T Rec G.873.1 201710 I!!pdf e PDF
T Rec G.873.1 201710 I!!pdf e PDF
T Rec G.873.1 201710 I!!pdf e PDF
ITU-T G.873.1
TELECOMMUNICATION (10/2017)
STANDARDIZATION SECTOR
OF ITU
Summary
Recommendation ITU-T G.873.1 defines the automatic protection switching (APS) protocol and
protection switching operation for the linear protection schemes for the optical transport network at
the optical data unit k (ODUk) level. Protection schemes considered in this Recommendation are:
– ODUk subnetwork connection protection with inherent monitoring (1+1, 1:n);
– ODUk subnetwork connection protection with non-intrusive monitoring (1+1);
– ODUk subnetwork connection protection with sublayer monitoring (1+1, 1:n).
– ODUk compound link subnetwork connection group protection with inherent monitoring
(1+1, 1:1).
In addition, client-related protection architectures are described.
History
Edition Recommendation Approval Study Group Unique ID*
1.0 ITU-T G.873.1 2003-03-29 15 11.1002/1000/6306
2.0 ITU-T G.873.1 2006-03-29 15 11.1002/1000/8762
3.0 ITU-T G.873.1 2011-07-22 15 11.1002/1000/11120
3.1 ITU-T G.873.1 (2011) Amd. 1 2012-10-29 15 11.1002/1000/11790
4.0 ITU-T G.873.1 2014-05-14 15 11.1002/1000/12181
4.1 ITU-T G.873.1 (2014) Amd. 1 2014-12-05 15 11.1002/1000/12368
5.0 ITU-T G.873.1 2017-10-07 15 11.1002/1000/13302
* To access the Recommendation, type the URL http://handle.itu.int/ in the address field of your web
browser, followed by the Recommendation's unique ID. For example, http://handle.itu.int/11.1002/1000/
11830-en.
NOTE
In this Recommendation, the expression "Administration" is used for conciseness to indicate both a
telecommunication administration and a recognized operating agency.
Compliance with this Recommendation is voluntary. However, the Recommendation may contain certain
mandatory provisions (to ensure, e.g., interoperability or applicability) and compliance with the
Recommendation is achieved when all of these mandatory provisions are met. The words "shall" or some
other obligatory language such as "must" and the negative equivalents are used to express requirements. The
use of such words does not suggest that compliance with the Recommendation is required of any party.
ITU 2017
All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the
prior written permission of ITU.
1 Scope...................................................................................................................................... 1
2 References.............................................................................................................................. 1
3 Definitions ............................................................................................................................. 1
3.1 Terms defined elsewhere ......................................................................................... 1
3.2 Terms defined in this Recommendation .................................................................. 2
5 Conventions ........................................................................................................................... 3
Bibliography...................................................................................................................................... 32
1 Scope
This Recommendation defines the automatic protection switching (APS) protocol and protection
switching operation for the linear protection schemes for the optical transport network (OTN) at the
optical data unit k (ODUk) level. These schemes are based on the generic linear protection
specifications in [ITU-T G.808.1]. Linear protection schemes considered in this Recommendation
are:
– ODUk subnetwork connection protection with inherent monitoring (1+1, 1:n);
– ODUk subnetwork connection protection with non-intrusive monitoring (1+1);
– ODUk subnetwork connection protection with sublayer monitoring (1+1, 1:n);
– ODUk compound link subnetwork connection group protection with inherent monitoring
(1+1, 1:1).
In addition, client-related protection architectures are described.
2 References
The following ITU-T Recommendations and other references contain provisions which, through
reference in this text, constitute provisions of this Recommendation. At the time of publication, the
editions indicated were valid. All Recommendations and other references are subject to revision;
users of this Recommendation are therefore encouraged to investigate the possibility of applying the
most recent edition of the Recommendations and other references listed below. A list of the
currently valid ITU-T Recommendations is regularly published. The reference to a document within
this Recommendation does not give it, as a stand-alone document, the status of a Recommendation.
[ITU-T G.709] Recommendation ITU-T G.709/Y.1331 (2016), Interfaces for the optical
transport network.
[ITU-T G.798] Recommendation ITU-T G.798 (2017), Characteristics of optical transport
network hierarchy equipment functional blocks.
[ITU-T G.798.1] Recommendation ITU-T G.798.1 (2013), Types and characteristics of optical
transport network equipment.
[ITU-T G.806] Recommendation ITU-T G.806 (2012), Characteristics of transport
equipment – Description methodology and generic functionality.
[ITU-T G.808] Recommendation ITU-T G.808 (2016), Terms and definitions for network
protection and restoration.
[ITU-T G.808.1] Recommendation ITU-T G.808.1 (2014), Generic protection switching –
Linear trail and subnetwork protection.
3 Definitions
5 Conventions
None.
Figure 6-2 shows a server ODUk monitored ODU[i]j/ODUj SNC/I protection configuration.
The protection switching controller does not care which monitoring method is used, as long as it
can be given (OK, SD, SF) information for the transport entities within the protected domain. Some
monitors or network layers may not have an SD detection method. Where this is the case, there is
no need to use a different APS protocol – it would simply happen that an SD would not be issued
from equipment that cannot detect it. Where an APS protocol is used, the implementation should
not preclude that the far end declares an SD over the APS channel, even if the monitor at the near-
end cannot detect SD.
NOTE 3 – In accordance with [ITU-T G.709], for sublayer monitoring, nesting and cascading are the default
operational configurations. Overlapping is an additional configuration for testing purposes only. Overlapped
monitored connections must be operated in a non-intrusive mode and not used for protection. Maintenance
signals ODUk-AIS and ODUk-LCK must not be generated for overlapped monitored connections. For the
case where one of the endpoints in an overlapping monitored connection is located inside a SNC protected
domain while the other endpoint is located outside the protected domain, the SNC protection should be
forced to working when the endpoint of the overlapping monitored connection is located on the working
connection and forced to protection when the endpoint is located on the protection connection.
8 Protection architectures
In a linear protection architecture, protection switching occurs at the two distinct endpoints of
a protected trail or protected subnetwork connection. Between these endpoints, there will be both
"working" and "protection" entities.
For a given direction of transmission, the "head-end" of the protected signal is capable of
performing a bridge function, which will place a copy of a normal traffic signal onto a protection
entity when required. The "tail-end" will perform a selector function, where it is capable of
selecting a normal traffic signal either from its usual working entity, or from a protection entity.
In the case of bidirectional transmission, where both directions of transmission are protected, both
ends of the protected signal will normally provide both bridge and selector functions.
The following architectures are possible:
1+1 – In a 1+1 architecture, a single normal traffic signal is protected by a single protection entity.
The bridge at the head-end is permanent. Switching occurs entirely at the tail-end.
1:n – In a 1:n architecture, 1 or more normal traffic signal(s) are protected by a single protection
entity. The bridge at the head-end is not established until a protection switch is required. In the case
where n > 1, it cannot be known which of the normal traffic signals should be bridged onto the
protection entity, until a defect is detected on one of the protected signals. 1:n architectures are
capable of carrying an extra (low priority, pre-emptable) traffic signal on the protection entity when
it is not being used to protect any normal traffic signal. A 1:n architecture can be used even for
n = 1 (1:1). This might be chosen over the simpler 1+1 architecture (which requires no head-end
actions of the protection algorithm) since 1:1 is capable of carrying extra traffic, where 1+1 is not.
m:n – In this architecture, m protection entities are used to protect n working entities. This is for
further study.
With the assumption of a larger APS channel, the coding for the entity number "n" will use a full
byte rather than the few bits in synchronous digital hierarchy (SDH). Two of the 256 values are
reserved: 0 is used to indicate a null signal or the protection entity and 0xFF (255) is used to
indicate extra traffic.
The architecture at each end of the connection must match.
Table 8-1 – Overview of linear OTN protection architectures and related monitoring
ODU entities
APS
Protection for Server
Swit- channel Protection Trigger
Protection subclass protection layer of
ching used and switched criteria
architecture and switching, protected
type MFAS in entity used
monitoring individual/ entity
bits 6-8
group
1+1 Unidir SNC/I Individual No One HO ODUkP or ODU
ODUk or ODUkT SSF/SSD
one OTUk
1+1 Bidir SNC/I Individual 111 One OTUk ODUkP or ODU
or one HO ODUkT SSF/SSD
ODUk
1:n Bidir SNC/I Individual 111 One OTUk ODUkP or ODU
or one HO ODUkT SSF/SSD
ODUk
1+1 Unidir SNC/Ne Individual No One or ODUkP ODU
more HO TSF/TSD
ODUk
and/or
OTUk
1+1 Bidir SNC/Ne Individual 000 One or ODUkP ODU
more HO TSF/TSD
ODUk
and/or
OTUk
1+1 Unidir SNC/Ns Individual4 No One or ODUkT ODU
more HO TSF/TSD
ODUk
and/or
OTUk
1+1 Bidir SNC/Ns Individual4 001-110 One or ODUkT ODU
more HO TSF/TSD
ODUk
and/or
OTUk
1+1 Unidir SNC/S Individual4 No One or ODUkT or ODUkT
more HO ODUkP SSF/SSD
ODUk
9 APS protocol
Examples of operation
(This appendix does not form an integral part of this Recommendation.)
Selector
Bridge
Bridge
A B
NR 0, 1
Signal fail 1 SF 1, 1
Switch
Signal deg. 1
SD 1, 1 Switch
Clear SF 1 DNR 1, 1
Clear SD 1
WTR 1, 1 Set timer
NR 0, 1
Timer expiry
Switch back
Figure I.1 – Example APS message flow for 1+1 unidirectional switching
Selector
Bridge
Bridge
NR 0, 1
SF 1, 1
Signal fail 1
Switch RR 1, 1 Switch
DNR 1, 1
a)
Clear SF 1 DNR 1, 1 Reply
a) Historically, DNR was acknowledged with RR. Here, answering DNR with DNR makes no fundamental difference in the
states of the two sides and it allows for a meaningful exercise implementation.
Figure I.2 – Example APS message flow for 1+1 bidirectional switching
Selector
Bridge
Bridge
NR 255, 255
SD 2, 255
Signal degrade 2 Bridge 2
Squelch ET sink Squelch ET sink
RR 2, 2
Bridge 2
Select 2 from
protection SD 2, 2
Select 2 from
protection
SF 3, 2 Signal fail 3
Release selector
Bridge 3
Release selector RR 3, 3
Select 3 from
SF 3, 3 protection
bridge 3
Select 3 from
protection
WTR 3, 3 Clear signal
Reassert signal fail 3
degrade 2 SD 2, 3
Release selector
RR 2, 2 Release selector
Select 2 from bridge 2
protection SD 2, 2
bridge 2 Select 2 from
protection
WTR 2, 2
Clear signal
degrade 2
NR 255, 2
WTR timer Exp. Bridge extra
Release selector NR 255, 255
traffic
Figure I.3 – Example APS message flow for 1:n bidirectional switching
NR 0, 1
EX 0, 1
Exercice
command Reply
RR 0, 1
NR 0, 1
Clear exercice Reply
command NR 0, 1
G.873.1(11)_FI-4
DNR 1, 1
EX 1, 1
Exercice
command Reply
RR 1, 1
DNR 1, 1
Clear exercice Reply
command DNR 1, 1
G.873.1(11)_FI-5
EX 0, 0
Exercice
command Reply
RR 0, 0
NR 0, 0
Clear exercice Reply
command NR 0, 0
G.873.1(11)_FI-6
NR 255, 255
EX 255, 255
Exercice
command Reply
RR 255, 255
NR 255, 255
Clear exercice Reply
command NR 255, 255
G.873.1(11)_FI-7
Table II.1 – Overview of linear OTN client protection architectures and related monitoring
ODU entities
APS
Protection for Server
Protection channel Protection Trigger
Switching subclass protection layer of
architec- used and switched criteria
type and switching, protected
ture MFAS in entity used
monitoring individual/ entity
bits 6-8
group
1+1 Unidir SNC/Nc Individual No One or LO LO ODU
more HO TSF/TSD + LO
ODUk OPU-CSF
and/or
OTUk
1+1 Unidir SNC/I Individual No One LO Client Client_CI_CSF
ODUk Client_CI_SSD
1+1 Bidir SNC/I Individual LO 000 One LO Client Client_CI_CSF
ODUk Client_CI_SSD
1:1 Bidir SNC/I Individual LO 000 One LO Client Client_CI_CSF
ODUk Client_CI_SSD
II.2 Model of client SNC/Nc protection architecture of OTN linear client protection
Figure II.1 provides the model overview of the client SNC/Nc scheme as listed in Table II.1. The
protection uses the ODU connection function and the CI_SSF CI_CSF information of the ODU
NIM OTN as input to the protection. This is a special version of the 1+1 ODUk SNC/N protection
method in which the status of the incoming client signal as encoded in the client signal fail (CSF)
indication of the optical payload unit (OPU) is used as an additional signal fail condition.
Monitoring method
Non-intrusive with client fail – Protection switching is triggered by a non-intrusive monitor of the
ODUkP trail and OPUk-CSF at the tail-end of the protection group.
NOTE – This monitoring type is also intended to support protection switching in dual-root 1+1 p2mp,
unidirectional switched SNC/Nc protected ODUk connections, which are deployed in content distribution
applications.
Protection architecture
Dual-root 1+1 – In a dual-root 1+1 architecture, two unidirectional client signals with the same
content, typically applied at different locations to the OTN, are protected. One of the client signals
is carried in a working ODUk connection and the other client signal is carried in a protection ODUk
connection. Switching occurs entirely at the tail-end by monitoring the ODUk and OPUk.
ODUk
SF SF
SD SD
ODUkP/Client
ODUkP/Client
Working Protection
ODUkP
ODUkP
ODUk CP ODUk CP
SSF SSF
ODUkT/ODUk ODUkT/ODUk
OTUk[V]/ODUk OTUk[V]/ODUk
ODUkP/ODU[j]j ODUkP/ODU[j]j
G.873.1(11)_FII-1
Figure II.1 gives the atomic functions involved in SNC/Nc protection. The working and protection
ODU_CI coming from either an OTUk[V]/ODUk_A or ODUkT/ODUk_A or ODUkP/ODUj_A
function are monitored by a ODUkP and ODUkP/Client non-intrusive monitor, which provide the
SF and SD protection switching criteria. The protection may rely on a particular ODUk/Client
adaptation source function which is capable to activate OPUk-CSF under failure of the client signal,
as for example a ODU0P/ETC3_A_So function which could be capable to activate OPU0-CSF
under failure of the 1GE content stream.
II.3 Model of client SNC/I protection architectures of OTN linear client protection
Figure II.2 provides the model overview of the client SNC/I schemes as listed in Table II.1. The
protection uses the client connection function external to the OTN and the OPU-CSF transport of
the OTN as input to the protection.
SNC/I client protection requires that the client signal be split between two different ports in the
client-to-network direction. Each port maps the client into an ODUk and the two ODUk are carried
across the OTN as if they were unrelated, unprotected signals. At the far end, the two ODUks are
each terminated and the client signals are recovered. One or the other client signal is transmitted,
based on monitoring of the ODUk overhead (including OPU-CSF). Two different selection
mechanisms are possible, as shown in Figure II.2. Option (a) uses a Y-cable and a control process
that monitors the ODUkP trail termination functions to determine which one provides the better
signal and controls the client termination function (srv_TT) such that only one of the two
transmitters is active. Option (b) uses an external optical switch with a selector that is controlled by
the ODUkP trail termination functions. The client's APS information is transported over the ODUk
PM APS channel. Access to this channel is provided via an extended version of the ODUkP/CBR
adaptation functions specified in [ITU-T G.798]. The extension contains support for ODUk PM
APS insertion and extraction processes as illustrated in Figures II.3 and II.4.
ODU ODU
Control Control
process process
Y- cable
Optical switch
PT
CI_CSF
CSF
CI_APS
PMAPS
RES
MI_AcPT
Extract PT PT process
Figure III.1 – Network with OTS and OMS optical signal maintenance entities (OSME)
OTS OSME protection
A protected OTS OSME can be provided between two nodes. In this case there is a separate OSC
channel for the working and protection links and there may optionally be redundant amplifiers.
Trail protection is used for the OTS-O sublayer. The optical switch and OTS-O trail protection are
coordinated such that they switch together. This is shown in Figure III.2.
Series D Tariff and accounting principles and international telecommunication/ICT economic and
policy issues
Series E Overall network operation, telephone service, service operation and human factors
Series J Cable networks and transmission of television, sound programme and other multimedia
signals
Printed in Switzerland
Geneva, 2017