1 draft-ietf-pim-drlb. 2 First presented at IETF 82, Taipei, accepted as WG draft-ietf-pim-drlb-00 Update History: -02: Included BSR hashing to select.

Slides:



Advertisements
Similar presentations
Draft-ietf-pim-port-06. port-06 update Changes made in response to second wglc comments and following discussion Many minor editorial issues fixed Changed.
Advertisements

Group-to-RP Mapping Algorithm PIM Working Group Bharat Joshi Infosys Technologies Ltd. draft-joshi-pim-group-rp-mapping-00.txt.
PIM group-to-RP mapping draft-pim-group-rp-mapping David McWalter Background and agreed items: -Several mechanisms provide a router.
Implementing Layer 3 High Availability
Wide-area cooperative storage with CFS
On-Demand Media Streaming Over the Internet Mohamed M. Hefeeda, Bharat K. Bhargava Presented by Sam Distributed Computing Systems, FTDCS Proceedings.
Objectives After completing this chapter you will be able to: Describe hierarchical routing in OSPF Describe the 3 protocols in OSPF, the Hello, Exchange.
Ietf-65 draft-kulmala-l3vpn-interas-option-d-02.txt ASBR VRF Context for BGP/MPLS IP VPN IETF-65 draft-kulmala-l3vpn-interas-option-d-02.txt Marko Kulmala.
Host Identity Protocol
Enhanced IGRP (EIGRP) EIGRP Characteristics. EIGRP Configuration. Verifying EIGRP.
Symmetric Replication in Structured Peer-to-Peer Systems Ali Ghodsi, Luc Onana Alima, Seif Haridi.
LAN Switching and WAN Networks Topic 6 - OSPF. What we have done so far! 18/09/2015Richard Hancock2  Looked at the basic switching concepts and configuration.
Instructor & Todd Lammle
Ogier - 1 MANET Extension of OSPF Using CDS Flooding draft-ogier-manet-ospf-extension-03.txt Richard Ogier March 2, 2005 IETF Meeting - OSPF WG.
1 Event Throttle draft-niemi-sipping-event-throttle th IETF, Minneapolis.
Multicast Routing Algorithms n Multicast routing n Flooding and Spanning Tree n Forward Shortest Path algorithm n Reversed Path Forwarding (RPF) algorithms.
Instructor & Todd Lammle
CCNA 3 Week 2 Link State Protocols OSPF. Copyright © 2005 University of Bolton Distance Vector vs Link State Distance Vector –Copies Routing Table to.
OSI Model. Switches point to point bridges two types store & forward = entire frame received the decision made, and can handle frames with errors cut-through.
SR-634 Q: Is it possible set IP to use the WAN#1 connection only; all internet access should only pass through WAN#1. A: Recently, loading.
Objectives After completing this chapter you will be able to: Understand how routers operate Describe Distance Vector and Link State Algorithms Describe.
Akbar Rahman Juan Carlos Zúñiga Guang Lu IETF 78, July P2P Streaming for Mobile Nodes: Scenarios.
Saeed Darvish Pazoki – MCSE, CCNA Abstracted From: Cisco Press – ICND 2 – 10 EIGRP 1.
6lowpan ND Optimization draft Update Samita Chakrabarti Erik Nordmark IETF 69, 2007 draft-chakrabarti-6lowpan-ipv6-nd-03.txt.
CSC 600 Internetworking with TCP/IP Unit 5: IP, IP Routing, and ICMP (ch. 7, ch. 8, ch. 9, ch. 10) Dr. Cheer-Sun Yang Spring 2001.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Session_ID Presentation_ID Group-to-RP Mapping IETF Draft: draft-ietf-pim-group-rp-mapping-03.
Packet Format Issues #227: Need Shim Header to indicate Crypto Property of packet Do we need to add pre-amble header to indicate if data is encrypted or.
CO5023 Single Area OSPF. Routing So far, we’ve looked at issues concerning the distribution and access layers. Routing is the process used to interconnect.
S7C8 Hot Standby Router Protocol
1 Multicast Routing Blackhole Avoidance draft-asati-pim-multicast-routing-blackhole-avoid-00 Rajiv Asati Mike McBride IETF 72, Dublin.
PIM Extension For Tunnel Based Multicast Fast Reroute (TMFRR) draft-lwei-pim-tmfrr-00 IETF 76, Hiroshima.
Desired Behavior  This proposed mechanism provides a robust means of electing an RP from a subset of the domain’s PIM routers which are configured and.
BSR Spec Status BSR Spec authors 03/06. Status ID refreshed (now rev-07) Resolved remaining issues we had on our list Updated to reflect WG
March 20th, 2001 SIP WG meeting 50th IETF SIP WG meeting Overlap signalling handling
Extension of the MLD proxy functionality to support multiple upstream interfaces 1 Luis M. Contreras Telefónica I+D Carlos J. Bernardos Universidad Carlos.
62 nd IETF RADIUS Bandwidth Capability Avi Lior, Bridgewater Systems Farid Adrangi, Intel Paul Congdon, ProCurve Networking Business Chuck Black, ProCurve.
82 nd Taipei Protection Mechanisms for LDP P2MP/MP2MP LSP draft-zhao-mpls-mldp-protections-00.txt Quintin Zhao, Emily Chen, Huawei.
111 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3: Switching Basics and Intermediate Routing v3.0.
Extension of the MLD proxy functionality to support multiple upstream interfaces 1 Luis M. Contreras Telefónica I+D Carlos J. Bernardos Universidad Carlos.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Session_ID Presentation_ID Group-to-RP Mapping IETF Draft: draft-ietf-pim-group-rp-mapping-00.
Akbar Rahman Juan Carlos Zúñiga Guang Lu IETF 79, November P2P Streaming Requirements for Mobile.
Agenda Problem Statement Solution Overview and Applicability
Layer 3 Redundancy 1. Hot Standby Router Protocol (HSRP)
Kapitel 19: Routing. Kapitel 21: Routing Protocols
Richard Ogier Presented by Tom Henderson March 23, 2006
Diagnosing PIM Protocol States PIM Working Group
OSPF (Open Shortest Path First)
IETF#67 – 5-10 November 2006 FECFRAME requirements (draft-ietf-fecframe-req-01) Mark Watson.
Introducing The OSPF Routing Protocol
What Are Routers? Routers are an intermediate system at the network layer that is used to connect networks together based on a common network layer protocol.
(draft-archana-pimwg-pim-ping-00.txt)
CARD Designteam A. Singh, D. Funato, H. Chaskar, M. Liebsch
CS 457 – Lecture 12 Routing Spring 2012.
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Summary Issued adoption call for draft-zhou-pim-vrrp.
Framework for EVPN Designated Forwarder Election Extensibility
  30 A 30 B 30 C 30 D 30 E 77 TOTALS ORIGINAL COUNT CURRENT COUNT
IS-IS Flooding Reduction in MSDC
Routing With a Link-State Protocol
draft-ietf-pim-ecmp-01 IETF 82, Taipei
Ch 17 - Binding Protocol Addresses
Update on Whole Effluent Toxicity (WET)
PIM Backup DR Mankamana Mishra IETF-102
Static Routing 2nd semester
PANA enabling IPsec based Access control
PIM DR IMPROVEMENT draft-ietf-pim-dr-improvement-05
Neeraj Malhotra (Arrcus) Ali Sajassi (Cisco) Jorge Rabadan (Nokia)
RFC 4601 Revision Prague, March 2011 Rishabh Parekh (Cisco)
draft-ietf-pim-drlb-08
Presentation transcript:

1 draft-ietf-pim-drlb

2 First presented at IETF 82, Taipei, accepted as WG draft-ietf-pim-drlb-00 Update History: -02: Included BSR hashing to select GDR -03: Proposal Introduce hash algorithm selector Introduce router Id

3 hashvalue_group=((Group_address &Group_hashmask)>>N) %M M number of candidate GDRS Because of the nature of algorithm it evenly distributes the load on candidate GDRs. Works best when there are two DRs

4 hashvalue_group=( *(( *(Group_address & Group_hashmask)+12345) XOR GDR(i))+12345) mod 2^31 Originally used in RP election process It does not evenly distribute the load

5 Tested on sequential group joins Original 3 candidate GDRs Failure of a candidate GDR Addition of a candidate GDR Ran test multiple times to get average numbers

6

7 Count of unaffected Groups Count of Reassigned Groups from GDR3 Count of Reassigned Groups from unaffected GDRs

8 Distribution of new Candidate GDR

9 Between the two, BSR provides the minimum interruption of streams in case of a failover when there are three or more routers. On the other hand, Modulo has a even distribution when in comes to load balancing.

10 Initial draft: Modulo 2 nd Version: BSR Next Version: Introduce a new “algorithm” type: o 0 for Modulo o 1 for BSR o Others for future developed algorithm if any o Only run DRLB if all LHR agree on the same algorithm, otherwise log error message, detail to be followed

11 Suggestion to include “Interface ID” option in Hello If “interface ID” option presents in Hello, use “Router ID”, instead of “interface IP address”, to calculate hash, so that same router is elected on different LANs to save uplink bandwidth “Router ID” is more desired in BSR hash algorithm than in Modulo, because the BSR hash result is tricky to predict

12 Thank you