Sub-IP Layer Protection Mechanism Performance Benchmarking draft-ietf-bmwg-protection-term-04.txt draft-ietf-bmwg-protection-meth-03.txt BMWG, IETF-71.

Slides:



Advertisements
Similar presentations
1 Link-State IGP Data-Plane Convergence Benchmarking draft-ietf-bmwg-igp-dataplane-conv-meth-20 draft-ietf-bmwg-igp-dataplane-conv-term-20 S. Poretsky,
Advertisements

69th IETF Chicago IETF BMWG WLAN Switch Benchmarking Tarunesh Ahuja, Tom Alexander, Scott Bradner, Sanjay Hooda, Jerry Perser, Muninder Sambi.
Sub-IP Layer Protection Mechanism Performance Benchmarking draft-ietf-bmwg-protection-term-05 draft-ietf-bmwg-protection-meth-04 November 17, 2008 Rajiv.
Understanding Layer 3 Redundancy. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 2 Upon completing this lesson, you will be able.
Pseudowire Endpoint Fast Failure Protection draft-shen-pwe3-endpoint-fast-protection-00 Rahul Aggarwal Yimin Shen
PW Endpoint Fast Failure Protection draft-shen-pwe3-endpoint-fast-protection-03 Yimin Shen (Juniper) Rahul Aggarwal (Arktan Inc) Wim Henderickx (Alcatel-Lucent)
CS Summer 2003 Lecture 12 FastReRoute (FRR) - Big Picture.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L6 1 Implementing Secure Converged Wide Area Networks (ISCW)
Restoration Routing in MPLS Networks Zartash Afzal Uzmi Computer Science and Engineering Lahore University of Management Sciences.
MPLS Protection Routing: A Tutorial Zartash Afzal Uzmi.
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
1 Authors: Scott Poretsky, Quarry Technologies Shankar Rao, Qwest Communications Ray Piatt, Cable and Wireless 58th IETF Meeting – Minneapolis Accelerated.
Proposal for new Working Group Item: Core Router Software Accelerated Life Testing (draft-poretsky-routersalt-term-00.txt) Authors: Scott Poretsky, Avici.
1 BENCHMARKING IGP DATA PLANE ROUTE CONVERGENCE draft-ietf-bmwg-igp-dataplane-conv-app-08.txt draft-ietf-bmwg-igp-dataplane-conv-term-08.txt draft-ietf-bmwg-igp-dataplane-conv-meth-08.txt.
Sub-ip - 1 Blurring the Lines Between Circuits and Protocols: Plans to Re-Organize Sub-IP Technologies in the IETF Scott Bradner Harvard University.
IGP Data Plane Convergence draft-ietf-bmwg-dataplane-conv-meth-14.txt draft-ietf-bmwg-dataplane-conv-term-14.txt draft-ietf-bmwg-dataplane-conv-app-14.txt.
A Snapshot on MPLS Reliability Features Ping Pan March, 2002.
Labelcast Protocol Presented by Wang Hui 80th IETF, March 2011 draft-sunzhigang-sam-labelcast-01.
1 BENCHMARKING NETWORK DEVICES UNDER ACCLERATED STRESS draft-ietf-bmwg-acc-bench-term-07.txt draft-ietf-bmwg-acc-bench-meth-04.txt draft-ietf-bmwg-acc-bench-meth-ebgp-00.txt.
Analyze Assure Accelerate Benchmarking Terminology for Protection Performance Takumi Kimura Jerry Perser 55 th IETF Atlanta, USA.
Sub-IP Layer Protection Mechanism Performance Benchmarking draft-ietf-bmwg-protection-term-04.txt draft-ietf-bmwg-protection-meth-03.txt BMWG, IETF-72.
Section #7: Getting Data from Point A to Point B.
PIM Extension For Tunnel Based Multicast Fast Reroute (TMFRR) draft-lwei-pim-tmfrr-00 IETF 76, Hiroshima.
IGP Data Plane Convergence draft-ietf-bmwg-dataplane-conv-meth-15.txt draft-ietf-bmwg-dataplane-conv-term-15.txt draft-ietf-bmwg-dataplane-conv-app-15.txt.
1 IGP Data Plane Convergence Benchmarking draft-ietf-bmwg-igp-dataplane-conv-app-01.txt draft-ietf-bmwg-igp-dataplane-conv-term-01.txt draft -ietf-bmwg-igp-dataplane-conv-meth-01.txt.
1 Scott Poretsky, Quarry Technologies Shankar Rao, Qwest Communications Jean-Louis Le Roux, France Telecom Rajiv Papneja, Isocore Rajesh Khanna, Avici.
1 Sub-IP Protection Methods of Measurement: Considerations Al Morton bmwg Chair IETF-72.
A Snapshot on MPLS Reliability Features Ping Pan March, 2002.
1 68th IETF, Prague, March 2007 Address Resolution for GMPLS controlled PSC Ethernet Interfaces draft-ali-arp-over-gmpls-controlled-ethernet-psc-i-04.txt.
1 Authors: Scott Poretsky, Reef Point Systems Shankar Rao, Qwest Communications 64th IETF Meeting – Vancouver Accelerated Stress Benchmarking draft-ietf-bmwg-acc-bench-term-07.txt.
1 Benchmarking Methodology WG (bmwg) 71st IETF – Philadelphia, PA USA Monday, March 10, 2008, 13:00-15:00 (Salon J) Chairs: –Al Morton
1 Protection in SONET Path layer protection scheme: operate on individual connections Line layer protection scheme: operate on the entire set of connections.
28 July BGP Data-Plane Benchmarking Applicable to Modern Routers Ilya Varlashkin Rajiv Papneja Bhavani Parise presented by Grégory CAUCHIE.
23Mar BGP Data-Plane Benchmarking Applicable to Modern Routers Rajiv Papneja Ilya Varlashkin Bhavani Parise Dean Lee Sue Hares.
1 IETF-70 draft-akhter-bmwg-mpls-meth MPLS Benchmarking Methodology draft-akhter-bmwg-mpls-meth-03 IETF 70 Aamer Akhter / Rajiv Asati /
82 nd Taipei Protection Mechanisms for LDP P2MP/MP2MP LSP draft-zhao-mpls-mldp-protections-00.txt Quintin Zhao, Emily Chen, Huawei.
1 RSVP-TE Extensions For Fast Reroute of Bidirectional Co-routed LSPs draft-tsaad-mpls-rsvpte-bidir-lsp-fastreroute-00.txt Author list: Mike Taillon
1 IGP Data Plane Convergence Benchmarking draft-ietf-bmwg-igp-dataplane-conv-app-00.txt draft-ietf-bmwg-igp-dataplane-conv-term-00.txt draft -ietf-bmwg-igp-dataplane-conv-meth-00.txt.
Sub-IP Layer Protection Mechanism Performance Benchmarking draft-ietf-bmwg-protection-term-03.txt draft-ietf-bmwg-protection-meth-02.txt BMWG, IETF-70.
1 IGP Data Plane Convergence draft-ietf-bmwg-igp-dataplane-conv-meth-21 draft-ietf-bmwg-igp-dataplane-conv-term-21 BMWG, IETF-78 Maastricht, July 2010.
Gateway redundancy protocols
Advanced Computer Networks
Multiprotocol Label Switching
Layer 3 Redundancy 1. Hot Standby Router Protocol (HSRP)
Authors: Scott Poretsky, Quarry Technologies Brent Imhoff, LightCore
Zhenbin Li, Li Zhang(Huawei Technologies)
P2MP MPLS-TE Fast Reroute with P2MP Bypass Tunnels
Tomohiro Otani Kenji Kumaki Satoru Okamoto Wataru Imajuku
Presenter: Jeffrey Zhang
Authors: Scott Poretsky, Quarry Technologies Brent Imhoff, LightCore
Accelerated Stress Benchmarking
IETF BMWG FRR Related Benchmarking Drafts Status and Update
IETF BMWG FRR Related Benchmarking Drafts Status and Update
Extensions to Resource Reservation Protocol For Fast Reroute of Traffic Engineering GMPLS LSPs draft-ietf-teas-gmpls-lsp-fastreroute-06 Authors: Mike Taillon.
Network Survivability
Valiant Communications Limited
The Business Value of MPLS VPNs
MPLS and its Applications CS 520 – Winter 2006 Lecture 17
Valiant Communications Limited
Valiant Communications Limited
MPLS and its Applications CS 520 – Winter 2007 Lecture 17
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
Label Switched VPNs – Scalability and Performance Analysis
Eusebi Calle, Jose L Marzo, Anna Urra. L. Fabrega
Exploiting Routing Redundancy via Structured Peer-to-Peer Overlays
IETF BMWG MPLS TE Scalability and Performance Status and Update
Editors: Bala’zs Varga, Jouni Korhonen
IPFRR WITH FAST NOTIFICATION
Presentation transcript:

Sub-IP Layer Protection Mechanism Performance Benchmarking draft-ietf-bmwg-protection-term-04.txt draft-ietf-bmwg-protection-meth-03.txt BMWG, IETF-71 Philadelphia March 2008 Author Team: Poretsky, Papneja, Karthik, Vapiwala, LeRoux, Rao

2 Scope of Work Item Common terminology and metrics for benchmarking the performance of sub-IP layer protection mechanisms Benchmarks are measured at the IP-Layer Methodology is technology-independent so can be used to compare performance of different protection mechanisms. Terminology will applied to separate Methodology documents for different sub-IP layer protection mechanisms  Multi-Protocol Label Switching Fast Reroute (MPLS-FRR)  Generalized MPLS (GMPLS)  Automatic Protection Switching (APS)  Virtual Router Redundancy Protocol (VRRP)  Stateful High Availability (HA)

3 Scope in Terminology Introduction Technologies that function at sub-IP layers can be enabled to provide further protection of IP traffic by providing the failure recovery at the sub-IP layers so that the outage is not observed at the IP-layer. Such Sub-IP Protection technologies include High Availability (HA) stateful failover, Virtual Router Redundancy Protocol (VRRP), Automatic Link Protection (APS) for SONET/SDH, Resilient Packet Ring (RPR) for Ethernet, and Fast Reroute for Multi-Protocol Label Switching (MPLS-FRR) [8]. Benchmarking terminology have been defined for IP-layer route convergence [7]. New terminology and methodologies specific to benchmarking sub-IP layer protection mechanisms are required. This will enable different implementations of the same protection mechanisms to be benchmarked and evaluated. In addition, different protection mechanisms can be benchmarked and evaluated. The metrics for benchmarking the performance of sub-IP protection mechanisms are measured at the IP layer, so that the results are always measured in reference to IP and independent of the specific protection mechanism being used. The purpose of this document is to provide a single terminology for benchmarking sub-IP protection mechanisms. It is intended that there can exist unique methodology documents for each sub-IP protection mechanism.

4 Terminology Changes from Rev 03 to 04 Added new terms:  Local Link Protection  Redundant Node Protection  State Control Interface  Headend Node  Backup Node  ( Merge Node )  Primary Node  Standby Node

5 Added Figures for Protection Mechanisms (1 of 2) Ingress/ Headend Egress/ Merge Backup Tester Failover Event IP Traffic Primary Path Backup Path Ingress/ Headend Egress/ Merge Backup Tester Failover Event IP Traffic Primary Path Backup Path MidPoint Ingress/ Headend Egress/ Merge Backup Tester Failover Event IP Traffic Primary Path Backup Path MidPoint Link Protection Node Protection (Also provides Link Protection) Path Protection (Also provides Node Protection and Link Protection)

6 Added Figures for Protection Mechanisms (2 of 2) Ingress/ Headend Egress/ Merge Backup Tester Failover Event IP Traffic Primary Path Backup Path Ingress/ Headend Egress/ Merge Tester Failover Event IP Traffic Primary Path Backup Path Ingress/ Headend Egress/ Merge Standby Tester Failover Event IP Traffic Primary Path Primary State Control Interface Link Protection Local-Link Protection Redundant Node Protection

7 Sequence of Events 1. Failover Event - Primary Path fails 2. Failure Detection- Failover Event is detected 3. Failover - Backup Path becomes the Working Path due to Failover Event 4. Restoration - Primary Path recovers from a Failover Event 5. Reversion (optional) - Primary Path becomes the Working Path

8 Benchmarks Failover Packet Loss Reversion Packet Loss Failover Time Reversion Time Additive Backup Dely (Equation 1) Additive Backup Delay = Forwarding Delay(Backup Path) - Forwarding Delay(Primary Path) Unimpaired Packet  Out-of-order Packet [Ref.[4], section 3.3.2]  Duplicate Packet [Ref.[4], section 3.3.3]  Forwarding Delay [Ref.[4], section 3.2.4]  Packet Loss [Ref.[7], Section 3.5]

9 Calculation Methods Time-Based Loss Method (TBLM) (Equation 2a) TBLM Failover Time = Time(Failover) - Time(Failover Event) (Equation 2b) TBLM Reversion Time = Time(Reversion) - Time(Restoration) Timestamp-Based Method (TBM) Uses Equation 2 with the difference being that the time values are obtained from the timestamp in the packet payload rather than from the Tester. Packet-Loss Based Method (PLBM) (Equation 3a) PLBM Failover Time = Number of packets lost / (Offered Load rate * 1000) Units are packets/(packets/second) = seconds (Equation 3b) PLBM Restoration Time = Number of packets lost / (Offered Load rate * 1000) Units are packets/(packets/second) = seconds

10 Methodology Changes from Rev 02 to 03 New version submitted February 18, 2008 Minor nits to the document Waiting for terminology to firm up before making further changes to the methodology document Excellent comments from Tom Alexander – Brief overview and AI  We plan to address and respond to the comments to the mailing list  We will clarify the stream characteristics as pointed out in your comments  We will try to bring uniformity in terms usage through out the document  We will try to reduce the number of figures by using your suggestions on compressed topology (Need to discuss with other authors though!)  Will try to address the scenario in the diagrams where head-end is the PLR  Will streamline the definitions once terminology document is finalized

11 Next Steps Incorporate any new comments from meeting and mailing list  Methodology document to updated upon obtaining concurrence on terminology document  Version 4 of Methodology Document to include Tom’s comments Seek direction from the working group on firming up the progress of terminology document

12 BACKGROUND SLIDES

13 Terminology Changes from Rev 02 to 03 Removed term “Tunnel” because it was not used anywhere and was similar in definition to “Path”. Path definition updated to be sequence of nodes and links, not just sequence of nodes. Added two new Benchmarks:  Failover Packet Loss  Reversion Packet Loss Added sequence of events to section 1. Introduction “The sequence of events is as follows: 1. Failover Event - Primary Path fails 2. Failure Detection- Failover Event is detected 3. Failover - Backup Path becomes the Working Path due to Failover Event 4. Restoration - Primary Path recovers from a Failover Event 5. Reversion (optional) - Primary Path becomes the Working Path”

14 Restoration/Reversion Clarified in Restoration Definition: The act of Failover Recovery in which the Primary Path is restored following a Failover Event Reversion Definition: The act of restoring the Primary Path as the Working Path Restoration Definition: The act of failover recovery in which the Primary Path recovers from a Failover Event, but is not yet forwarding packets because the Backup Path remains the Working Path Reversion Definition: The act of failover recovery in which the Primary Path becomes the Working Path so that it forwarding packets. -02 Submittal-03 Submittal