
C
HAPTER
14
| Basic Administration Protocols
Ethernet Ring Protection Switching
– 537 –
■
A sub-ring may be attached to a primary ring with or without a
virtual channel. A virtual channel is used to connect two
interconnection points on the sub-ring, tunneling R-APS control
messages across an arbitrary Ethernet network topology. If a virtual
channel is not used to cross the intermediate Ethernet network,
data in the traffic channel will still flow across the network, but the
all R-APS messages will be terminated at the interconnection points.
■
Sub-ring with R-APS Virtual Channel – When using a virtual channel
to tunnel R-APS messages between interconnection points on a sub-
ring, the R-APS virtual channel may or may not follow the same
path as the traffic channel over the network. R-APS messages that
are forwarded over the sub-ring’s virtual channel are broadcast or
multicast over the interconnected network. For this reason the
broadcast/multicast domain of the virtual channel should be limited
to the necessary links and nodes. For example, the virtual channel
could span only the interconnecting rings or sub-rings that are
necessary for forwarding R-APS messages of this sub-ring. Care
must also be taken to ensure that the local RAPS messages of the
sub-ring being transported over the virtual channel into the
interconnected network can be uniquely distinguished from those of
other interconnected ring R-APS messages. This can be achieved by,
for example, by using separate VIDs for the virtual channels of
different sub-rings.
Note that the R-APS virtual channel requires a certain amount of
bandwidth to forward R-APS messages on the interconnected
Ethernet network where a sub-ring is attached. Also note that the
protection switching time of the sub-ring may be affected if R-APS
messages traverse a long distance over an R-APS virtual channel.
Figure 293: Sub-ring with Virtual Channel
■
Sub-ring without R-APS Virtual Channel – Under certain
circumstances it may not be desirable to use a virtual channel to
interconnect the sub-ring over an arbitrary Ethernet network. In
this situation, the R-APS messages are terminated on the
interconnection points. Since the sub-ring does not provide an R-
APS channel nor R-APS virtual channel beyond the interconnection
points, R-APS channel blocking is not employed on the normal ring
links to avoid channel segmentation. As a result, a failure at any
ring link in the sub-ring will cause the R-APS channel of the sub-ring
to be segmented, thus preventing R-APS message exchange
between some of the sub-ring’s ring nodes.
Sub-ring
with Virtual
Channel
Virtual
Channel
RPL Port
Interconnection Node
Ring Node
Major Ring
Содержание ECS4660-28F
Страница 1: ...Management Guide www edge core com ECS4660 28F Layer 3 Gigabit Ethernet Switch...
Страница 2: ......
Страница 4: ......
Страница 12: ...ABOUT THIS GUIDE 12...
Страница 64: ...CONTENTS 64...
Страница 90: ...TABLES 90...
Страница 92: ...SECTION I Getting Started 92...
Страница 122: ...SECTION II Web Configuration 122 Multicast Routing on page 825...
Страница 148: ...CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface 148...
Страница 224: ...CHAPTER 5 Interface Configuration VLAN Trunking 224 Figure 68 Configuring VLAN Trunking...
Страница 262: ...CHAPTER 6 VLAN Configuration Configuring VLAN Translation 262...
Страница 304: ...CHAPTER 9 Congestion Control Automatic Traffic Control 304...
Страница 340: ...CHAPTER 11 Quality of Service Attaching a Policy Map to a Port 340...
Страница 452: ...CHAPTER 13 Security Measures DHCP Snooping 452...
Страница 740: ...CHAPTER 17 IP Services Configuring the PPPoE Intermediate Agent 740...
Страница 866: ...CHAPTER 21 Multicast Routing Configuring PIMv6 for IPv6 866...
Страница 882: ...CHAPTER 22 Using the Command Line Interface CLI Command Groups 882...
Страница 1024: ...CHAPTER 26 Remote Monitoring Commands 1024...
Страница 1030: ...CHAPTER 27 Flow Sampling Commands 1030...
Страница 1088: ...CHAPTER 28 Authentication Commands PPPoE Intermediate Agent 1088...
Страница 1162: ...CHAPTER 29 General Security Measures Configuring Port based Traffic Segmentation 1162...
Страница 1186: ...CHAPTER 30 Access Control Lists ACL Information 1186...
Страница 1214: ...CHAPTER 31 Interface Commands Transceiver Threshold Configuration 1214...
Страница 1238: ...CHAPTER 33 Port Mirroring Commands RSPAN Mirroring Commands 1238...
Страница 1258: ...CHAPTER 34 Congestion Control Commands Automatic Traffic Control Commands 1258...
Страница 1270: ...CHAPTER 36 UniDirectional Link Detection Commands 1270...
Страница 1276: ...CHAPTER 37 Address Table Commands 1276...
Страница 1336: ...CHAPTER 39 ERPS Commands 1336...
Страница 1386: ...CHAPTER 40 VLAN Commands Configuring Voice VLANs 1386...
Страница 1406: ...CHAPTER 41 Class of Service Commands Priority Commands Layer 3 and 4 1406...
Страница 1424: ...CHAPTER 42 Quality of Service Commands 1424...
Страница 1536: ...CHAPTER 43 Multicast Filtering Commands MLD Proxy Routing 1536...
Страница 1602: ...CHAPTER 45 CFM Commands Delay Measure Operations 1602...
Страница 1624: ...CHAPTER 47 Domain Name Service Commands 1624...
Страница 1646: ...CHAPTER 48 DHCP Commands DHCP Server 1646...
Страница 1974: ...SECTION IV Appendices 1974...
Страница 1980: ...APPENDIX A Software Specifications Management Information Bases 1980...
Страница 2020: ...ECS4660 28F E102013 ST R03 149100000140A...