Generic Overlay OAM and Datapath Failure Detection Kanwar Singh (Nuage Networks) Pradeep Jain, Florin Balus Nuage Networks Wim Henderickx Alcatel-Lucent,

Slides:



Advertisements
Similar presentations
OLD DOG CONSULTING Challenges and Solutions for OAM in Point-to-Multipoint MPLS Adrian Farrel, Old Dog Consulting Ltd. Zafar Ali, Cisco Systems, Inc.
Advertisements

BIER Ping IETF 92 draft-kumarzheng-bier-ping-00
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
CSE551: Computer Network Review r Network Layers r TCP/UDP r IP.
CSCI 4550/8556 Computer Networks Comer, Chapter 23: An Error Reporting Mechanism (ICMP)
Internet Control Message Protocol (ICMP)
CPSC 441 Tutorial - Network Tools 1 Network Tools CPSC 441 – Computer Communications Tutorial.
The Network Layer Chapter 5. The IP Protocol The IPv4 (Internet Protocol) header.
Chapter 5 The Network Layer.
Generic Overlay OAM and Datapath Failure Detection
ICMP: Ping and Trace CCNA 1 version 3.0 Rick Graziani Spring 2005.
Gursharan Singh Tatla Transport Layer 16-May
1 ICMP – Using Ping and Trace CCNA Semester
LSP-Ping extensions for MPLS-TP draft-nitinb-mpls-tp-lsp-ping- extensions-00 Nitin Bahadur Sami Boutros Rahul Aggarwal Eric Gray.
1 ICMP : Internet Control Message Protocol Computer Network System Sirak Kaewjamnong.
© 2009 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IETF 84 – Vancouver August 2012 LSP Ping Support for P2MP PWs (draft-jain-pwe3-p2mp-pw-lsp-ping-00.txt)
CCNA Introduction to Networking 5.0 Rick Graziani Cabrillo College
1 CMPT 471 Networking II ICMP © Janice Regan, 2012.
CS 6401 Internet Protocol Outline Introduction to Internet Protocol Header and address formats ICMP Tools.
Petrozavodsk State University, Alex Moschevikin, 2003NET TECHNOLOGIES Internet Control Message Protocol ICMP author -- J. Postel, September The purpose.
ICMP (Internet Control Message Protocol) Computer Networks By: Saeedeh Zahmatkesh spring.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Network Layer ICMP and fragmentation.
21.1 Chapter 21 Network Layer: Address Mapping, Error Reporting, and Multicasting Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Internet Control Message Protocol (ICMP). Objective l IP and ICMP l Why need ICMP? l ICMP Message Format l ICMP fields l Examples: »Ping »Traceroute.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 8 TCP/IP Suite Error and Control Messages.
CCNA 2 Week 8 TCP/IP Suite Error Control Messages.
Fall 2005Computer Networks20-1 Chapter 20. Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv ARP 20.2 IP 20.3 ICMP 20.4 IPv6.
© Jörg Liebeherr (modified by M. Veeraraghavan) 1 ICMP: A helper protocol to IP The Internet Control Message Protocol (ICMP) is the protocol used for error.
1 Internet Control Message Protocol (ICMP) Used to send error and control messages. It is a necessary part of the TCP/IP suite. It is above the IP module.
1 Network Layer Lecture 16 Imran Ahmed University of Management & Technology.
Error and Control An IP datagram travels from node to node on the way to its destination Each router operates autonomously Failures or problems may occur.
Transport Layer3-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
BAI513 - PROTOCOLS ARP BAIST – Network Management.
© 2009 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IETF 84 – Vancouver August 2012 LSP Ping Support for E-VPN and PBB-
IP Traffic Engineering RSP draft-shen-ip-te-rsp-01.txt Naiming Shen Albert Tian Jun Zhuang
1 Connectivity with ARP and RARP. 2 There needs to be a mapping between the layer 2 and layer 3 addresses (i.e. IP to Ethernet). Mapping should be dynamic.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-l2vpn-evpn-inter-subnet- switching-03.txt A. Sajassi.
RBridges: Operations, Administration, and Maintenance (OAM) Support David Bond, Vishwas Manral UNH-IOL, IP Infusion draft-bond-trill-rbridge-oam-00 1.
© Jörg Liebeherr (modified by M. Veeraraghavan) 1 ICMP The PING Tool Traceroute program IGMP.
NVO3 Overlay P2MP Ping draft-xia-nvo3-overlay-p2mp-ping-00 Liang Xia, Weiguo Hao, Greg Mirsky July 2014 Toronto.
Pseudo Wire (PW) Virtual Circuit Connection Verification (VCCV) Update Thomas D. Nadeau Cisco Systems, Inc Rahul Aggarwal (Presenter) Juniper Networks.
Flow OAM Requirements Janardhanan Pathangi Balaji Venkat Venkataswami DELL Richard Groves – Microsoft Peter Hoose – Facebook
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 8 TCP/IP Suite Error and Control Messages.
4: Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
IETF 67, Nov 2006Slide 1 VCCV Extensions for Multi- Segment Pseudo-Wire draft-hart-pwe3-segmented-pw-vccv-01.txt draft-ietf-pwe3-segmented-pw-04.txt Mustapha.
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
MPLS-TP Fault Management Draft draft-boutros-mpls-tp-fault-01
Internet Control Message Protocol (ICMP)
The New Internet Protocol
Error and Control Messages in the Internet Protocol
ICMP – Using Ping and Trace
IPv6 Router Alert Option for MPLS OAM
Internet Control Message Protocol (ICMP)
The New Internet Protocol
Multi-layer OAM for SFC Networks draft-wang-sfc-multi-layer-oam-09
Internet Control Message Protocol (ICMP)
ICMP – Using Ping and Trace
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
Greg Mirsky Jeff Tantsura Mach Chen Ilya Varlashkin
Chapter 15. Internet Protocol
Technical Issues with draft-ietf-mpls-bfd-directed
Internet Control Message Protocol
Computer Networks Protocols
32 bit destination IP address
How OAM Identified in Overlay Protocols draft-mirsky-rtgwg-oam-identify Greg Mirsky IETF-104 March 2019, Prague.
Kapil Arora Shraddha Hegde IETF-103
Inter-AS OAM for SR Networks IETF 105, Montreal
Presentation transcript:

Generic Overlay OAM and Datapath Failure Detection Kanwar Singh (Nuage Networks) Pradeep Jain, Florin Balus Nuage Networks Wim Henderickx Alcatel-Lucent, Inc Anil Lohiya, Ravi Shekhar Juniper Networks, Inc Vinay Bannai Paypal, Inc

Motivation of Generic Overlay OAM Application Existing IP/Ping Trace does not work well for Overlays. Consistency of Control and Data Plane Programming. Continuity Check. Fault Verification. Fault Isolation. Performance. – Packet Delay Statistics. – Packet Loss Measurements.

Requirements for Overlay OAM Framework Originating Overlay End Point should send the OAM Frame (Echo Request) following the same Data-Path as that of End-System’s traffic. Terminating Overlay End Point should be able to differentiate the OAM Frames from the End System Data, and send it to OAM Application for Reply. Should be able to achieve OAM for applications using L2 and L3 Overlays. Should give capability to Trace the Path taken in the Underlay for a given Overlay Segment. Should work for Overlay Technologies as VxLAN, NVGRE, MPLSoGRE, MPLSoUDP.

Generic Overlay OAM Packet UDP Packet with well defined Port XXXX. TLV Format for identifying various types of Overlay OAM Request/Reply (e.g. VxLAN, NVGRE, MPLSoGRE, MPLSoUDP). Optional Sub-TLVs to identify End-System information | Message Type | Reply mode | Return Code | Return Subcode| | Originator Handle | | Sequence Number | | TimeStamp Sent (seconds) | | TimeStamp Sent (microseconds) | | TimeStamp Received (seconds) | | TimeStamp Received (microseconds) | | TLVs... |.. | |

Overlay Ping - Originating Overlay End Point Procedures Outer Header Should follow Encapsulation similar to Overlay Segment – VxLAN / NVGRE : Set Router Alert Bit (draft-singh-nvo3-vxlan-router-alert / draft-singh- nvo3-nvgre-router-alert) – indicating Control Packetdraft-singh-nvo3-vxlan-router-alertdraft-singh- nvo3-nvgre-router-alert – MPLSoGRE/MPLSoUDP : Add Router Alert Label following Overlay Segment Label. Inner Header Encapsulation – L2 Overlay Echo Request should have inner Ethernet Header, followed by IP and UDP Header Inner DMAC: E-90-XX-XX (to be assigned by IANA) Inner DST-IP: In Range of 127/8 (for IPv4) or In Range 0:0:0:0:0:FFFF:127/104 (for IPv6) Inner DST-UDP Port: XXXX (assigned by IANA for Overlay OAM). Generic OAM Frame – L3 Overlay Echo Request’s Encapsulation is same as above, except Inner Ethernet Header.

Overlay Ping - Terminating Overlay End Point Procedures Identify Packet as Control Packet from Outer Header – VxLAN / NVGRE : Router Alert Bit (draft-singh-nvo3-vxlan-router-alert / draft-singh- nvo3-nvgre-router-alert)draft-singh-nvo3-vxlan-router-alertdraft-singh- nvo3-nvgre-router-alert – MPLSoGRE/MPLSoUDP : Router Alert Label. Identify Packet as Overlay OAM Packet and sent it to OAM Application using Inner Header Encapsulation – L2 Overlay Inner DMAC: E-90-XX-XX (to be assigned by IANA) Inner DST-IP: In Range of 127/8 (for IPv4) or In Range 0:0:0:0:0:FFFF:127/104 (for IPv6) Inner DST-UDP Port: XXXX (assigned by IANA for Overlay OAM). – L3 Overlay Inner DST-IP: In Range of 127/8 (for IPv4) or In Range 0:0:0:0:0:FFFF:127/104 (for IPv6) Inner DST-UDP Port: XXXX (assigned by IANA for Overlay OAM). Validate Control/Data Plane and Send Echo Reply with Return Code

Overlay Ping Construct Two Type of Packets – Echo Request – Echo Reply Reply Modes – Do not reply – Reply via IPv4 UDP Packet – Reply via Overlay Segment Return Codes – No return code – Malformed Echo Request Received – Overlay Segment Not Present – Overlay Segment Not Operational – Return-Code-OK

Path Trace Procedures Echo Request is prepared via same Encapsulation as that of Overlay Tunnel. Echo Request packets are sent with Incremental TTL values 1, 2..n of Outer Header to probe the Path taken by the Overlay. TTL Expiry creates an Exception, packet is sent to OAM Application based on inner UDP Port. Each Transit Node as well as Overlay End Point receiving such an exception should send Echo Reply.

Procedures End-System Ping Originating Overlay End Point – Echo Request similar to Overlay Ping along with :- TLV Identifying Overlay Segment. Sub-TLV identifying Type of End-System Ping (e.g MAC, IP or MAC/IP of End- System). – Echo Request follows same Data Path as that of End-System Data. Terminating Overlay End Point – Terminating Overlay End Point validates End-System(s) information and send Echo Reply with proper Return Code for each End-System. Return Code – End-System Present – End-System Not Present

Next Step Looking forward to Comment/Feedback. Request the document to be accepted as WG document