RPR Topology Discovery Proposal

Similar documents
RPR Topology Discovery Proposal

OAM Proposal Italo Busi, Alcatel (Presenter) Leon Bruckman, Corrigent (Presenter)

Components of a complete RPR proposal

Improving Bandwidth Efficiency When Bridging on RPR. November 2001

Layer Management Proposal

A Study of Protection Switching: Wrapping or Steering

OAM&P Requirements for RPR. Portland IEEE Meeting July 2001 Italo Busi Alcatel

Encapsulated Bridging Support of November 2001

Introduction to Resilient Packet Rings. Raj Sharma Luminous Networks, Inc Working Group

Sonet/SDH Virtual Concatenation for RPR. San José IEEE Meeting September 2001 Italo Busi Alcatel

Metro technologies GE, SRP, RPR and more abbreviations. Lars Hanson, Stefan Lindeberg,

RPR Bandwidth Management

IEEE Resilient Packet Ring (RPR) Standards Update

Issues in Automatic Topology Discovery for RPR

802.1D/Q Compliance and Spatial Reuse

Bridging. Robert Castellano David James Bob Sultan Spencer Dawkins. 1/22/2002 rc_brdg_02.pdf

IEEE Resilient Packet Ring Feature Guide

Encapsulation Bridging and

Spatially aware sublayer support of VRRP. Marc Holness, Nortel Networks IEEE WG b SG San Antonio, Texas November, 2004

RPR Bandwidth Management

H3C S9500E Routing Switch Series RPR Interface Card Datasheet

Access Technologies! Fabio Martignon

Data Communications. Connecting Devices

Secondary Address Support

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

IEEE Resilient Packet Ring Tutorial

Introduction to LAN Protocols

Configuring IEEE b Resilient Packet Ring

Source-Route Bridging

RPR Seminar Report Introduction

6.1.2 Repeaters. Figure Repeater connecting two LAN segments. Figure Operation of a repeater as a level-1 relay

Overview of the Evolving IEEE Resilient Packet Rings Standard

Cisco CCNA (ICND1, ICND2) Bootcamp

Network-Level High Availability

P D1.1 RPR OPNET Model User Guide

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Resilient Packet Ring 5 Criteria (2. Compatibility)

Module 15: Network Structures

Internetworking Part 1

Cisco Managing Industrial Networks for Manufacturing wit...

Configuring Cisco Proprietary Resilient Packet Ring

Configuring VLANs. Understanding VLANs CHAPTER

Chapter 16: Switched Ethernet in Automation. Wenbo Qiao

Networks. Distributed Systems. Philipp Kupferschmied. Universität Karlsruhe, System Architecture Group. May 6th, 2009

Configuring VLANs. Understanding VLANs CHAPTER

Chapter 6 Connecting Device

LAN Protocols. Required reading: Forouzan 13.1 to 13.5 Garcia 6.7, 6.8. CSE 3213, Fall 2015 Instructor: N. Vlajic

Access Technologies. Fabio Martignon

Configuring VLANs. Understanding VLANs CHAPTER

Path MTU Discovery in Bridged Network

Highly Available Networks

Pass4sures. Latest Exam Guide & Learning Materials

Configuring Port-Based Traffic Control

Data Link Layer, Part 5. Medium Access Control

Part I. Wireless Communication

Local Area Networks (LANs) SMU CSE 5344 /

Metro Ethernet Forum OAM. Matt Squire Hatteras Networks

RESILIENT PACKET RING TECHNOLOGY

Introduction. High Speed LANs. Emergence of High-Speed LANs. Characteristics of High Speed LANS. Text ch. 6, High-Speed Networks and

Overview. Overview. OTV Fundamentals. OTV Terms. This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices.

VLAN Configuration. Understanding VLANs CHAPTER

Local Addresses and SAS

Switching and Forwarding

Content. Deterministic Access Polling(1) Master-Slave principles: Introduction Layer 2: Media Access Control

Configuring VLANs. Understanding VLANs CHAPTER

H3C S7500E-XS Switch Series FAQ

Connecting to the Network

HUAWEI TECHNOLOGIES CO., LTD. Quidway CX200/300 Metro Services Platform

3. What could you use if you wanted to reduce unnecessary broadcast, multicast, and flooded unicast packets?

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols

Edge Control Transport for LRP

Configuring Resilient Packet Ring on the ML-Series Card

Exam Questions

Configuring Resilient Packet Ring

EIGRP Stub Routing. Finding Feature Information. Information About EIGRP Stub Routing. EIGRP Stub Routing

Configuring VLANs. Understanding VLANs CHAPTER

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

Configuring VLANs. Understanding VLANs CHAPTER

Resilient Packet Rings with Heterogeneous Links

INGRESS RATE CONTROL IN RESILIENT PACKET RINGS

High Availability Architectures for Ethernet in Manufacturing

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

Network Infrastructure

Joint ITU-T/IEEE Workshop on Carrier-class Ethernet

IPv6 Feature Facts

Cisco SGE Port Gigabit Switch Cisco Small Business Managed Switches

Paper Number: Architecting Highly Available Networking Environments. Pamela Williams Dickerman. Advanced Technology Consultant.

Chapter 3 Packet Switching

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

IEEE Bridge Model

CHAPTER 2 - NETWORK DEVICES

HSRP (Hot Stand by Routing Protocol) Reliability Issues Over the Internet Service Provider s Network

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

IEEE 802 LANs SECTION C

Part3. Local Area Networks (LAN)

Audio Video Bridging (AVB) Assumptions IEEE AVB Plenary Jan 28 & 29, 2008 Los Gatos

IEEE RPR Working Group Meeting Minutes Interim Session, May 14-18, 2001 Radisson Hotel Universal Orlando, Orlando, FL

EIGRP Features and Operation

Bridging Solution for the MAN: Address Separation

Transcription:

RPR Topology Discovery Proposal Italo Busi, Alcatel Jeanne De Jaegher, Alcatel Jason Fan, Luminous Chi-Ping Fu, NEC John Lemon, Lantern Robin Olsson, Vitesse Harry Peng, Nortel Yiming Yao, Luminous 1

Components of a complete RPR proposal Topology Discovery jf_topo_0x.pdf Protection Switching RPR MAC OAM and Layer Mgmt Bridging PHY interface jal_prot_0x.pdf cb_layer_0x.pdf ib_oamp_0x.pdf hp_brcom_0x.pdf MAC Service Definition Media Access Control Frame Format Ethernet SONET/SDH am_mrm_0x.pdf rs_frame_0x.pdf rb_phys_0x.pdf hp_grs_0x.pdf Transit Path Bandwidth Mgmt. sa_transi_0x.pdf hp_bwmgnt_0x.pdf 2

802.17 MAC Components (RMSAP) OAMP MAC Client(s) MAC Client(s) (MSAP) RPR MAC Control Ringlet Selection M L M E (MLSAP) MAC Layer Boundary Rate Control / Policer Protection (Steering DB, State Machine, etc.) RPR Media Access Control Topology (Topology DB, State Machine, etc.) (MLSAP) (PSAP) Transit Data Path (PSAP) Reconciliation Reconciliation Sublayer Sublayer (Ethernet/SONET) (Ethernet/SONET) PHY (Ethernet/SONET) PHY (Ethernet/SONET) FCS 3

Information Sharing RPR Topology Image consists of station addresses, link connectivity between stations, and status for each link RPR Topology Image used by other algorithms Steering algorithm uses Topology Image to know for which destinations steering is needed Congestion avoidance uses Topology Image to know where congestion is being experienced Ringlet selection uses Topology Image to know which ringlets are available to reach each destination 4

Goals of this Presentation In September the details of the topology discovery proposal were presented Minor modifications made in the written proposal based on discussions with a variety of companies This presentation will cover Discussion of methods for topology discovery Additional simulation results 5

Method 1: Neighbor Discovery and Distribution Each station: Discovers neighbors using periodic messaging Broadcasts neighbor information on change Collects neighbor information from stations detecting change Verifies with adjacent stations that discovered topologies match Updates topology database if verification successful On bring-up a station: Follows the steps above with one modification Broadcasts neighbor information with version indication set to 0 to cause other stations to send neighbor information to it 6

Method 2: Chaining Each station: Sends a topology message on each ringlet periodically Each station adds its MAC address to each topology message Collects topology information from each ringlet Needs to verify that information is received from each ringlet Updates topology database if verification successful On bring-up a station: Follows the steps above 7

Goals Met by Both Methods Scalable from 1 to 100 s of stations Determine/validate connectivity and ordering of stations on ring Topology database updated based on dynamic addition and removal of stations to/from the ring Ensure all stations on the ring have a uniform and current image of the topology Immediate reaction to changes Operate without any master station on the ring Provide means of sharing additional information between stations Operate independently of and in the absence of any management systems 8

Additional Goals of Topology Discovery Robustness Minimize messaging overhead Discovery of spans on which there is a single missing link Usable with all supported topologies: multiple ringlet ring, linear (broken ring), and star (single station) 9

Robustness (I) Methods for tolerance of message loss Neighbor Discovery Send broadcasts on both directions on the ring Validate discovered topology prior to updating stored topology through version comparison with neighbors Chaining Repeat topology discovery periodically Validate discovered topology prior to updating stored topology (?) or update stored topology after identical topology discovered multiple times consecutively Neighbor Discovery is not restricted to its current validation mechanism 10

Robustness (II) Neighbor discovery uses broadcast, which has minimum interaction with the MAC as it is sent on the ring Chaining requires the MAC of every station to be able to update topology packets correctly for any station to discover the topology B A D Chaining Msg Path, Ringlet 1 C Chaining Msg Path, Ringlet 0 E 11

Minimize Messaging Overhead M stations on ring Neighbor Discovery is very efficient 1 broadcast per ringlet only on topology change, sent only by stations detecting a neighbor change 1 unicast per ringlet only on topology change, sent by each station directly to a new station Total of 3 broadcasts and M-1 unicasts per ringlet, only on topology change Chaining is less efficient 1 broadcast per ringlet per station, sent every topology discovery period Total of M broadcasts per ringlet, every topology period Choice of mechanism for tolerance of message loss can come at the cost of efficiency 12

Discovery of Spans with Single Missing Link Neighbor discovery enables discovery of single missing link Bandwidth efficiency consideration for steering protection: rings with steering can utilize spans with single available link Chaining does not enable discovery of single missing link Bandwidth efficiency cost for steering protection No bandwidth efficiency cost for wrapping protection 13

Multiple Ringlet Support Neighbor Discovery enables discovery of more than two ringlets, and does not preclude RPR from supporting these scenarios 14

Set up 256 stations 200 km circumference Dual ringlet ring Simulation Results (I) 1 Gbps ring rate Processing times for messages set to exponentially distributed times around mean of 200 usec for Neighbor_Hello and 500 usec for Topology_Status Neighbor_Hello_Timer: 0.5 seconds Topology_Stabilization_Timer: 2.5 seconds 15

Scenarios Simulation Results (II) (0) Bring up all 256 stations at once (1) Starting with link 0->1 removed, then add it back (2) Two failures: links 0->1 and 127->128 are removed, then add 0->1 back (3) Three Failures: span 64-65 plus links in (2) are removed, then add span 64-65 back In all the scenarios above, the new topology (for adding link or span back) is discovered within 2.5 seconds. 16

Simulation Results (III) Scenarios with lost Topology_Status messages (4) Two messages lost in (1) (5) Two messages lost in (2) (6) Four messages lost in (3) In scenarios (4)-(6), the new topology is discovered within 5 seconds. 17

Topology Discovery Summary Many topology discovery objectives are met by both neighbor discovery and chaining methods Neighbor discovery method: Is more efficient than chaining method Can be designed to have lower failure probability than chaining method, at cost of efficiency Increases bandwidth availability in rings using steering protection through usage of all available links Has been simulated to show robustness to loss of multiple messages Has been simulated to show topology discovery in rings with multiple link/span failures 18