next up previous
Next: Parallel Activation Architecture Up: Background Previous: Preliminary Definitions

RSVP/Backup Tunnels

Figure 1 illustrates the RSVP/Backup Tunnel restoration scheme. This restoration scheme is based on the MPLS protection scheme introduced in [6]. In this approach, the failed headend6 informs the ingress node (which is $f$ hops away from it) about the failure through a FIS message. The ingress node sets up the alternate path by sending a request to the first node on it. Each node forwards the request downstream without actually waiting to complete the cross connect. The egress node returns an acknowledgement which travels the same route upstream. Each node forwards it (upstream) as is, with a positive acknowledgement in it if the cross connect at its site was successfully completed. If not, it puts a negative acknowledgement. When the acknowledgement reaches the ingress, it knows if the path is setup by examining the type (positive or negative) of the acknowledgement. The time required to complete each phase of the restoration process is as follows:
\begin{displaymath}
t_{detect} = t_{LOL}
\end{displaymath} (4)


\begin{displaymath}
t_{FIS} = f \cdot d_{DCN}(h)
\end{displaymath} (5)


\begin{displaymath}
t_{setup} = 2 \cdot l_a \cdot d_{DCN}(h)
\end{displaymath} (6)


\begin{displaymath}
t_{restore} = t_{LOL} + f \cdot d_{DCN}(h) +
2 \cdot l_a \cdot d_{DCN}(h) + t_{switch}
\end{displaymath} (7)


next up previous
Next: Parallel Activation Architecture Up: Background Previous: Preliminary Definitions
Swapnil Bhatia 2002-08-02