitable for dimensioning using
the proposed method
Figure 30 shows a demand between two nodes named Start and Finish. A number
of possible routes can be chosen. For example, the Start node sits on both rings 4
and 5, so either ring could carry the first leg of the traffic. Three possible paths are
shown. One uses rings 1,2 and 4, the other two both use rings 1 and 5, but travelling
on opposite sides of the rings. If the demand is larger than 1 VC4 (or wavelength) it
may also be split and several paths be used at the same time.
Finish
1 3
4
5
Start
Figure 30. Possible routes for a given demand
A certain ring usage choice will impact on the in-ring routing, and consequently on the
ring loading and free capacity. Similarly the choice of the gateway node between rings
can impact on the total numbers of rings needed to route all the traffic within the
network.
Faced with all these possible routings and ring choices, it can be difficult to determine
the minimum number of rings required to transport a given set of demands.
The dimensioning method proposed here consists of:
Estimating the number of stacked rings required for each geographical ring
placement
The model then calculates whether this number of rings can carry all the traffic
demands
The number of rings needed can then be increased or reduced until the smallest
possible number required has been found
The proposed method can also be extended to find the routings, but this is not
explained in this contribution.
The dimensioning method is based upon the Okamura-Seymour theorem [2], and its
extension due to A. Frank [3].
The Okamura-Seymour theorem states that if G is a planar graph with a set of nodes V
and edges E, and H is a set of k demands {si,ti}, i=1,, k, then if:
All si and ti are on the exterior boundary of the graph
The graph is even (the sum of the edge capacity adjoining a given node, plus the
sum of the demands originating or terminating at the same node, must be even for
all nodes in V)
Then provided that for any cut which separates the network into 2 connected
subnetworks, the sum of the edge capacity removed to perform the cut must be
superior of equal to the sum of the demands spanning the cut (see Figure 31 for an
example).
To be more precise, let X be a subset of V. Let D(X) be the set of all edges with one
end in X and the other in V-X, and let (X) be the set of all demands with one terminal
in X and one in V-X. If |D(X)| represents the sum of the capacity of all edges in D(X),
and |d(X)| represents the sum of size of all demands in (X), then there is enough
capacity in the network to carry all the demands if and only if:
For all X V, |D(X)| - |(X)| is even and non-negative (1)
It is obvious that this condition is required, but in Reference [2] it is proved that it is
sufficient.
Set X
16 16
(a) (b) 7
16
16 6
16 3 9 4
16
16 16
16 16 3
16 6
Fibre infrastructure with capacity in VC4s Demands in VC4s
(c) (d)
7
16
A cut of the network with capacity Demands across the cut with
D(X) of 32 VC4s (X) bandwidth 32 VC4s
2 demands
of 1 VC4 each
(a)
(b)
Capacity = 1 VC4
on all edges
The method described above is sufficient for dimensioning a network using SDH MS-
SPRing rings, provided time-slot interchange is allowable. Optical rings such as the
OMS-SPRing do not allow wavelength conversion, and in this case the extra
constraints imposed by wavelength continuity have to be satisfied.
D M
M U
U X
X
Optical
fibres
D M
M U
U X
X
Local
ports
Optical layer
ATM layer
Two options have been investigated, on the basis of the possible restoration schemes
mentioned in Annex A, to fulfil network requirements for survivability. The design of
more detailed structures in terms of optical components, as well as the full description
of their technological options, is not addressed here. In particular, the need for optical
amplification in the node is not considered here, since it does not impact on the node
functionality. However, this should be a crucial parameter for techno-economical
studies.
Switch Switches
fibre
DMUX MUX
Considering the possible schemes for resource allocation selected in Annex A, the
following table describes the cases to be used for optical layer.
Node structure 1 Node structure 2
Wavelength conversion (VWP) X
No wavelength conversion (WP) X X
Tunable source X X
Table IV - Possible schemes for resource allocation in optical layer
In order to provide a comparison between the two node structures in terms of
dimensioning, we will apply dimensioning methods with the WP case for resource
allocation.
Simulate single
failure (link or
node)
Resource allocation
(wavelength, fiber)
STRUCTURE 2
Each node is described by a set of N matrices where N is the maximum number of
wavelengths to be used in the network. We first allocate resource in the network
(wavelength channels, fibres) for each case of failure. Then for each node, all possible
cases of (single) failure in the network are simulated and the size of each sub-matrix is
updated (maximum between current size, initialised to 0 and the sum of input channels
and local channels at the corresponding wavelength).
Initialise all matrix
sizes to 0
Simulate single
failure (link or
node)
Resource allocation
(wavelength, fiber)
The two previous methods have been applied to the European network example
described in Annex C.
Assumptions were as follows :
No wavelength conversion case
End-to-end restoration : two end-to-end paths were assigned for each demand on
the basis of the shortest-path algorithm
Wavelength and fibre allocation was achieved through Graph Colouring methods
used in Annex C.
Spare resource was allocated by simulating each possible single failure (node or
link) and re-calculating resource allocation.
The sizes of switches were rounded up to the closest 2n integer.
As far as structure 1 is concerned, 2 nodes in the network would require 64x64
switches, 8 nodes require 128x128 switches and one node requires a 256x256 switch.
Compared to the state of the art of optical switching, it shows that structure 1 would
hardly be feasible under the traffic and network assumptions taken here.
100
90
80
70
60 N=4
50 N=8
40 N=16
30
20
10
0
2x2 4x4 8x8 16x16 32x32 64x64
Figure 37. Total number of switches in the network for various capacity per fibre (N)
Figure 37 reports the total number of optical switches of given sizes in the network for
structure 2, for various capacity per fibre. The influence of the number of wavelengths
per fibre on the switch size points out the trade-off between the transmission costs and
complexity (N) and the switching cost (related to the size of the switches).
M CF
Q
TM N
Ac Am
OM S_T OM S/OCH_A
O MSOH WA OM
Carried out by
termination
function:
S
Equipment specific monitoring, e.g.:
overhead
monitoring:
EM F Signal level of added & dropped wavelengths opt. DCC
-signal level Frequency of demux channels
-error checking
Demux power supply voltage
Alarms:
-OM S (sup) loss of Equipment specific configuration:
supervisory Selection of added/dropped channels
-OM S (sup) loss Adjustement of demux frequency
of timing/frame
-etc...
M CF
Q
TMN
Am Am
DAt
Carried out by OTS_T OTS/OMS_A
termination OTSOH OSPt FFS
function:
overhead
monitoring:
-signal level
S
-error checking
Alarms:
EMF Equipment specific monitoring, e.g.:
total power input/ouput
-OTS (sup) loss of OA pump laser power/current temperature
supervisory
power supply voltage
-OTS (sup) loss
of timing/frame amount of dispersion
-OTS (sup) AIS Equipment specific configuration:
-OTS (sup) - Error signal level setting
-OTS (sup) FERF Laser bias current/amplifier gain/temp. control opt. DCC
opt. DCC
MCF
Optical overhead
Management
OperationSystem
TMN interface
Client network
SDH
SDH SDH
SDH
Rx
Rx Rx
Tx
OTOH OTOH
OMOH OCOH OMOH
extraction insertion
CTIO
1 1
OTOH1 OTOH2
2 2 Optical
OLA1 OLA2 Optical Optical
DMUX MUX
osc Switch osc
3 Matrix 3
4 4
3 OTOH3
2 OTOH2 2 OTOH2
1 OTOH1 1 OTOH1 1 OTOH1
osc
OXC OA1 OA2 OA3 OXC
Figure 43. Example of dedicated wavelength to carry OTS and OMS overhead
information
Different STM-n signals may be transported on the same optical network, via
different transponders, as illustrated below in Figure 44:
Transponder A 1
STM1
2 Optical
Transponder B
STM4
MUX
3
STM16 Transponder C
Transponder C 4
STM16
1 49 97 14
4
A1 A A A1 A A2 A A A A2 A J0 Z0 Z0 Z0 *
1 1 1 2 2 2 2
B1 E1 F1
D1 D2 D3
H1 H H H1 H H2 H H H H2 H H3 H H H3 H3
1 1 1 2 2 2 2 3 3
B2 B2 B2 B2 B2 K1 K2
D4 D5 D6
D7 D8 D8
D1 D1 D1
0 1 2
S1 M E2
1
STM-16 overhead
1 13 25 36
A1 A1 A1 A1 A1 A1 A2 A2 A2 A2 A2 A2 A2 J0 Z0 Z0 Z0 * * * * * *
B1 E1 F1
D1 D2 D3
H1 H1 H1 H1 H1 H1 H2 H2 H2 H2 H2 H2 H2 H3 H3 H3 H3 H3 H3 H3 H3 H3 H3 H3 H3
B2 B2 B2 B2 B2 B2 K1 K2
D4 D5 D6
D7 D8 D8
D10 D11 D12
S1 M1 E2
STM-4 overhead
1 4 7 9
A1 A A A2 A A J0 * *
1 1 2 2
B1 E1 F1
D1 D2 D3
H1 H H H2 H H H3 H H3
1 1 2 2 3
B2 B2 B2 K1 K2
D4 D5 D6
D7 D8 D8
D1 D1 D1
0 1 2
S1 M E2
1
STM-1 overhead
As the data messages are specific to a layer, the optical DCC bytes can be structured
in OTS DCC, OMS DCC and OCH DCC. The following rates are given as a proposal
of use of unallocated STM1 overhead bytes :
4 bytes (D13-D16) for OTS DCC --> 256 kbit/s rate
2 bytes (D17-D18) for OMS DCC --> 128 kbit/s rate
8 bytes (D19-D26) for OCH DCC --> 512kbit/s rate
Tracing bytes J2 for OCH trace identifier
Monitoring bytes B4 for OTS Signal quality
B5 for OMS Signal quality
B6 for OCH Signal quality
APS bytes K4 for OCH APS command
K5 for OCH AIS and RDI alarm detection
DCC bytes D13-D16 for OTS DCC
D17-D18 for OMS DCC
D19-D26 for OCH DCC
total 20 bytes
Table VI - Summary of optical overhead bytes
The total is less than the number of unallocated STM1 overhead bytes (30)
All of these bytes are written into electrical overhead of each STM client signal by the
OTU. Of course, the bytes related to OMS and OTS sections are repeated in each SDH
client overhead, but this can be easily handled and masked by the management
system.
OADM
1 2
West East
Coloured
aggregate
STM16
Terminal STM1
multiplexer
4/4 SDXC SNC-P for
Transit VC4 terminating VC4
STM1 access
Figure 45. Architecture for WDM ring with SNC-P protection in 4/4 DXC
OADM
1 2
West East
MS-SPRing
ADM with
coloured
aggregates
INPUTS OUTPUTS
INPUTS
OUTPUTS
OADM 4 OADM 2
OADM 3
The remaining 8 STM-1s
to node 3
Transponder and
SDH LTE MUX
OADM1 OADM
OADM 4 O A DM 2 OA D M OADM
OADM3 O AD M
Dem ands from 4 to 2 ( eight STM -1 )and Dem ands from 4 to 2 ( eight STM -1 )and
from 1 to 3 ( eight STM -1 ) from 1 to 3 ( eight STM -1 )
5 2
4 3 Wavelength
number one
If the traffic in this scenario is increased from 1 to 3 STM-1s between each pair of
nodes, then using the same routing, a capacity of 18 STM-1s would be required on
spans 1-5 and 1-2, leading to a solution using 2 wavelengths, and 12 terminal
multiplexers. The optimisation tool, in contrast, prefers to complete the ring by
lighting up wavelength 1 on span 3-4, and finds a 1-wavelength solution requiring 10
terminal multiplexers.
Links representing
terminal equipment
& OADM
(b) wavelength block
Diverse routing is possible if 1+1 (SNC-P) protection is used. This is done by adding a
large penalty cost when both working and protection paths of a VC4 are found to use
the same cable.
When MS-SPRing is assumed in the client layer, protection is implicit, and VC4s are
only routed one way around the ring assuming that each wavelength can only carry 8
working STM1s.
For the case of 1+1 (SNC-P) protection, the numbers of terminal multiplexers are
plotted in Figure 52 for the three approaches. Demultiplexing every wavelength at
every node is only economical for very low traffic. When the traffic exceeds 8 VC4s
between each node, it is interesting to note that assigning a wavelength to every
demand requires the same number of terminal equipment as the more optimised
version, which uses less wavelengths when the traffic does not exceed 10 VC4s
between each nodes. The wavelength usage for the 3 methods is plotted in Figure 53.
60
Optimised
50
Demux at every node
Number of TM pairs required Wavelength for every demand
40
30
20
10
0
0 2 4 6 8 10 12 14 16 18
traffic between every node pair (VC4s)
Figure 52. Numbers of terminal multiplexer pairs required for full mesh connectivity in
a 5-node ring network, versus the traffic volume, assuming 1+1 protection
It is interesting to note that in many cases, the network dimensioned to minimise
terminal equipment uses more wavelengths than when each wavelength is processed at
every node.
12
10
Number of wavelengths required
4 Optimised
0
0 2 4 6 8 10 12 14 16 18
Traffic between every node pair (VC4s)
The optimised configuration for a fully meshed demand of 2 VC4s per node requires
14 terminal multiplexers and two wavelengths, and is shown in Figure 54.
5 2
4 3
Figure 54. Terminal multiplexer placements and wavelength usage determined for
a full mesh demand of 2VC4s per node pair, for 1+1 protection at the VC4 level
In the case when 8 VC4s are required between every pair of nodes, the optimised
solution uses only 15 terminal multiplexer pairs and only 5 wavelengths, compared to
the case where each demand is given a wavelength (which requires 20 TM pairs and
10 wavelengths). The optimised configuration, as produced by the simulated annealing
tool, is shown in Figure 55. Each wavelength supports 2 demands of 8 VC4s each,
which completely fills the wavelength. Each wavelength is only accessed at 3 nodes
on the ring.
1 2 3
8 VC4s 4 5 LTE
accessed pair
For SPRing protection, the optimisation tool was used to minimise the number of
ADMs required as a function of traffic level. For comparison, the case where ADMs
are placed at every node (stacked rings) is also considered, as well as the case where
only 2-node SPRings (equivalent to 1+1 protection) where used. The number of
ADMs required for the different cases are shown in Figure 56.
35
30
Number of ADMs required
25
20
15
10 Optimised
Figure 56. Numbers of ADMs required for full mesh connectivity in a 5-node ring
network, versus the traffic volume, assuming SPRing protection
It can be seen that by optimising traffic routings, fewer ADMs are required than by
deploying 2-node rings, for traffic of up to 12 VC4s between each node pair. The fibre
usage of the different solutions is also shown in Figure 57.
12
Number of wavelengths required
10
Optimised
8
Demux at every node
0
0 2 4 6 8 10 12 14 16 18
Traffic between every node pair (VC4s)
Again, attempting to minimise terminal equipment cost can sometimes result in higher
wavelength counts. It is also interesting to note that even when traffic demands are
large enough to completely fill a 2-node ring, deploying 2-node rings consumes more
wavelengths, even though the number of ADMs is the same as for the optimised
design.
An example of the configuration produced by the simulated annealing tool is shown in
Figure 58 for a full mesh demand of 8 VC4s between each pair of nodes. 10 ADMs
and 3 wavelengths are required. The optimised solution for transporting 16 VC4s
between each pair of nodes is simply obtained by doubling the configuration shown in
Figure 58 . It uses only 6 wavelengths, compared to 10 if 2-node rings are stacked.
1 2 3
Figure 58. SPRing ADM placements for a design optimised to carry 8 VC4s between
each pair of nodes. The purple lines represent the routings for the demands
25
Number of TM pairs/ADMs required
20
15
10
SPRing protection
1+1 protection
5
0
0 2 4 6 8 10 12 14 16 18
Traffic between every node pair (VC4s)
Figure 59. Optimised numbers of terminal multiplex pairs/ADMs required for either
1+1 or SPRing protection, to provide full mesh connectivity, versus traffic volume
It is interesting to note that at high traffic levels, 1+1 protection requires no more
terminal equipment than SPRing protection. The corresponding wavelength
requirements are shown in Figure 60. SPRing protection requires 40% fewer
wavelengths for high traffic.
12
Number of wavelengths required
10
SPRing protection
2
1+1 protection
0
0 5 10 15 20
Traffic between every node pair (VC4s)
Figure 60. Wavelength requirements for SPRing and 1+1 protection for a 5-node ring
The dimensioning process of a 2-layer SDH/WDM network has been considered, in
the case where the SDH layer protects the traffic against cable breaks, either using
SNC-P or MS-SPRing, and where a WDM ring with OADMs is used to pass through-
traffic transparently across nodes when required.
When traffic demands are given in VC4s, and each wavelength can carry up to 16
VC4s, several approaches to the dimensioning process are possible:
Allocate a wavelength to every demand end-to-end over the ring: this can
wasteful when individual demands of less than about 8 VC4s are present.
Terminate every wavelength at every node, and use SDH grooming to fill every
wavelength efficiently: this becomes wasteful when the demand volumes are
large.
Optimise the VC4 routings in the network to minimise the number of expensive
terminal equipment.
The third approach was studied here, and a dimensioning tool based on simulated
annealing was developed. The tool attempts to minimise the numbers of terminal
multiplexers, transponders, or SDH ADMs, while at the same time using the minimum
number of wavelengths and avoiding wavelength conflicts.
The tool was applied to example scenarios where a network was dimensioned to
support a uniform, fully meshed demand pattern of varying size, for the case of 1+1
and SPRing protection. A number of observations were made after examining the
results:
Optimising the VC4 routing and the placement of terminal equipment can result is
large savings, both for 1+1 and SPRing protection.
7 Conclusion
The aim of this Annex concerns the interactions between the optical and electrical
layers. Its objectives consists in identifying different optical architectures.
It is shown through this document that the main area of optical/electrical networks
planning is correctly covered. Indeed, electrical layer network planing aspects are
briefly recalled in the first chapter as they have already been detailed in Eurescom
P615. References are given for both P615 project and ITU-T recommendations.
Moreover, SDH architectures and protection policies are also recalled and compared.
The third chapter can be considered as the starting point for this Annex. Indeed, the
concept of optical architectures and classification methods are recalled according to
Deliverable 1 of P709.
The optical layers are defined and both traffic routing and traffic protection are
provided. Moreover, the capabilities and the limitations of such networks are stressed.
Finally, general information, functional models, implementations and design rules are
described for all the three architectures selected in P709 within Deliverable 1.
Once the architectures are defined and their models are described under their own
constraints, dimensioning methods for solving and evaluating such architectures are
given in the third chapter. Such methods are described according to different
architectures i.e. rings or meshed networks.
Firstly, multiple ring and optical MS-SPRing dimensioning methods are depicted. The
underlayed theoretical methods are stressed for ring based networks. Moreover,
routing problems in multiple ring network is provided
Secondly, for the optical networks, the dimensioning methods are based on resource
allocation algorithms described in Annexes A and B. The dimensioning methods takes
into account wavelength conversion and an application to network example described
in Annex C is given. The underlayed method is based upon graph coloring methods.
Before dimensioning electrical/optical networks, the management aspects are
depicted. They are based on TMN data and OAM parameters. The constraints and
limitations are also given. Interactions and feasibility problem are presented.
Moreover, the importance of electrical processing for optical is stressed.
Finally, concerning the dimensioning methods for electrical/optical layers, the
assumption of the model chosen are described and two problems are presented.
Firstly, the traffic grooming problem which consists in minimizing the number of
terminal equipments. Different protections such as SNC-P and MS-SPRing are
handled. Such methods are clearly illustrated by several examples. Secondly, a
simulated annealing based algorithm is given for grooming and routing VC_4s in
order to minimize the terminal equipment costs over WDM rings. Additional
information to WDM routing described in Annex C is given. Moreover, numerical
results are depicted for 5 node architecture networks with different protection
schemes.
Finally, this document provides guidelines for optical network planing covering
different aspects going from pure electrical architectures to pure optical counterpart
through electrical/optical architectures. Network planners may find information both
from management point of view and from dimensioning point view.
References
[1] ITU-T Recommendation G.841 Types and Characteristics of SDH Network
Protection Architectures, July 95
[2] H. Okamura and P. D. Seymour, Multicommodity flows in Planar Graphs,
Jnl. Combin. Theory, Series B 31, pp.75-81 (1981).
[3] A. Frank, Edge-Disjoint Paths in Planar Graphs, Jnl. Combin. Theory,
Series B 39, pp. 164-178 (1985).
[4] D. Marcenac, C. Felicite, N. Stewart, EURESCOM P709, PIR3.3, contribution
BT33-05a, Techniques for resource allocation and dimensioning for optical
mesh networks with 1+1 protected traffic and their comparison, November
1998.
[5] D. Marcenac, EURESCOM P709, PIR3.3, contribution BT33-02a,
Identification of criteria for resource allocation and dimensioning techniques
for optical rings, July 1998.
[6] Project P615: "Evolution towards an Optical Network Layer", Deliverable 1,
Annex B : OAM requirements to the optical network layer.