Zesr Configuration; Table 5-3 Basic Zesr Concepts - Zte ZXR10 2900E series Configuration Manual

Easy-maintenance secure switch
Hide thumbs Also See for ZXR10 2900E series:
Table of Contents

Advertisement

ZXR10 2900E Series Configuration Guide

5.31 ZESR Configuration

ZESR Overview
ZESR
is a private ring network protection technology developed by ZTE Corporation.
Evolved from EAPS, ZESR ensures that there is only one logically connected path
between any two nodes in the ring network.
Basic ZESR Concepts
For a description of the basic ZESR concepts, see

Table 5-3 Basic ZESR Concepts

Name
ZESR Domain and
ZESR Node
Control VLAN
Protection Instance
and Service VLAN
Major ZESR Ring
and Secondary
ZESR Ring
ZESR Ring State
ZESR Node Role
SJ-20130731155059-002|2013-11-27 (R1.0)
Description
A ZESR domain consists of a control
The device that is configured with ZESR is called a ZESR node. All ZESR
nodes in the same ZESR domain must be configured with the same control
VLAN and protection instance.
The control VLAN of a ZESR domain forwards ZESR protocol packets. A
control VLAN is required for a ZESR domain.
An instance in MSTP is used as the protection instance of a ZESR domain.
The VLAN in a protection instance (that is, service VLAN) is used for service
data transmission.
A ZESR domain supports ring-based hierarchy with three levels, including
level 0, level 1, and level 2. Among them, level 0 is the highest level and level
2 is the lowest level.
A ring with level 0 is called a primary ring, while a ring with level 1 or level
2 is called a secondary ring.
There are two states for a ZESR ring: UP and DOWN.
l
UP indicates that each link in a ring operates properly.
l
DOWN indicates that there is one or more disconnected links in a ring.
A ZESR node can act as a master node, a transit node, an edge control node,
or an edge assistant node.
l
A master node implements the control function and transmits data in a ring.
l
A transit node transmits data in a ring.
l
An edge control node implements the control function and transmits data
in a secondary ring.
l
An edge assistant node transmits data in a secondary ring.
5-108
Table
5-3.
VLAN
and a protection instance.
ZTE Proprietary and Confidential

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents