1st International ICST Conference on Access Networks

Research Article

Protection of long-reach PON traffic

  • @INPROCEEDINGS{10.1145/1189355.1189371,
        author={David K.  Hunter and Tim H. Gilfedder},
        title={Protection of long-reach PON traffic},
        proceedings={1st International ICST Conference on Access Networks},
        publisher={ACM},
        proceedings_a={ACCESSNETS},
        year={2006},
        month={9},
        keywords={passive optical networks protection and restoration GPON Internet routing protocols.},
        doi={10.1145/1189355.1189371}
    }
    
  • David K. Hunter
    Tim H. Gilfedder
    Year: 2006
    Protection of long-reach PON traffic
    ACCESSNETS
    ACM
    DOI: 10.1145/1189355.1189371
David K. Hunter1,*, Tim H. Gilfedder2,3,*
  • 1: University of Essex, Department of Electronic Systems Engineering Colchester CO4 3SQ, UK, +44 1206 872416
  • 2: British Telecom, OP7/2 Antares Building, Adastral Park, Ipswich IP5 3RE, UK
  • 3: +44 1473 643803
*Contact email: dkhunter@essex.ac.uk, tim.gilfedder@bt.com

Abstract

A resilience strategy is introduced for networks implementing dual homing (dual parenting) of customers, specifically those employing Long-Reach PONs (LR-PONs). Assuming that some mechanism exists to detect network element failures, the discussion concentrates on the protocols which propagate information about the reachability of LR-PONs and those that re-route traffic in the event of a fault. A protocol called FROTH (Fast Recovery for OLTs via Transmission of Hellos) informs each edge router which LR-PONs are available over the whole network. This information is used by another protocol called LATTE (Label and Address Tunneling via Tables at the Edge), to re-route traffic in the event of failure. A target of 50 milliseconds is assumed for end-to-end recovery time, since this has been used for many years with voice services, and is adopted in the absence of other information. Here, FROTH transports signaling traffic over IP - due to the probabilistic nature of packet transmission, it is impossible to place a hard bound on recovery time, but rather the probability is calculated that it will be met.Modeling studies suggest that in the event of a cable failure or single equipment element failure, re-routed data will almost always leave the transmitting edge router in under 50 milliseconds. For more catastrophic failures (such as router failure or loss of an edge router), recovery might take between 100 - 200 milliseconds. Reachability information for each LR-PON is distributed over each area of the network by IP, and used to activate re-routing of traffic via tunnels or address substitution. However the underlying services need not use IP, and may be of any type (for example private line), making the scheme separate from the service, customer or provider.