
C
HAPTER
14
| Basic Administration Protocols
Ethernet Ring Protection Switching
– 539 –
■
The RPL owner node detects a failed link when it receives R-APS
(SF - signal fault) messages from nodes adjacent to the failed link.
The owner then enters protection state by unblocking the RPL.
However, using this standard recovery procedure may cause a non-
EPRS device to become isolated when the ERPS device adjacent to it
detects a continuity check message (CCM) loss event and blocks the
link between the non-ERPS device and ERPS device.
CCMs are propagated by the Connectivity Fault Management (CFM)
protocol as described under
"Connectivity Fault Management" on
. If the standard recovery procedure were used as shown
in the following figure, and node E detected CCM loss, it would send
an R-APS (SF) message to the RPL owner and block the link to node
D, isolating that non-ERPS device.
When non-ERPS device protection is enabled on the ring, the ring
ports on the RPL owner node and non-owner nodes will not be
blocked when signal loss is detected by CCM loss events.
■
When non-ERPS device protection is enabled on an RPL owner node,
it will send non-standard health-check packets to poll the ring
health when it enters the protection state. It does not use the
normal procedure of waiting to receive an R-APS (NR - no request)
message from nodes adjacent to the recovered link. Instead, it
waits to see if the non-standard health-check packets loop back. If
they do, indicating that the fault has been resolved, the RPL will be
blocked.
After blocking the RPL, the owner node will still transmit an R-APS
(NR, RB - ring blocked) message. ERPS-compliant nodes receiving
this message flush their forwarding database and unblock
previously blocked ports. The ring is now returned to Idle state.
◆
Holdoff Timer
– The hold-off timer is used to filter out intermittent
link faults. Faults will only be reported to the ring protection mechanism
if this timer expires. (Range: 0-10000 milliseconds, in steps of 100
milliseconds)
In order to coordinate timing of protection switches at multiple layers, a
hold-off timer may be required. Its purpose is to allow, for example, a
server layer protection switch to have a chance to fix the problem
before switching at a client layer.
When a new defect or more severe defect occurs (new Signal Failure),
this event will not be reported immediately to the protection switching
mechanism if the provisioned hold-off timer value is non-zero. Instead,
the hold-off timer will be started. When the timer expires, whether a
defect still exists or not, the timer will be checked. If one does exist,
non
-E
RPS
A
non
-E
RPS
RPL
Owner
RPL
X
X
b
l
ocked
b
l
ocked
fau
l
t
B
C
D
E
F
Summary of Contents for ECS4660-28F
Page 1: ...Management Guide www edge core com ECS4660 28F Layer 3 Gigabit Ethernet Switch...
Page 2: ......
Page 4: ......
Page 12: ...ABOUT THIS GUIDE 12...
Page 64: ...CONTENTS 64...
Page 90: ...TABLES 90...
Page 92: ...SECTION I Getting Started 92...
Page 122: ...SECTION II Web Configuration 122 Multicast Routing on page 825...
Page 148: ...CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface 148...
Page 224: ...CHAPTER 5 Interface Configuration VLAN Trunking 224 Figure 68 Configuring VLAN Trunking...
Page 262: ...CHAPTER 6 VLAN Configuration Configuring VLAN Translation 262...
Page 304: ...CHAPTER 9 Congestion Control Automatic Traffic Control 304...
Page 340: ...CHAPTER 11 Quality of Service Attaching a Policy Map to a Port 340...
Page 452: ...CHAPTER 13 Security Measures DHCP Snooping 452...
Page 740: ...CHAPTER 17 IP Services Configuring the PPPoE Intermediate Agent 740...
Page 866: ...CHAPTER 21 Multicast Routing Configuring PIMv6 for IPv6 866...
Page 882: ...CHAPTER 22 Using the Command Line Interface CLI Command Groups 882...
Page 1024: ...CHAPTER 26 Remote Monitoring Commands 1024...
Page 1030: ...CHAPTER 27 Flow Sampling Commands 1030...
Page 1088: ...CHAPTER 28 Authentication Commands PPPoE Intermediate Agent 1088...
Page 1162: ...CHAPTER 29 General Security Measures Configuring Port based Traffic Segmentation 1162...
Page 1186: ...CHAPTER 30 Access Control Lists ACL Information 1186...
Page 1214: ...CHAPTER 31 Interface Commands Transceiver Threshold Configuration 1214...
Page 1238: ...CHAPTER 33 Port Mirroring Commands RSPAN Mirroring Commands 1238...
Page 1258: ...CHAPTER 34 Congestion Control Commands Automatic Traffic Control Commands 1258...
Page 1270: ...CHAPTER 36 UniDirectional Link Detection Commands 1270...
Page 1276: ...CHAPTER 37 Address Table Commands 1276...
Page 1336: ...CHAPTER 39 ERPS Commands 1336...
Page 1386: ...CHAPTER 40 VLAN Commands Configuring Voice VLANs 1386...
Page 1406: ...CHAPTER 41 Class of Service Commands Priority Commands Layer 3 and 4 1406...
Page 1424: ...CHAPTER 42 Quality of Service Commands 1424...
Page 1536: ...CHAPTER 43 Multicast Filtering Commands MLD Proxy Routing 1536...
Page 1602: ...CHAPTER 45 CFM Commands Delay Measure Operations 1602...
Page 1624: ...CHAPTER 47 Domain Name Service Commands 1624...
Page 1646: ...CHAPTER 48 DHCP Commands DHCP Server 1646...
Page 1974: ...SECTION IV Appendices 1974...
Page 1980: ...APPENDIX A Software Specifications Management Information Bases 1980...