pos_pg_opt_tm_ae

  • Upload
    kajfahm

  • View
    223

  • Download
    0

Embed Size (px)

Citation preview

  • 8/10/2019 pos_pg_opt_tm_ae

    1/64

    PoSPacket over SONET/SDHPocket Guide

  • 8/10/2019 pos_pg_opt_tm_ae

    2/64

  • 8/10/2019 pos_pg_opt_tm_ae

    3/64

  • 8/10/2019 pos_pg_opt_tm_ae

    4/64

    4

    This Pocket guide is intended to provide an overview of transporttraffic features and especially the transport below the Internetprotocol (IP) layer, known as Packet over SONET/SDH (PoS).

    Towards the end of the 1980s, synchronous digital hierarchy(SDH) and synchronous optical network (SONET) technologywere introduced to overcome the problems with plesiochronousdigital hierarchy (PDH) technology. Both SDH and SONET are timedivision multiplexing (TDM) transmission technologies. The SDH/SONET standard has evolved to 10 G for todays new systems,which are mainly optimized for voice transmission. However,the trend is not only towards higher bit rates like 40 and 80 G,wavelength division multiplexing (WDM) technology is alsoenjoying steady growth. Systems with up to 160 wavelengthchannels are now operating, each transmitting 10 G on one fiber. These trends are driven by market development towards moredata-oriented traffic. IP in particular, continues to grow at an

    explosive pace. Leading Internet providers report that bandwidthdoubles approximately every 6 to 9 months on their backbones.

    Introduction

  • 8/10/2019 pos_pg_opt_tm_ae

    5/64

    5

    The adoption of Intranets and Extranets for networkedcommerce will bring further changes to the IP-serviceinfrastructure, both through bandwidth demands and feature

    requirements. Service providers recognize this unprecedentedexplosion in packet-based traffic and are reevaluating theirnetwork architectures in light of these changes. Resourcefuldesigners combine the benefits of dense wavelength divisionmultiplexing (DWDM), TDM and the reliable SDH/SONETtechnologies. In doing so it is possible to transport data streamsup into the terabit range. The increased IP traffic requires atechnology to transport the IP packets to the physical layer. Thistransport below IP is presented by PoS as one possible route.

  • 8/10/2019 pos_pg_opt_tm_ae

    6/64

    6

    Benefits of Packetover SONET/SDH

    Efficient point-to-point IP service at high speeds Future-proof technology IP offers simultaneous handling of voice, video, and data traffic

    Utilizes advantages (reliability, scalability, and manageability) of existingSDH/SONET infrastructure

    PoS offers significant advantages through efficient bandwidth utilization due toless overhead, see Figure 1

    One layer less to manage than with ATM, see Figure 2 Reuse of familiar link-layer protocols

    Figure 1. PoS and ATM bandwidthefficiency

    Packet size (byte)

    64

    % E ffi c i e n c y

    128 256 512 1024 1518 2048 4352

    100

    30

    40

    50

    60

    70

    80

    90

    110

    PoS ATMoS4488

  • 8/10/2019 pos_pg_opt_tm_ae

    7/64

    7

    IPATM

    SDH/SONET

    DWDM

    Figure 2. Possible scenario for IP trafficto the physical layer

  • 8/10/2019 pos_pg_opt_tm_ae

    8/64

  • 8/10/2019 pos_pg_opt_tm_ae

    9/64

    9

    The Application, Presentation, and Session layers (7, 6, and 5) are merged and ifollowing section will be referred to as the Application layer.

    The applications can be divided into two groups, one using theTransmission ControlProtocol (TCP) for additional transport, the other utilizingUser Datagram Protocol(UDP) protocol. (The difference between these two protocols will be addressed late

  • 8/10/2019 pos_pg_opt_tm_ae

    10/64

    10

    Table 1 provides an overview of the most commonly used applications to the readerbecause they are regularly used in daily life. Some are mentioned briefly below:

    User Application Protocol Request for Comments(RFC)

    E-mail Simple Mail Transfer RFC 821 ProtocolSMTPFor copying files File Transfer Protocol RFC 959File transfer FTP

    Remote terminal login Telnet RFC 854Exchange of WWW Hyper Text Transfer RFC 1945information ProtocolHTTPFor Simple Network Simple Network RFC 1157Management applications Management ProtocolSNMPIdentification of host Domain Name System RFC 2929, RFC 1591with IP address DNS

    This booklet only provides a general overview of the protocols running in theapplication layers.

    Table 1. Application protocolsand their use

  • 8/10/2019 pos_pg_opt_tm_ae

    11/64

    11

    Transport Layer

    Figure 4. UDP datagram

    The Transport layer contains two major protocolsTCP and UDPdistinguishby their reliability and low transport overhead.

    User Datagram Protocol (UDP) The User Datagram Protocol is the simpler ofthe two and is typically used when reliability and security are of secondary impotance to the speed and size of the overhead. It is an end-to-end protocol which aport addresses, checksum error control and length information to data from theupper layer. Figure 4 illustrates the UDP header format.

    8 bit 8 bit 8 bit 8 bit

    Source Port Destination Port

    Length Checksum

    Payload

  • 8/10/2019 pos_pg_opt_tm_ae

    12/64

    12

    Table 2 provides a brief description of these header fields: Source port Specifies the port address of the application program

    which created the messageDestination port Specifies the address of the application program which

    will receive the messageLength (16 bit) Specifies the total length of the user datagram in bytesChecksum This is a 16-bit field used in error detection

    When paired with theInternet Control Message Protocol (ICMP), UDPcan inform the transmitter when a user datagram has been damaged and discarded.Neither protocol is able to specify which packet has been damaged when repairingan error. UDP can only signal that an error has occurred.

    Transmission Control Protocol (TCP) TCP provides full transport layer servicesto applications. It isconnection-oriented, meaning that a connection must beestablished between two peers before either can transmit data. In doing so, TCP

    establishes avirtual connection between sender and receiver which remainsactive for the duration of the transmission.

    Table 2. Definitions of UDPheader fields

  • 8/10/2019 pos_pg_opt_tm_ae

    13/64

    13

    Figure 5. TCP datagram

    Each transmission via TCP starts with a message to the receiver, alerting it thatmore IP packets are on their way. Each transmission is terminated by a terminationmessage. When sending data, TCP divides long data packets into smaller data unit

    and packages them into segments. Each segment includes a sequencing number reordering after receipt, as well as an acknowledgment ID number. These segmentare transported across the network inside the IP datagrams. The receiver collectseach datagram as it comes in and re-orders the transmission based on the sequencenumbers. TCP is a reliable protocol, as each data transmission is acknowledged byreceiver with TCP, data is transmitted in both directions. If the sender does not recan acknowledgment within a specified time, it retransmits the data. To provide secdelivery for the TCP an extensive segment header is required (see Figure 5).

    8 bit 8 bit 8 bit 8 bit

    Source Port Destination Port

    Sequence Number

    Acknowledgment Number

    HLEN Reserved Control Window

    Checksum Urgent Pointer

    Options Padding

    Payload

  • 8/10/2019 pos_pg_opt_tm_ae

    14/64

    14

    Table 3 describes the TCP segment fields.

    Source port Defines application program in the source computerDestination port Defines the application program in the

    destination computerSequence number The sequence number shows the position of the data

    in the original data streamAcknowledgment 32-bit acknowledgment number is used tonumber acknowledge receipt of dataHeader length (HLEN) Indicates the number of 32-bit words in the

    TCP headerReserved 6-bit field reserved for future useControl 6-bit field providing control functionsWindow size 16-bit field defines the size of the sliding windowChecksum 16-bit checksum used in error detectionUrgent pointer Valid only when the URG bit in the control field is activeOptions and padding Defines optional fields and are used to convey additional

    information to the receiver or for alignment purposes

    Table 3. TCP header field definitions

  • 8/10/2019 pos_pg_opt_tm_ae

    15/64

    15

    Comparing UDP and TCP protocols:UDP features TCP features Connectionless protocol Connection-oriented protocol

    No error recovery Error detection and recovery Unreliable Reliable Fast speed Slower than UDP Small overhead Large overhead

    UDP applications TCP applications Voice HTTP Broadcasting FTP

    The History of the Internet Protocol The Internet Protocol (IP) was developedby the Advanced Research Project Agency (ARPA), an arm of the U.S. DepartmDefense and was first tested in 1968/69 with computer-to-computer connectionThe objective was to ensure that the military could maintain communications in

    the event of a nuclear war. The protocols and conventions developed by the ARevolved to become TCP/IP. Due to the growth of TCP/IP traffic the ARPANETthe backbone of a network known today as the Internet.

    Network Layer Internet Protocol version 4

  • 8/10/2019 pos_pg_opt_tm_ae

    16/64

    16

    Figure 6. The format of anIP datagram

    IP is the transmission method used by TCP/IP.IP transport is sent in packets called datagrams, each of which are transportedseparately. The individual packets may travel by different routes, as IP has no track-

    ing capabilities or facility for reordering lost datagrams.

    Version IHL Type of Service Total Length

    Identification Flags Fragment Offset

    Time to live Protocol Header Checksum

    Source Address

    Destination Address Options Padding

    Payload

    8 bits 8 bits 8 bits 8 bits

    An IP datagram is a variable-length packet of up to 65,536 bytes consisting of two

    parts; the header (made up of 20 to 60 bytes) and the data (20 to 65,536 bytes). Theheader contains essential information about routing and delivery service of the IPpackets. The structure of the IP header is illustrated in Figure 6. Table 4 provides theIP header field definitions.

  • 8/10/2019 pos_pg_opt_tm_ae

    17/64

    17

    Version This field defines the version number. IPv4 corresponds to bin. 0100.Internet Header This field defines the length of the header in multiplesLength (IHL) of four bytes.Type of Service This field defines how the datagram should be handled (priority of transport, reliability and delay) and contains information on the type of service (ToS).Total Length This field defines the total length of the IP datagram. It is a two-byte field (16 bits) and can define up to 65,536 bytes (this includes the header and the data).Identification This field is used in fragmentation. When packets are moving independently through the network, they are identified by a number in this field.Flag The bits in this field handle fragmentation.Fragmentation This field provides a pointer which shows the offsetOffset of the data in the original datagram.

    Table 4. IP header field definitions

  • 8/10/2019 pos_pg_opt_tm_ae

    18/64

  • 8/10/2019 pos_pg_opt_tm_ae

    19/64

  • 8/10/2019 pos_pg_opt_tm_ae

    20/64

    20

    Class A only uses one byte to identify the class type and Net-ID, leaving three bytesavailable for Host-ID numbers. This results in Class A networks accommodatingfar more hosts thanClass B orC networks. At present Classes A and B are full.Addresses are only available in Class C.An overview of how many networks and hosts can be supplied by different types ofclass is shown in Table 5.

    Class A 127 possible network IDs 16,777,214 host IDs per network ID

    Class B 16,384 possible network IDs

    65,534 host IDs per network IDClass C 2,097,152 possible network IDs 254 host IDs per network ID

    Class Dis reserved formulticast addresses, meaning that IP datagrams can bedelivered only to a selected group of hosts rather than to an individual.

    Class E is reserved for future use. Internet addresses are usually written in decimalform, points separating the bytes (for example, 137.23.145.23).

    Table 5. Internet Class addressesand their potential use

  • 8/10/2019 pos_pg_opt_tm_ae

    21/64

    21

    Figure 9. IP addressing in caseof subnetting

    Subnetting To circumvent some of the limitations of the addressing conven-tions of IPv4, it is possible to introduce subnet structures. The addressing conve(RFC 950) used results in the following division of the classes (see Figure 9).

    The network administrator is able to divide the host address space into groups(subnets) mainly to mirror topological or organizational structures. At a universfor example, the various faculties might be groups under the host name.This procedure simplifies routing in a network and allows a clearer structure of th

    network to be seen.Figure 10 illustrates how a subnetting structure might look.

    10 Net-ID Subnet ID Host-ID

  • 8/10/2019 pos_pg_opt_tm_ae

    22/64

    22

    Internet Control Message Protocol (ICMP) The Internet Control MessageProtocol (ICMP) is used by hosts and gateways to inform the sender of datagramproblems and to exchange control messages. The ICMP (Recommendation RFC 792)uses IP to deliver these messages. Although IP is an unreliable and connectionless

    protocol, ICMP uses IP to inform the sender of undeliverable datagrams. ICMP onlyreports problems, it does not correct errors. The following examples show the mes-sage types that can be sent:

    Figure 10. Example of subnetting fora Class-A type IP address

    Subnet 1129.69.1.x Subnet 3129.69.3.xSubnet 2129.69.2.x

    Host

  • 8/10/2019 pos_pg_opt_tm_ae

    23/64

    23

    Error messages Information messages Destination unreachable Echo request, echo response Redirect packet Time stamp (ping) Time exceeded

    If a user types an incorrect HTTP address in the Web browser, it is sent to the Dserver which in turn returns an IP address to be sent to the respective server. If server is down, the user receives the message Destination unreachable.

    IP Routing and Switching In the Internet, packets are dynamically routed fromthe source to the destination by a hop-by-hop movement. Routers and switches used to ensure the packet is delivered correctly.Routers are intelligent network elements operating in the Network layer of theOSI model. Routers have access to Network layer addresses and contain softwaenabling them to determine which of several possible paths between addressesis appropriate for a particular transmission. Routers relay packets among multipinterconnected networks and can route packets from one network to any numbedestination networks on an Internet (see Figure 11).

  • 8/10/2019 pos_pg_opt_tm_ae

    24/64

    24

    The IP networks are usually designed in a mesh structure so that if an interruption inthe transmission occurs, an alternative path can be found quickly. The routing processis adynamic procedure which allows the system to forward a packet via its mostefficient path from source to destination address. The decision as to how packets

    are routed through a network follows multiple routing algorithms. The description ofthese algorithms would, however, be beyond the scope of this booklet.Switches are layer 2 network elements responsible for establishing temporarystaticconnections between two or more devices linked to the switch, but not to each other.

    Figure 11. Possiblerouting scenario Router

    Source

    Destination

    Router

    Router

    Router

    Router

    Router

  • 8/10/2019 pos_pg_opt_tm_ae

    25/64

    25

    Figure 12 illustrates a switched network. The communicating devices are labeleB, C, D, and the switches I, II, III, IV. Each switch is connected to multiple linkis used to complete the connections between the communicating peers. As soonthe switches are set, they are static for one specific transmission process and can

    then be reconfigured. Figure 13 shows two principal switching methods availab

    Figure 12. Switchednetwork

    A

    III

    IVIII

    B

    C

    D

  • 8/10/2019 pos_pg_opt_tm_ae

    26/64

    26

    Circuit switching was designed primarily for voice communication. In a telephoneconversation, for example, once a circuit is established it remains connected for

    the duration of the session. Circuit switching is not suitable for data or othernon-conversational transmissions. Non-voice transmissions tend to come in bursts;therefore, in a circuit-switched circuit, the line is often idle and its facilities wasted.In apacket switched network, data is transmitted in discrete units of potentiallyvariable length packets. The maximum length of a packet is established by the net-work and long transmissions are broken into multiple packets. Each packet contains

    not only the data but also a header containing the control information. The packetsare sent over the network hop-by-hop and routed through the network according tothe information in the packet header with the address information. WithMessageswitching, a network node receives a message, stores it until the appropriate routeis free, then sends it.

    Figure 13. Networkswitching methods Switching methods

    Circuit switching Packet switching

    Mainly voice traffic Mainly data traffic

  • 8/10/2019 pos_pg_opt_tm_ae

    27/64

    27

    From the Network layer, the IP packets need to be delivered to underlying layerThe actual transmission below the Transport layer is called packet over SONETSDH (PoS). This transmission can be achieved via alternative routes, two of whicillustrated in Figure 14.

    The route (black line) described in this booklet is recommended by the InternetEngineering Task Force (IETF) and is illustrated in Figure 15.

    Packet overSONET/SDH (PoS)

    Figure 14. Alternative routes for transmittingIP packets to the fiber

    PPP

    HDLC

    SDH/SONET

    Fiber

    ATM

    IP

  • 8/10/2019 pos_pg_opt_tm_ae

    28/64

    28

    The IP packets are encapsulated in a Point-to-Point Protocol which in turn is mappedinto a HDLC-like frame. This frame is then mapped into the SONET/SDH frame.

    The Point-to-Point Protocol (PPP) provides a standard method for transportingmulti-protocol datagrams, such as IP packets, over point-to-point links. Initially,

    PPP was used over plain old telephone service (POTS). However, since the SONET/SDH technology is by definition a point-to-point circuit, PPP/HDLC is well-suited foruse over these lines. PPP is designed to transport packets between two peers acrossa simple link.

    Figure 15. Mapping of IP packets intoSONET/SDH frames

    Point-to-Point Protocol

    Flag Address Control HDLC Payload CRC Flag

    H Packet contents

    7E FF 03 YY 7E

    SONET/SDH

    HDLC

    PPP

    OP

    Protocol PPP payload

    16/32

    OH Payload

  • 8/10/2019 pos_pg_opt_tm_ae

    29/64

    29

    Features of the PPP link: Allows for full-duplex and simultaneous operation No restrictions regarding transmission rates imposed Operates across most data terminating equipment/data circuit-terminating

    equipment (DTE/DCE) interfaces (e.g., RS232, RS422, V.35, etc.) Does not require any hardware control signals (e.g., Request to Send, Clear To

    Send, etc.)

    PPP is intended to provide a common solution for the easy connection of a widevariety of hosts, bridges, and routers. The encapsulation of PPP into HDLC-likeframes allows for the multiplexing of different network-layer protocols, such as

    IPX, AppleTalk, and others, simultaneously over the same link.

    PPP consists of three main components: A method for encapsulating multi-protocol datagrams (PPP encapsulation) A Link Control Protocol (LCP) for establishing, configuring, and testing of th

    link connection

    A family of Network Control Protocols (NCPs) for establishing and configuridifferent network layer protocols

  • 8/10/2019 pos_pg_opt_tm_ae

    30/64

    30

    PPP Encapsulation andPPP Emulation

    Figure 16. PPP encapsulationaccording to RFC 1661

    PPP Encapsulation To allow multi-protocol datagrams to be transmittedacross a link, a method must be used to enable unambiguous decisions to be madebetween the various protocols. The PPP encapsulation of the IP packets is illustratedin Figure 16.

    The fields are transmitted from left to right with these names and functions:

    Protocol Field Consists of 1 or 2 octets, with values identifying the encapsulated

    datagram.Data Field This field is zero or more octets long and it contains the datagram forthe protocol specified in the protocol field. The maximum length, including padding(but not the protocol field) defaults to 1500 octets. This means, for example, that ifan IP datagram with a larger payload were transported it would be fragmented intoseveral packets to fit the size of the data field.Padding Field At the beginning of the transmission this field may be paddedwith an arbitrary number of octets (up to 1500 octets). It is the responsibility of theprotocol to distinguish padding from real information.

    Protocol 8/16 bits Payload Padding

  • 8/10/2019 pos_pg_opt_tm_ae

    31/64

    31

    PPP Emulation The PPP Emulation describes: Link Control Protocol Network Control Protocol

    The LCP is responsible for correctly establishing, configuring, and testing the Pto-Point Protocol. Before IP datagrams can be transported across a PPP link, eacthe connected PPP interfaces must send out a series of LCP packets.

    Figure 17 illustrates the five key LCP steps which are described in this section.

    Link Control Protocol (LCP)

    Figure 17. Illustration ofLCP procedure

    C021 (LCP)

    Authenticate

    Establish Terminate

    Dead Start

    NCPNetwork

    SONET/SDH

    Flag FF03 ProtocolPayload FCS FlagHDLC/PPP

    OH Payload

  • 8/10/2019 pos_pg_opt_tm_ae

    32/64

    32

    Step 1: Link Dead Each PPP connection starts and ends in this state. In thisstate there is either no connection to the modem or the connection has been inter-rupted. When an external event (control signal or network administrator) indicatesthat the Physical layer is ready to be used, PPP proceeds to the establishment phase.

    Step 2: Link Establishment Before data from an upper layer (e.g., IP) can betransported across a connection, the link is prepared via configuration packets. Thisexchange is completed, and the Open state achieved after a Configure packet hasbeen sent and received. All configuration options are set to default values, unless al-tered. Any non-LCP packets received during the establishment phase are discarded.

    Step 3: Authentication This is an optional step, allowing the PPP peers toidentify each other via authentication protocols. These are calledPasswordAuthentication Protocol (PAP) andChallenge Handshake AuthenticationProtocol (CHAP).

    ThePassword Authentication Protocol sends a password across the link, tonegotiate the circumstances for operation.

  • 8/10/2019 pos_pg_opt_tm_ae

    33/64

    33

    TheChallenge Handshake Authentication Protocol ensures reliable and secureauthentication because the authenticator and authenticatee share a commonpassword. The authenticator sends the connected peer a challenge in the form ofa random number. The authenticatee uses this random number to derive a secrecode. This code is then transmitted to the authenticator and if the results match, next connection stage can proceed.

    Step 4: Network Layer Protocol Configuration This is necessary to configurethe Network Control Protocols (NCP) used on this connection. Each network laprotocol (e.g., IP, Appletalk, etc.) must be separately configured by the appropri

    NCP. It is possible with PPP to run several NCPs over one connection.

    After an NCP reaches the Opened state, PPP will carry the corresponding netwolayer protocol packets. Any network-layer protocol packets received prior toreaching the corresponding Opened state are discarded. During this phase, linktraffic consists of any possible combination of LCP, NCP, and network-layer propackets.

  • 8/10/2019 pos_pg_opt_tm_ae

    34/64

    34

    Step 5: Link Termination The LCP makes it possible to close a connection atany time. This can be done by a user event, set timer, or missing interface signal.Between step 3 and step 4, link quality monitoring (LQM) can take place andthe data connection tested for transmission quality. TheLink Control Protocolinformation is sent in the form of PPP datagrams, which fall into these threemajor classes: Link configuration packets used to establish and configure a link (RFC 1661) Link termination packets used to terminate a link (RFC 1661) Link maintenance packets used to manage and debug a link (RFC 1661)

    A family of Network Control Protocols helps to prepare and configure differentprotocols to run in the various network layers. Figure 18 illustrates and describes anexample of one of these protocols, IPCP.

    Network Control Protocol (NCP)

  • 8/10/2019 pos_pg_opt_tm_ae

    35/64

    35

    This protocol enables activation, configuration, and deactivation of the IP protocmodules on both sides of the point-to-point connection. Like the LCP, these funcare achieved by exchanging special data packets; for IPCP, this packet is hex 802(protocol identifier). The exchange of IPCP packets starts after completing step 4the LCP protocols. The NCP then runs through steps equivalent to those of the Lprocedure once the LCP protocol is in the network state (see Figure 18).

    Figure 18. Illustration of a commonNCP procedure

    8021

    Authenticate Network

    Establish LCPDead

    SONET/SDH

    Flag FF03 ProtocolPayload FCS FlagHDLC/PPP

    OH Payload

    Start

  • 8/10/2019 pos_pg_opt_tm_ae

    36/64

    36

    High-Level Data Link Control(HDLC)

    Figure 19. Format of HDLC-like frameaccording to RFC 1662

    When the LCP and the NCP protocols are fulfilled the data can be transmitted acrossthe point-to-point connection.

    The Point-to-Point Protocol provides a standard method for transporting multi-protocol datagrams over point-to-point links. The PPP packets are encapsulated ina HDLC-like frame which is then mapped into the SONET frame. The format of thisHDLC frame is illustrated in Figure 19.

    Flag Sequence Each frame begins and ends with a flag sequence, which is thebinary sequence 01111110 (hex 0x7e). All implementations check for this framesynchronization flag. Only one flag sequence is required between two frames. Twoconsecutive flag sequences constitute an empty frame which is then discarded.

    Address Field The address field is a single octet containing the binary sequence11111111 (hex 0xff). Individual station addresses are not assigned.

    Flag Address Control Protocol Information FCSFlag

    Control Field The control field contains the binary sequence 00000011

  • 8/10/2019 pos_pg_opt_tm_ae

    37/64

    37

    Control Field The control field contains the binary sequence 00000011(hex 0x03). Frames with unrecognized control field values are discarded.

    Protocol Field The protocol field is one or two octets, with a value identifyingthe datagram encapsulated within the packets information field.Table 6 shows the identifiers for the most frequently used protocols.

    Hex value Protocol used

    0021 IPC021 LCP8021 NCP (IPCP)

    Information The information field is zero or more octets and contains the datagram for the protocol specified in the protocol field. The Information Field, inclpadding but not including the protocol field, is called the maximum receive unit(MRU) and has a maximum length of 1500 octets.

    Padding The Information field may be padded with an arbitrary number ofoctets up to the MRU.

    Table 6. Identifiers used in the protocolfield in the HDLC frame

  • 8/10/2019 pos_pg_opt_tm_ae

    38/64

    38

    Frame Check Sequence Field The frame check sequence (FCS) defaults to 16 bitsfor OC-3/STM-1 although other speeds use 32 bits as well. Its use is described in PPPLCP Extensions of RFC 2615.

    The FCS field is calculated over all bits of the address, control, protocol, information,and padding fields and is illustrated by the grey fields in Figure 20. Itdoes notinclude the Flag Sequences or the FCS field itself.

    PPP uses the FCS for error detection and is commonly available in hardware imple-mentations. The end of the information and padding fields is found by locatingthe closing flag sequence and removing the frame check sequence field. TheHDLCprocess and related recommendations are illustrated in Figure 21.

    Figure 20. Fields of the HDLC-like frameused to perform the FCS

    Figure 21. How an IP packet is transmittedto and received by the SONET/SDH frame

    SONET/SDHFraming

    De-Mapping,De-Scrambling

    ByteStuffing

    FCSGenerationPPP

    SONET/SDHFraming

    Mapping,De-Scrambling

    ByteStuffing

    FCSGenerationPPP

    Transmit ow

    RFC1661 RFC1662 RFC2615 G.707GR.253

    Receive ow

    Flag Address Control Protocol Information FCSFlag

  • 8/10/2019 pos_pg_opt_tm_ae

    39/64

    39

    Byte stuffing/destuffing The PPP protocolmust not place any restrictions onthe use of certain bit patterns in the network layer packet and must betransparent to any type of data. Because the PPP protocol uses specific patterns, such as thefield 0x7e which indicates the beginning and end of a frame, a method is requireto avoid restrictions. This is achieved throughbyte stuffing where the PPP definesa specialcontrol escape byte, 0x7d. The byte-stuffing procedure also acts for thecontrol field and the control escape byte.

    The process of byte stuffing is illustrated in Figure 22 where the Flag 7E is replaby 7D,5E.

    Figure 22. Illustration of thebyte-stuffing procedure 03 Flag 7E 59 8A

    03 7D 5E 59 8A

    before

    after

  • 8/10/2019 pos_pg_opt_tm_ae

    40/64

    40

    If the Control Flag 7D is within the payload, it is replaced by 7D,5D.

    Scrambling/Descrambling procedure Described in RFC 2615, a data scramblerwith the 1+x43 polynomial is used in this procedure, as shown in Table 7. While theHDLC FCS is calculated, the scrambler operates continuously through the bytes ofthe payload bypassing SONET path overhead bytes and any fixed information. Thistype of scrambling is performed during insertion into the SONET/SDH payload.

    ThePath signal label C2, as Table 7 shows, is used so that the SONET/SDH canrecognize the payload content.

    Value signal label C2 Scrambler state

    0x16 PPP with 1+x43 scrambling0xCF PPP with scrambler off

    Table 7. Path signal labelC2 identifier

  • 8/10/2019 pos_pg_opt_tm_ae

    41/64

  • 8/10/2019 pos_pg_opt_tm_ae

    42/64

    42

    With the increase in IP traffic transported across SDH/SONET/DWDM networks, itis necessary to measure the quality parameters with genuine IP traffic. Thus, thepayload is filled with HDLC/PPP/IP packets instead of a traditional pseudorandombit sequence (PRBS). This corresponds to a more realistic representation of the realtraffic to be transmitted on these networks.

    The user is provided with information on how many packets were lost in a specifiedperiod (for example, 24 hours), instead of an error rate of 10-14 for instance. This ismore informative than the traditional error rate when sending packets.

    Using packets instead of PRBS to fill the payload provides a more realistic trafficprofile. Due to the increased transport data and IP traffic in our networks, thepayload being filled with IP packets will become more widely accepted in the future.

    The following applications are suitable for measuring the quality parameters ofindividual network elements (NE) as well as entire SDH/SONET/DWDM networksduring installation.

    PoS MeasurementTasks

  • 8/10/2019 pos_pg_opt_tm_ae

    43/64

    43

    Frame errors This error message gives information on the number of HDLCframes lost over a predefined period of time. The customers benefit from receivperformance measurement based on packet rather than byte parameters.

    Frame rate This is the rate of frames which are sent over the link and arecalculated from the HDLC frame size and the bandwidth.

    Transfer delay The transfer delay is the amount of time it takes for IP packetsto travel a set path through the network.

    HDLC bandwidth This corresponds with the user set bandwidth of the link. Theallowable bandwidth depends on the interface used and the container size chose

    HDLC utilization This is a percentage measure of how much of the link is actu-ally in use. These parameters are usually measured by the following application Transparency testing Connectivity testing Performance testing

  • 8/10/2019 pos_pg_opt_tm_ae

    44/64

  • 8/10/2019 pos_pg_opt_tm_ae

    45/64

    45

    To guarantee the proper setup of the transmission line, the measuring equipmensends HCLC/PPP/IP frames and receives them again when the transmitter and treceiver are looped back to each other.

    The parameters, which can change, are the frame size (in bytes) and the bandwiof the transmission. It is also possible to introduce errors and check the resultingdegradations on the receiver. The result of this measurement provides the following parameters: frame error, frame rate, transfer delay, link bandwidth, and linkutilization.

    Usually, this test is performed when a new NE or a new user is connected to thenetwork. It checks whether the NE or user is properly connected to the network if it is able to communicate. A typical test setup is shown in Figure 25.

    The test equipment sends out a ping and waits for the response. Thus measurithe round-trip delay of the ping. The ping parameter provides definite informatiabout the NEs connection state. The time delay indicates the health status of thline to and from the NE. The customer benefits by receiving information about tnew NEs connection.

    Verify IP Connectivity of NewNetwork Elements

    Fi 25 T i l

  • 8/10/2019 pos_pg_opt_tm_ae

    46/64

    46

    This is a test of particular NEs and the entire network under load and checks theinterfaces of NEs.

    Figure 26 illustrates a typical arrangement for such a measurement test.

    Checking PoS Performance

    Figure 25. Typical measurement arrange-ment to check connectivity of NE

    pingrequest

    ADM withIntegratedIP fabric

    Metro area

    OC-192

    ping response

    Router

    CO/POPCore backbone

    Long haul

    DWDM networkl routing

    ADMADM

    JDSUPoS tester

    Fig 26 M t g t

  • 8/10/2019 pos_pg_opt_tm_ae

    47/64

    47

    This test is performed when the customer is connected to the network or whennew connections between NEs are installed. The measuring instrument sends asignal and checks if the NE is connected and can pass the signals through to thenext network element. To perform the PoS performance test, the equipment musbe capable of performing the entire PPP emulation. This measurement delivers tsame parameters as the transparency check.

    Figure 26. Measurement arrangementto check performance of PoS NEs

    PPPemulation

    Router/ intelligentNE

    DWDM networkl routing

    PPPemulation

    Router/ intelligentNE

    JDSU

    PoS tester

    JDSU

    PoS tester

  • 8/10/2019 pos_pg_opt_tm_ae

    48/64

    48

    Table 8 shows a summary of the possible applications for PoS systems.

    Challenge Solution Parameters

    PoS Transparency Is the line be- Send IP traffic Frame error, tween two users and check the frame rate etc. properly set up return traffic. and transparent

    for IP traffic?Connectivity Is a NE or Send ping Ping and user properly request and wait delay time.

    connected to for answers from the network? NE or user. A full PPP emulation

    is required.PoS Performance How does the Perform test Frame error, system behave under load with frame rate, etc. under stress? full PPP emulation.

    Summary of applications

    Table 8. Summary of possibleapplications for PoS systems

    k ll d h h b d d hO tl k

  • 8/10/2019 pos_pg_opt_tm_ae

    49/64

    49

    Future networks will need to cope with the ever-increasing bandwidthrequirements mentioned in the introduction of this booklet.

    TDM transmission rates are increasing to 40 G while simultaneously the numbe

    channels in DWDM systems are increasing to 128 and more. Total capacity rateapproximately 320 G, 1 T, and higher are therefore quite possible. This challengwill be met by some of the technologies described in the following pages.

    When discussing possible future networks the expressionconverging networks is often used.

    Outlook

    Figure 27. Possible convergence scenario in

  • 8/10/2019 pos_pg_opt_tm_ae

    50/64

    50

    Converging networks lead to a decrease in the number of network elements andpotentially less trouble for network operators. One platform used in this process isthe so called Multi-Service Provision Platform. In addition, techniques like Multi-Protocol Label Switching and Multi-Protocoll Switching will help to establish thistrend. Figure 27 illustrates the possible convergence of functions with various layers.

    g gthe telecommunication world

    Functions

    will merge,variousmigrationscenarios

    IP is theUniversalConvergenceLayer

    The existingnetwork:reliable, butunaffordable

    DWDM is mainlong distance +Metro transmissiontechnology

    Multi-Service

    transport

    Fiber

    Opticalnetworking

    IP, Service

    DWDM

    SONET

    ATM

    Fiber

    Si th j it f t l i ti i d t i t d thM lti S i P i i i g

  • 8/10/2019 pos_pg_opt_tm_ae

    51/64

    51

    Since the majority of new telecommunication services are data-oriented, thetransmission on these networks should be data optimized, which can be achiewith Multi-Service Provisioning Platforms (MSPP). These MSPPs enable aggreand switching of data packets by one network element.

    MSPPs can switch voice and video as well as different types of data traffic. Thethree main features are necessary to perform the above tasks: Use DWDM technology to increase capacity of fibers Use of SONET/SDH to ensure QoS for time-sensitive applications Use of Layer 2 and Layer 3 data intelligence (switches and routers) thus allow

    products to switch and route data traffic

    Combining these features into one instrument enables service providers to simptheir networks. Instead of installing a DWDM multiplexer, ADM, and an IP rou just one device can be used. The number of devices and potential problems arereduced as a result.

    Multi-Service ProvisioningPlatform (MSPP)

    Multi Protocol Label Switching (MPLS) is a high performance method of forwardMulti Protocol Label Switching

  • 8/10/2019 pos_pg_opt_tm_ae

    52/64

    52

    Multi-Protocol Label Switching (MPLS) is a high-performance method of forward-ing packets through a network. It is used by routers at the edge of the network toapply simple labels (or identifiers) to packets. These labels allow routers to switchpackets according to their label with a minimal lookup overhead.

    MPLS integrates the performance and traffic management capabilities of Layer 2with the scalability and flexibility of Layer 3.

    The label summarizes essential information about routing the packet including: Destination of packet

    Precedence of packet QoS information The route for the packet, as chosen by traffic engineering (TE)

    At each router throughout the network, only the label of the incomingpacket need be examined in order for it to be sent on to the next router acrossthe network.

    Multi-Protocol Label Switchingand Multi-Protocol l Switching

    (MPLS and MPlS)

    Advantages of this are that only one table lookup list from a fixed length labe

  • 8/10/2019 pos_pg_opt_tm_ae

    53/64

    53

    Advantages of this are that only one table lookup list from a fixed length laberequired and switching and routing functions can be combined. As with a routan optical cross-connect (OXC), can intelligently route a wavelength through OXC. The so called Multi-Protocol l Switching signaling allows an OXC to c

    signal to the next OXC. These devices exhibit similar advantages to the MPLreducing the number of elements and potential problems in the network.

    With the increasing number of Internet users the pool of available addressesAppendix

  • 8/10/2019 pos_pg_opt_tm_ae

    54/64

    54

    With the increasing number of Internet users, the pool of available addressesdefined by IPv4 is decreasing fast. IP version 6 (IPv6) is addressing this and severalother issues such as:

    Quality of Service (QoS). The header is simpler and more flexible than for IPv4 due tothe optional extension header. IPv6 is 128 bits long and consists of 16 bytes (octets).The protocol specifies hexadecimal colon notation. Whereby 128 bits are dividedinto eight sections, each of which are two bytes in length. An example of a principalIPv6 address appears in Figure 28.

    FEEA:7648:CD33:9854:7654:FEDC:CE3E:0020

    As with IPv4, the IP datagram for IPv6 consists of a mandatory base header followedby the payload. The payload consists of two parts: an optional extension header anddata from an upper layer (see Figure 29).

    Appendix

    IP version 6 (IPv6)

    Figure 28. Possible IP address with IPv6

  • 8/10/2019 pos_pg_opt_tm_ae

    55/64

    55

    Figure 29. IP header for IPv6

    Changes in the way IP header options are encoded enable more efficient forwaring, less stringent limits on the length of options, and greater flexibility in introding new options.

    A new capability has been added to facilitate the labeling of packets belonging ta particular traffic flow for which the sender must request special handling. Thesimpler header offers faster processing by routers.

    Base header Payload

    Optional extensionheader Data from upper layer

    The following definitions are taken from RFC recommendations.Terminology

  • 8/10/2019 pos_pg_opt_tm_ae

    56/64

    56

    The following definitions are taken from RFC recommendations.

    Frame The unit of transmission at the data link layer. A frame may include aheader and/or a trailer, along with some number of units of data.

    Packets The basic unit of encapsulation, which is passed across the interfacebetween the network layer and the data link layer. A packet is usually mapped to aframe; the exceptions are when data link layer fragmentation is being performed, orwhen multiple packets are incorporated into a single frame.

    Datagram The unit of transmission in the network layer (such as IP). A data-gram may be encapsulated in one or more packets passed to the data link layer.

    Peer The other end of the point-to-point link.

    Silently discarded The implementation discards the packet without furtherprocessing. The implementation should provide the capability of logging the error,

    including the contents of the silently discarded packet, and should record the eventin a statistics counter.

    Terminology

    AAbbreviations

  • 8/10/2019 pos_pg_opt_tm_ae

    57/64

    57

    ADM add-drop multiplexerARPA Advanced Research Project AgencyATM asynchronous transfer mode

    CCHAP Challenge-Handshake Authentication ProtocolCLEC Competitive Local Exchange Carrier

    DDCE data communications equipmentDNS Domain Name SystemDTE data terminating equipmentDWDM dense wavelength division multiplexing

    FFCS frame check sequence

    FTP File Transfer Protocol

  • 8/10/2019 pos_pg_opt_tm_ae

    58/64

  • 8/10/2019 pos_pg_opt_tm_ae

    59/64

    T

  • 8/10/2019 pos_pg_opt_tm_ae

    60/64

    60

    TCP Transfer Control ProtocolTDM Time Division MultiplexingTE traffic engineering

    ToS type of service

    UUDP User Datagram Protocol

    WWDM wavelength division multiplexing

  • 8/10/2019 pos_pg_opt_tm_ae

    61/64

    Notes

  • 8/10/2019 pos_pg_opt_tm_ae

    62/64

    62

  • 8/10/2019 pos_pg_opt_tm_ae

    63/64

  • 8/10/2019 pos_pg_opt_tm_ae

    64/64

    Test & Measurement Regional Sales 10143226 502 0813 POS.PG.OPT.TM.AE

    North AmericaTOLL FREE: 1 855 ASK-JDSU

    1 855 275-5378

    Latin AmericaTEL: +1 954 688 5660

    FAX: +1 954 345 4668

    Asia PacicTEL: +852 2892 0990

    FAX: +852 2892 0770

    EMEATEL: +49 7121 86 2222

    FAX: +49 7121 86 1222

    www.jdsu.com/test