You are on page 1of 18

Basic principle and

configuration guide for ZXCTN


linear and PW protection
R1.0
Basic principle and configuration guide for ZXCTN linear and PW protection Internal Use
Only
LEGL !N"#R$T!#N
By accepting this certain document of ZTE CORPORATION you agree to the following
terms If you do not agree to the following terms! please notice that you are not allowed
to use this document
Copyright " #$%& ZTE CORPORATION Any rights not e'pressly granted herein are
reser(ed This document contains proprietary information of ZTE CORPORATION Any
reproduction! transfer! distri)ution! use or disclosure of this document or any portion of
this document! in any form )y any means! without the prior written consent of ZTE
CORPORATION is prohi)ited
and are registered trademar*s of ZTE CORPORATION ZTE+s company
name! logo and product names referenced herein are either trademar*s or registered
trademar*s of ZTE CORPORATION Other product and company names mentioned
herein may )e trademar*s or trade names of their respecti(e owners ,ithout the prior
written consent of ZTE CORPORATION or the third party owner thereof! anyone+s access
to this document should not )e construed as granting! )y implication! estopped or
otherwise! any license or right to use any mar*s appearing in the document
The design of this product complies with re-uirements of en(ironmental protection and
personal security This product shall )e stored! used or discarded in accordance with
product manual! rele(ant contract or laws and regulations in rele(ant country
.countries/
This document is pro(ided 0as is1 and 0as a(aila)le1 Information contained in this
document is su)2ect to continuous update without further notice due to impro(ement
and update of ZTE CORPORATION+s products and technologies
ZTE C#RP#RT!#N
Addres
s:
NO 33
4i5tech Road 6outh
6henZhen
PRChina
51!5"
Websit
e:
http788dms9tecomcn .T6:5Technical 6upport/
Email: T6:Aftersales;9tecomcn
ZT# Confidential Proprietary $ %!1& ZT# CO'PO'(TION) (ll rig*ts reser+ed) I
Basic principle and configuration guide for ZXCTN linear and PW protection Internal Use
Only
Re%ision &istor'
Product (ersion )ocu*ent (ersion +erial Nu*,er Reason for Re%ision
'1)! ,irst pu-lis*ed
ut-or
)ate )ocu*ent (ersion
Prepared
,'
Re%ie.ed ,' ppro%ed ,'
%!1!./.0! '1)! Wanc*un
1ong
ZT# Confidential Proprietary $ %!1& ZT# CO'PO'(TION) (ll rig*ts reser+ed) II
Basic principle and configuration guide for ZXCTN linear and PW protection Internal Use
Only
pplica,le to/ PTN commissioning engineer
Proposal/ Before reading t-is docu*ent0 'ou -ad ,etter -a%e t-e follo.ing 1no.ledge and
s1ills.
+E2 3no.ledge and s1ills Reference *aterial
1 PTN O(2 -asic principle T2P34 O(2
%
0
"ollo.4up docu*ent/ fter reading t-is docu*ent0 'ou *a' need t-e follo.ing
infor*ation
+E2 Reference *aterial !nfor*ation
1
%
0
ZT# Confidential Proprietary $ %!1& ZT# CO'PO'(TION) (ll rig*ts reser+ed) III
Basic principle and configuration guide for ZXCTN linear and PW protection Internal Use
Only
,out T-is )ocu*ent
+u**ar'
C-apter )escription
1 ZXCTN protection introduction !ntroducing t-e t'pes of ZXCTN protection in detail
5 Configuration instruction of
ZXCTN linear dual -o*ed
protection
)escript t-e configuration of ZXCTN linear dual -o*ed
protection
ZT# Confidential Proprietary $ %!1& ZT# CO'PO'(TION) (ll rig*ts reser+ed) I5
Basic principle and configuration guide for ZXCTN linear and PW protection Internal Use
Only
T(B3# O, CONT#NT4
1 ZXCTN protection introduction.......................................................................1
1)1 3inear protection)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))) 1
1)1)1 161 unidirectional T.2P34 pat* protection))))))))))))))))))))))))))))))))))))))))))))))))))))))))
1)% Principle of PW dual *o7ed protection))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))5
5 Configuration instruction of ZXCTN linear dual -o*ed protection.............6
%)1 2P34 161 pat*8 191 protection configuration)))))))))))))))))))))))))))))))))))))))))))))))))))))"
%)1)1 3inear protection application scene))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))
%)% Configuration of PW dual *o7ed protection))))))))))))))))))))))))))))))))))))))))))))))))))))))):
%)%)1 (pplication scene of PW dual *o7ed protection))))))))))))))))))))))))))))))))))))))))))))))))
ZT# Confidential Proprietary $ %!1& ZT# CO'PO'(TION) (ll rig*ts reser+ed) 5
Basic principle and configuration guide for ZXCTN linear and PW protection Internal Use
Only
,I1U'#4
,igure 1.1 structure of 161Unidirectional pat* protection s;itc*ing))))))))))))))))))))))))))))))))))))))))%
,igure 1.% 161 Unidirectional pat* protection s;itc*ing <;or= connection failed>)))))))))))))))))))0
,igure 1.0 structure of 191Bidirectional pat* protection <unidirectional e?pression>))))))))))))))))&
,igure 1.& t*e 191 -idirectional pat* protection s;itc*ing <failure on ;or=ing connects @Z.(A> 5
,igure 1.5 dual *o7ed protection application)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))/
,igure %.1 application scene of linear protection)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))
,igure %.% typical configuration for dual *o7ed protection))))))))))))))))))))))))))))))))))))))))))))))))))))1!
T(B3#4
Ta-le %.1 seBuence and essential of linear protection configuration)))))))))))))))))))))))))))))))))))))))
Ta-le %.% seBuence and essential of dual *o7ed protection configuration)))))))))))))))))))))))))))1!
ZT# Confidential Proprietary $ %!1& ZT# CO'PO'(TION) (ll rig*ts reser+ed) 5I
Basic principle and configuration guide for ZXCTN linear and PW protection Internal Use
Only
1 ZXCTN protection introduction
T*e ZXCTN eBuip7entCs protection di+ides into se+eral types includes9 Net;or= le+el
protection8 port le+el protection8 -oard le+el protection)
T*e net;or= le+el protection includes9 T*e linear protection8 t*e su-net protection8 t*e
ring net protection8 t*e PW dual *o7ed protection)
T*e port le+el protection 7ainly realiDes t*roug* 3(18 di+ides into acti+eEstand-y 3(1
and load s*aring 3(1 appro?i7ately)
T*e -oard le+el protection includes9 Po;er source8 7aster control 161 protections8 and
#1 -oard TP4 protection
T*is article 7ainly e7p*asiDes on -asic principle and t*e configuration of linear
protection and PW dual *o7ed protection on t*e net;or= le+el protection) t*is is also t*e
t;o =ind of tec*nologies are ;idely used at present) T*e su-net and t*e ring net
protection also ;ait for t*e furt*er consu77ation)
1.1 Linear protection
No; large.scale co77ercial applied ZXCTN t*e eBuip7ents -y C*ina 2o-ile are all
-ased on t*e T.2P34 standard8 t*e structure of T.2P34 linearity protection can -e
defined -y t*e 1)101 and t*e 4NCE4 protection8 ot*er types are still ;aiting for furt*er
study)
T*e T.2P34 pat* protection is used for protecting a T.2P34 connection8 it is a special.
purpose end.to.end protection structure8 can -e used in t*e different net;or=
arc*itecture8 for e?a7ple9 7es* net;or=8 ring net;or=8 etc) T*e T.2P34 pat* protection
is specifically di+ided into 161 and 191) 4ince only t*e selector in recei+er acts s;itc*ing
in 161 protections8 calls t*e 161 unidirectional T.2P34 pat* protectionF But t*e selectors
on -ot* side act s;itc*ing in 191 so calls it 191 -idirectional T.2Pl4 pat* protection)
1.1.1 171 unidirectional T4$PL+ pat- protection
In 161 structures8 t*e protecti+e connection is only used for t*e paired ;or=ing
connection) T*e ;or=ing and t*e protecti+e connection carry on t*e -ridge Goint in t*e
protection territoryCs source) T*e ser+ice is send to t*e protection territoryHs sin= o+er t*e
;or=ing and protecti+e connection si7ultaneously) (t t*e sin=8 deter7ines t*e certain
regulation t*at is stated in ad+ance to c*oose recei+ing fro7 ;*ic* of ;or=ing or
protecti+e connection) In order to a+oid t*e si7ple point e?piring8 t*e routes of t*e
;or=ing connection and t*e protecti+e connection s*ould -e separated)
ZT# Confidential Proprietary $ %!1& ZT# CO'PO'(TION) (ll rig*ts reser+ed) 1
Basic principle and configuration guide for ZXCTN linear and PW protection Internal Use
Only
161 T.2P34 pat* protection is unidirectional s;itc*ing8 only t*e affected direction of
connection is s;itc*ed to t*e protection pat*8 t*e selectors on t*e -ot* sides are
independent) T*e operation type of 161 T.2P34 pat* protection is returns or none
returns) T*e structure of t*e161 T.2P34 pat* protection is s*o;n in ,igure 1 .1) Under
t*e unidirectional protection s;itc*ing operation sc*e7a8 t*e protection s;itc*ing is
co7pleted -y t*e selector on t*e protection territoryHs sin= ;*ic* is totally depend on t*e
local infor7ation <protecti+e sin=>) Wor=ing ser+ice is -ridging to t*e ;or=ing and
protecti+e connection per7anently in protection territory) If uses t*e connecti+e
inspection pac=age to e?a7 t*e ;or= and t*e protecti+e connection8 t*en t*ey inserts
infor7ation to t*e ;or= and t*e protecti+e connection in t*e protection territoryCs source
at t*e sa7e ti7e8 and t*e e?traction and e?a7ination is carried out at protection
territoryHs sin=) 2ust pay attention8 regardless of ;*et*er connects to -e c*osen -y t*e
selector8 t*e connecti+e inspection pac=age still trans7its o+er t*e7)
,igure 1.1 structure of 161Unidirectional pat* protection s;itc*ing
To t*e failure direction <fro7 node @(A to t*e node @ZA>8 as s*o;n in ,igure 1 .%8 t*is
failure ;ill -e e?a7ined at t*e protection territoryHs sin= node @ZA8 t*en t*e selector at
node @ZA ;ill s;itc* to t*e protecti+e connection)
ZT# Confidential Proprietary $ %!1& ZT# CO'PO'(TION) (ll rig*ts reser+ed) %
Basic principle and configuration guide for ZXCTN linear and PW protection Internal Use
Only
,igure 1.% 161 Unidirectional pat* protection s;itc*ing <;or= connection failed>
191
-idirectional T.2P34 pat* protection9
In 191 structure8 t*e protecti+e connection is used only for eac* 7atc*ing ;or=ing
connection8 t*e ;or=ing ser+ice ;*ic* is protected -y t*e ;or= or t*e protecti+e
connection carries on t*e trans7ission) T*e ;or=ing and protecti+e connection is c*osen
-y so7e =ind of 7ec*anis7) In order to a+oid t*e si7ple point e?piring8 t*e route of
;or=ing connection and t*e protecti+e connection are separated)
T*e 191 T.2P34 pat* protection is -idirectional s;itc*ing8 -ot* directions s;itc* to t*e
protecti+e connection include t*e one is not affected) Bidirectional s;itc*ing needs
auto7atic protection s;itc*ing protocol <(P4> to t coordinated connects on t*e -ot*
sides) Operation type of 191 -idirectional T.2P34 pat* protection s*ould -e returna-le)
T*e structure of 191 T.2P34 pat* protection is s*o;n in ,igure 1 .0 ) In t*e
-idirectional protection s;itc*ing 7ode8 t*e selectors on -ot* sin= and source of t*e
protection territory operate t*e s;itc*ing toget*er8 -ase on t*e (P4 infor7ation fro7
-ot* localEcloser side and far sideEot*er end
If uses t*e connecti+e inspection pac=age to e?a7 t*e ;or=ing and t*e protecti+e
connection8 t*en t*ey inserts infor7ation to t*e ;or=ing and t*e protecti+e connection in
t*e protection territoryCs source at t*e sa7e ti7e8 t*e e?traction and t*e e?a7ination
carry out at t*e sin= of protection territory) Needs to pay attention8 regardless of ;*et*er
connects is c*osen -y selectors8 t*e connecti+e inspection pac=age still trans7its o+er
it)
ZT# Confidential Proprietary $ %!1& ZT# CO'PO'(TION) (ll rig*ts reser+ed) 0
Basic principle and configuration guide for ZXCTN linear and PW protection Internal Use
Only
,igure 1.0 structure of 191Bidirectional pat* protection <unidirectional e?pression>
4er+ice fails at t*e ;or=ing connection fro7 Z to (8 as s*o;n in ,igure 1 .&8 t*en
t*is failure ;ill -e e?a7ined at node () T*en uses 1 condition (P4 protection as t*e
trigger for protection s;itc*ing8 t*e protocol process flo; is s*o;n as follo;s9
1) Node ( e?a7ines t*e failureF
%) T*e node @(A selector -ridging to t*e protecti+e connection @(.ZA <i)e)8 in @(.ZA
direction8 ser+ice is trans7itted on -ot* ;or=ing connection @(.ZA and protecti+e
connection @(.ZA at t*e sa7e ti7e> and node @(A 7erges t*e selector to s;itc* to
protecti+e connection @(.ZAF
0) Trans7its t*e (P4 order to reBuest protection s;itc*ing fro7 node @(A to node @ZAF
&) (fter node @ZA confir7ed t*e priority of protection s;itc*ing reBuest8 node Z 7erges
t*e selector to s;itc* to protecti+e connection @(.ZA <i)e8 in t*e @Z.(A direction8
ser+ice trans7itted in ;or= connects @Z.(A and on protecti+e connection @Z.(A at
t*e sa7e ti7e>F
5) T*en t*e (P4 order is trans7itted fro7 t*e node @ZA to node @(A to infor7ing
related s;itc*ing infor7ationF
/) ,inally8 t*e ser+ice carries on t*e trans7ission in t*e protecti+e connection)
ZT# Confidential Proprietary $ %!1& ZT# CO'PO'(TION) (ll rig*ts reser+ed) &
Basic principle and configuration guide for ZXCTN linear and PW protection Internal Use
Only
,igure 1.& t*e 191 -idirectional pat* protection s;itc*ing <failure on ;or=ing connects
@Z.(A>
1.5 Principle of PW dual -o*ed protection
T*e T.2P34 pat* protection is -ased on t*e T2P tunnel8 -ut PW dual *o7ed protection
is -ased on t*e PW le+el8 t*ey -elong to t*e different le+el) T*e PW dual *o7ed
protection is on t*e eBuip7ent le+el8 dual *o7ed scene is a ser+ice goes t*roug* t*e
Gunction point -ac= to t;o different eBuip7ents8 ;*en one eBuip7ent encounters po;er
failure or syste7 cras*8 t*e spare eBuip7ent can also guarantee nor7al operation of t*e
ser+ice) PW dual *o7ed protection actualiDes in t*e access layer8 t*e con+ergence layer
7ay not support) Ietailed net;or= situation reference ,igure 1 .5)
(ll ZXCTN/1!!E/%!!E/0!! eBuip7ents support PW dual *o7ed protection at present8
four protections types are supported separately)
1) PW 191 protection8 only *as t*e data flo; in t*e ;or=ing pat*8 sa+es t*e -and
;idt*)
%) T*e PW dou-le sends and dou-le recei+es8 -ot* ;or=ing and protection pat* *as
t*e data flo;8 t*e ad+antage is ;*en t*e eBuip7ent encounters failure t*ere is no
s;itc* ti7e8 if recei+e t;o copy of sa7e data fro7 t*e ;or=ing and t*e protection
;ill cause t*e ser+ice to -e unusual) T*erefore it can not interconnect to ot*er 161
protection type eBuip7ent)
0) T*e PW dou-le sends and single recei+e8 identical to a-o+e8 -ut t*is ti7e t*e
access layer eBuip7ents only recei+e data fro7 ;or=ing pat*)
&) T*e PW single send and dou-le recei+es8 t*e application scene are fe;8 ;e can
use it ;*en t*e eBuip7ents t*at dual *o7ed interconnects to ZXCTN eBuip7ent8
applies loads s*aring 7ode)
ZT# Confidential Proprietary $ %!1& ZT# CO'PO'(TION) (ll rig*ts reser+ed) 5
Basic principle and configuration guide for ZXCTN linear and PW protection Internal Use
Only
5) Iual *o7ed protection 7ode closely relates to t*e 7ode t*at used -y 'NC8
generally ;e use PW 1918 dou-le sends and recei+es8 t*e dou-le sends and single
recei+e to interconnect to t*e ports of 'NCHs acti+e and stand-yF T*e use single
send dou-le recei+es to interconnect to t*e 3(1 of 'NCHs acti+e and stand-y
<load s*aring>)
T2P34 dual *o7ed protection in fact is t*e co7-ination of PW protection and t*e
TUNN#3 protection) 4ee t*e figure -elo;)
,igure 1.5 dual *o7ed protection application
4pecification of dual *o7ed protection9
PW1 and PW% 7utually *as t*e sa7e source and different sin=s)
TUNN#31 and TUNN#3% 7utually protect t*e tunnels *a+e sa7e sin= and source)
Note:
ZT# Confidential Proprietary $ %!1& ZT# CO'PO'(TION) (ll rig*ts reser+ed) /
Basic principle and configuration guide for ZXCTN linear and PW protection Internal Use
Only
PW1 binds TUNNEL1, PW2 to binds TUNNEL3.
1) W*en lig*tning 1 connection encounters failure8 PW protection operates)
Note:
When lightning 2 and lightning 4 encounters failure, this time the PTN netor! has PW
sitching, since "N# has not e$amined the arning, the %rotection does not o%erate. &t leads
to the result of ser'ice disconnection.
%) W*en lig*tning % connection encounters failure8 TUNN#3 protection operates8 PW
does not operate)
0) W*en lig*tning 1 and lig*tning 0 connection encounter failure at t*e sa7e ti7e8 t*e
'NC s;itc*es to t*e spare port8 t*e ZXCTN PW s;itc*es to t*e spare
Jcon+ergence eBuip7ent t;o C8 t*e tunnel s;itc*es at t*e sa7e ti7e) T*is ti7e t*e
ser+ice passes t*roug* PW%8 TUNN#3& nor7ally)
5 Configuration instruction of ZXCTN
linear dual -o*ed protection
T*is c*apter 7ainly introduces t*e configuration process for linear and dual *o7ed
protection -y illustrate grap* fro7 N24 UI) In addition s*o;s eac* =ind of protection
scene in detail)
5.1 $PL+ 171 pat-0 1/1 protection configuration
T*e T.2P34 pat* 161 and 191 protectionCs application scenes and configurations are
+ery si7ilar8 t*e -iggest different -et;een t*e7 is 161 protection s;itc*ing occurs in
single N# and only t*e recei+ing side operates) But 191 needs t*e (P4 protocol
controller to trigger s;itc*es on -ot* sending and recei+ing side of t*e t;o end of t*e
ser+ice)
In addition8 161 ;ill ta=e t*e 7ore net;or= -and ;idt*s t*an1918 -ecause 191 ;ill not
*a+e t*e data flo; in t*e spare pat*8 -ut 161 protections trans7it data o+er t*e ;or=ing
and t*e protection pat* at t*e sa7e ti7e)
W*en carries on t*e configuration at t*e present net;or=8 ;e needs enoug*
co77unication ;it* t*e custo7er8 and c*oose appropriate protection type8 according to
t*e -and;idt* of present net;or=)
ZT# Confidential Proprietary $ %!1& ZT# CO'PO'(TION) (ll rig*ts reser+ed) "
Basic principle and configuration guide for ZXCTN linear and PW protection Internal Use
Only
5.1.1 Linear protection application scene
T*e ,igure % ./ is a co77on application scene of linear protection8 TUNN#3% protects
t*e TUNN#31) W*en t*e TUNN#31 pat* encounters failure8 t*e ser+ice s;itc*es to
TUNN#3%) (t t*is ti7e t*e PW1 and t*e ser+ice is not disconnected)
T*e disad+antage of linear protection is t*e ser+ice ;ill -e disconnected ;*en lig*tning
1 encounters failureF t*en t*e PW dual *o7ed protection 7ay sol+e t*e pro-le7)
,igure %./ application scene of linear protection
Ta-le %.1 seBuence and essential of linear protection configuration
Configuration
se8uence
configuration content
1 Configure TUNN#318 TUNN#3% end.to.end
% configure PW1 #nd.to.end
0 Configure Jser+ice access point C to t*e ser+ice on
Jcon+ergence eBuip7ent one C #nd.to.end
& Create TUNN#318 and TUNN#3% protection group <it ;ill
ZT# Confidential Proprietary $ %!1& ZT# CO'PO'(TION) (ll rig*ts reser+ed)
Basic principle and configuration guide for ZXCTN linear and PW protection Internal Use
Only
create T2P and O(2 auto7atically>
5.5 Configuration of PW dual -o*ed protection
5.5.1 pplication scene of PW dual -o*ed protection
PW dual *o7ed protection is t*e protection 7ode ;*ic* t*e ser+ice *as sa7e source
and different sin=8 t*e ser+ice goes t*roug* t*e Gunction point t*en 7ay finally end at
different ZXCTN eBuip7ent on -ot* sides) T*e follo;ing c*art t;o ports of 'NC
eBuip7entCs on ;ireless sideCs connects to t*e different ZXCTN eBuip7ent separately
<con+ergence eBuip7ent one8 t;o>8 ;*en ZXCTN eBuip7ent or optical fi-er -et;een
'NC and a con+ergence eBuip7ent encounters failure8 t*is ti7e con+ergence
eBuip7ent t;o can guarantee t*e nor7al ser+ice)
PW dual *o7ed protection needs to nest tunnelCs protection to realiDe a co7pleted
ser+ice protection8 PW dual *o7ed is t;o PW set up one protection group8 7oreo+er ;e
need to create pat* protection for tunnels t*at load PW)
T*e protection relations are9
PW% protects PW1F
TUNN#3% protects TUNN#31F
TUNN#3& protects TUNN#3 F
Co7-ination relations9
No; 7any applies are tunnelCs 191 protection nesting PW 191 protectionF W*en PW
c*ooses 191 protection8 t*e 'NC needs to use t*e port of acti+eEstand-y protected 7ode
correspondingly)
T*e PW protection *as 7any 7odes9 t*e 1918 dou-le senders dou-le recei+es8 dou-le
senders and single recei+ers8 t*e single sender and dou-le recei+ers8 ;*en 'NC selects
3(1 load s*aring guard 7ode ;e need to c*oose single senders and single recei+ersF
T*e dou-le senders and dou-le recei+ers 7ust used ;it* 'NC acti+eEstand-y 7ode as
a pair<not reco77endation>)
ZT# Confidential Proprietary $ %!1& ZT# CO'PO'(TION) (ll rig*ts reser+ed) :
Basic principle and configuration guide for ZXCTN linear and PW protection Internal Use
Only
,igure %." typical configuration for dual *o7ed protection
Ta-le %.% seBuence and essential of dual *o7ed protection configuration
configuration se8uence configuration content
1 Create TUNN#318TUNN#3% to con+ergence eBuip7ents
end.to.end
% create TUNN#30TUNN#3& to con+ergence eBuip7ent
t;o end to end
0 Create PW1 to con+ergence eBuip7ent one end to end
& Create PW1 to con+ergence eBuip7ent t;o end to end
5 Create tunnel protection group8 TUNN#31 is t*e ;or=ing8
TUNN#3% is t*e protection <create O(2 auto7atically8
can also -e done 7anually >
/ Create tunnel protection group8 TUNN#30 as ;or=ing8
TUNN#3& as protection <create O(2 auto7atically8 can
also -e done 7anually>
" T*e end.to.end -ed fra7e ser+ice access point to a
gat*ering eBuip7ent ser+ice8 -inds false line PW1
On con+ergence eBuip7ent create a ser+ice t*at sa7e to
t*e con+ergence one8 -ind PW as PW%8 t*is ser+ice is
ZT# Confidential Proprietary $ %!1& ZT# CO'PO'(TION) (ll rig*ts reser+ed) 1!
Basic principle and configuration guide for ZXCTN linear and PW protection Internal Use
Only
configuration se8uence configuration content
protection)
: Create O(2 for PW1and PW%8 c+ period is 1!!7s
<default ;*en T2P period set to -e 0)007s8 T2C 7ust
-e -igger t*an T2P as default>
1! Create PW protection group at @PTN protectionA on t*e
@eBuip7ent 7anage7entA at ser+ice access point)<t*e
;ay of c*oosing protection type is referring to t*e
principle introduced pre+iously>
Note:
When the dual homed 1(1 %rotection in PTN netor!, )*+ needs to be configured
manuall,, in hich the #- %eriod closel, relate to the %rotection sitching time. .ince there
is no mechanism of %riorit, for tunnel %rotection and PW %rotection at %resent, the one
hich e$amined the failure o%erates sitching first. &n dual homed %rotection, e ha'e to
ma!e the tunnel %rotection sitch first, then the PW %rotection. Therefore e need to
configure the #- %eriod of )*+ for tunnel and PW differentl,, in order to ma!e the
e$amination %eriod of PW )*+ longer than tunnel/s, it then ma!es the tunnel e$amining the
failure and o%erating %rotection. PW %rotection o%erates onl, hen the tunnel %rotection
fails.
ZT# Confidential Proprietary $ %!1& ZT# CO'PO'(TION) (ll rig*ts reser+ed) 11

You might also like