11-27
Cisco ONS 15454 Reference Manual, R7.0
78-17191-01
Chapter 11 Circuits and Tunnels
11.14 11.14.1 Bandwidth Allocation and Routing
Circuit routing does not use links that are down. If you want all links to be considered for routing,
do not create circuits when a link is down.
Circuit routing computes the shortest path when you add a new drop to an existing circuit. It tries to
find the shortest path from the new drop to any nodes on the existing circuit.
If the network has a mixture of VT-capable nodes and VT-incapable nodes, CTC can automatically
create a VT tunnel. Otherwise, CTC asks you whether a VT tunnel is needed.
To create protected circuits between topologies, install an XCVT, XC10G, or XC-VXC-10G
cross-connect card on the shared node.
For STS circuits, you can use portless transmux interfaces if a DS3XM-12 card is installed in the
network. CTC automatically routes the circuit over the portless transmux interfaces on the specified
node creating an end-to-end STS circuit.
11.14.1 Bandwidth Allocation and Routing
Within a given network, CTC routes circuits on the shortest possible path between source and destination
based on the circuit attributes, such as protection and type. CTC considers using a link for the circuit
only if the link meets the following requirements:
The link has sufficient bandwidth to support the circuit.
The link does not change the protection characteristics of the path.
The link has the required time slots to enforce the same time slot restrictions for BLSRs.
If CTC cannot find a link that meets these requirements, an error appears.
The same logic applies to VT circuits on VT tunnels. Circuit routing typically favors VT tunnels because
VT tunnels are shortcuts between a given source and destination. If the VT tunnel in the route is full (no
more bandwidth), CTC asks whether you want to create an additional VT tunnel.
11.14.2 Secondary Sources and Destinations
CTC supports secondary circuit sources and destinations (drops). Secondary sources and destinations
typically interconnect two third-party networks, as shown in Figure 11-9. Traffic is protected while it
goes through a network of ONS 15454s.
Figure 11-9 Secondary Sources and Destinations
55402
Primary source
Secondary source
Primary destination
Secondary destination
Vendor A
network
Vendor B
network
ONS 15454 network