
C
HAPTER
14
| Basic Administration Protocols
Ethernet Ring Protection Switching
– 511 –
in the following figure, and node E detected CCM loss, it would send
an R-APS (SF) message to the RPL owner and block the link to node
D, isolating that non-ERPS device.
Figure 289: Non-ERPS Device Protection
When non-ERPS device protection is enabled on the ring, the ring
ports on the RPL owner node and non-owner nodes will not be
blocked when signal loss is detected by CCM loss events.
■
When non-ERPS device protection is enabled on an RPL owner node,
it will send non-standard health-check packets to poll the ring
health when it enters the protection state. It does not use the
normal procedure of waiting to receive an R-APS (NR - no request)
message from nodes adjacent to the recovered link. Instead, it
waits to see if the non-standard health-check packets loop back. If
they do, indicating that the fault has been resolved, the RPL will be
blocked.
After blocking the RPL, the owner node will still transmit an R-APS
(NR, RB - ring blocked) message. ERPS-compliant nodes receiving
this message flush their forwarding database and unblock
previously blocked ports. The ring is now returned to Idle state.
◆
Holdoff Timer
– The hold-off timer is used to filter out intermittent
link faults. Faults will only be reported to the ring protection mechanism
if this timer expires. (Range: 0-10000 milliseconds, in steps of 100
milliseconds)
In order to coordinate timing of protection switches at multiple layers, a
hold-off timer may be required. Its purpose is to allow, for example, a
server layer protection switch to have a chance to fix the problem
before switching at a client layer.
When a new defect or more severe defect occurs (new Signal Failure),
this event will not be reported immediately to the protection switching
mechanism if the provisioned hold-off timer value is non-zero. Instead,
the hold-off timer will be started. When the timer expires, whether a
defect still exists or not, the timer will be checked. If one does exist,
that defect will be reported to the protection switching mechanism. The
reported defect need not be the same one that started the timer.
◆
Guard Timer
– The guard timer is used to prevent ring nodes from
receiving outdated R-APS messages. During the duration of the guard
timer, all received R-APS messages are ignored by the ring protection
control process, giving time for old messages still circulating on the ring
to expire. (Range: 10-2000 milliseconds, in steps of 10 milliseconds)
The guard timer duration should be greater than the maximum
expected forwarding delay for an R-APS message to pass around the
non
-E
RPS
A
non
-E
RPS
RPL
Owner
RPL
X
X
b
l
ocked
b
l
ocked
fau
l
t
B
C
D
E
F
Содержание ECS4110-28T
Страница 1: ...Management Guide www edge core com ECS4110 28T 28P 52T 52P 28 52 Port Gigabit Ethernet Layer 2 Switch...
Страница 2: ......
Страница 4: ......
Страница 63: ...FIGURES 63 Figure 428 Configuring VLAN Translation 1177...
Страница 64: ...FIGURES 64...
Страница 72: ...TABLES 72...
Страница 74: ...SECTION I Getting Started 74...
Страница 102: ...SECTION II Web Configuration 102 General IP Routing on page 679...
Страница 154: ...CHAPTER 4 Basic Management Tasks Resetting the System 154...
Страница 198: ...CHAPTER 5 Interface Configuration VLAN Trunking 198 Figure 65 Configuring VLAN Trunking...
Страница 272: ...CHAPTER 9 Congestion Control Automatic Traffic Control 272...
Страница 286: ...CHAPTER 10 Class of Service Layer 3 4 Priority Settings 286...
Страница 420: ...CHAPTER 13 Security Measures DHCP Snooping 420...
Страница 566: ...CHAPTER 14 Basic Administration Protocols OAM Configuration 566...
Страница 638: ...CHAPTER 15 Multicast Filtering Multicast VLAN Registration for IPv6 638...
Страница 662: ...CHAPTER 16 IP Configuration Setting the Switch s IP Address IP Version 6 662...
Страница 678: ...CHAPTER 17 IP Services Configuring the PPPoE Intermediate Agent 678...
Страница 792: ...CHAPTER 21 System Management Commands Switch Clustering 792...
Страница 822: ...CHAPTER 23 Remote Monitoring Commands 822...
Страница 888: ...CHAPTER 24 Authentication Commands PPPoE Intermediate Agent 888...
Страница 968: ...CHAPTER 25 General Security Measures Port based Traffic Segmentation 968...
Страница 994: ...CHAPTER 26 Access Control Lists ACL Information 994...
Страница 1034: ...CHAPTER 28 Link Aggregation Commands Trunk Status Display Commands 1034...
Страница 1044: ...CHAPTER 29 Power over Ethernet Commands 1044...
Страница 1084: ...CHAPTER 33 UniDirectional Link Detection Commands 1084...
Страница 1090: ...CHAPTER 34 Address Table Commands 1090...
Страница 1194: ...CHAPTER 37 VLAN Commands Configuring Voice VLANs 1194...
Страница 1388: ...CHAPTER 42 CFM Commands Delay Measure Operations 1388...
Страница 1410: ...CHAPTER 44 Domain Name Service Commands 1410...
Страница 1420: ...CHAPTER 45 DHCP Commands DHCP Relay 1420...
Страница 1472: ...CHAPTER 46 IP Routing Commands IPv4 Commands 1472...
Страница 1474: ...SECTION IV Appendices 1474...
Страница 1502: ...COMMAND LIST 1502...
Страница 1513: ......
Страница 1514: ...ECS4110 28T ECS4110 28P ECS4110 52T ECS4110 52P E072014 ST R02 150200000929A...