Ethernet Network Network Interface: Heavy or Light?

Slides:



Advertisements
Similar presentations
CSE 413: Computer Networks
Advertisements

Split Brain Detection Version 00 Nigel Bragg September 4 th,
DRNI – Intra-DAS Link Version 01 Stephen Haddock July 20,
CSCI 465 D ata Communications and Networks Lecture 20 Martin van Bommel CSCI 465 Data Communications & Networks 1.
Data Communications System By Ajarn Preecha Pangsuban.
Routing: Cores, Peers and Algorithms
TEL 355: Communication and Information Systems in Organizations Architecture: Signaling System 7 (SS7) Professor John F. Clark.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
Module 3.4: Switching Circuit Switching Packet Switching K. Salah.
1 Fall 2005 Internetworking: Concepts, Architecture and TCP/IP Layering Qutaibah Malluhi CSE Department Qatar University.
Signalling Systems System which allows various network components to exchange information –In particular, it supports call / connection control network.
The OSI Model and the TCP/IP Protocol Suite
1 K. Salah Module 4.0: Network Components Repeater Hub NIC Bridges Switches Routers VLANs.
Chapter 10 Introduction to Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
1 Version 3.0 Module 10 Routing Fundamentals and Subnetting.
Chapter 2 Network Models.
1 K. Salah Module 4.3: Repeaters, Bridges, & Switches Repeater Hub NIC Bridges Switches VLANs GbE.
SMUCSE 8344 Constraint-Based Routing in MPLS. SMUCSE 8344 Constraint Based Routing (CBR) What is CBR –Each link a collection of attributes (performance,
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
Network Topologies.
Data Communications and Networking
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Network Design Essentials. Guide to Networking Essentials, Fifth Edition2 Contents 1. Examining the Basics of a Network Layout 2. Understanding Standard.
Network Design Essentials
Presentation on Osi & TCP/IP MODEL
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Protocol Layering Chapter 10. Looked at: Architectural foundations of internetworking Architectural foundations of internetworking Forwarding of datagrams.
Common Devices Used In Computer Networks
Chapter 2 – X.25, Frame Relay & ATM. Switched Network Stations are not connected together necessarily by a single link Stations are typically far apart.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
THE OSI REFERENCE MODEL Open Systems Interconnection (OSI) International Organization for Standardization( ISO)
Network Devices.
Spring 2006Computer Networks1 Chapter 2 Network Models.
1 Flow Identification Assume you want to guarantee some type of quality of service (minimum bandwidth, maximum end-to-end delay) to a user Before you do.
TELE202 Lecture 5 Packet switching in WAN 1 Lecturer Dr Z. Huang Overview ¥Last Lectures »C programming »Source: ¥This Lecture »Packet switching in Wide.
Intro to Network Design
Chapter 3: Networking and Internetworking 1. Introduction Networking issues for distributed systems: Performance,scalability,reliability,security,mobility,
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 9 Virtual Trunking Protocol.
CCNA 1 v3.0 Module 10 Routing Fundamentals and Subnets.
Routing Fundamentals and Subnets Introduction to IT and Communications Technology CE
(Slide set by Norvald Stol/Steinar Bjørnstad
1 Chapter 4. Protocols and the TCP/IP Suite Wen-Shyang Hwang KUAS EE.
Protocol Layering Chapter 11.
THE NETWORKS Theo Chakkapark. Open System Interconnection  The tower of power!  The source of this power comes from the model’s flexibility.
1 Switching and Forwarding Sections Connecting More Than Two Hosts Multi-access link: Ethernet, wireless –Single physical link, shared by multiple.
2016/3/11 1 Data Link Layer. 2016/3/11 2 Two basic services of Data Link Allows the upper layers to access the media using techniques such as framing.
Coping with Link Failures in Centralized Control Plane Architecture Maulik Desai, Thyagarajan Nandagopal.
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
Network Topology Computer network topology is the way various components of a network (like nodes, links, peripherals, etc) are arranged. Network topologies.
Chapter 3: Packet Switching (overview)
CCNA Practice Exam Questions
Lecture (2).
Packet Switching Datagram Approach Virtual Circuit Approach
ISO/OSI Model and Collision Domain
Hubs Hubs are essentially physical-layer repeaters:
Connecting Networks Repeater: physical layer Bridge: data link layer
Hubs Hubs are essentially physical-layer repeaters:
LESSON 2.1_B Networking Fundamentals Understand Switches.
RNI Requirements Imposed by PBB-TE
Chapter 3: Open Systems Interconnection (OSI) Model
Chapter 20 Network Layer: Internet Protocol
Stephen Haddock September 13, 2012
OSI Model The Seven Layers
Routing Fundamentals and Subnets
Data Link Layer 2019/2/19.
Chapter 11. Frame Relay Background Frame Relay Protocol Architecture
COMPUTER NETWORKS CS610 Lecture-29 Hammad Khalid Khan.
OSI Reference Model Unit II
Light ENNI – aka Split LAG …
OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
Presentation transcript:

Ethernet Network Network Interface: Heavy or Light? Two choices for an ENNI Rev. 1 Norman Finn nfinn@cisco.com

ENNI: Heavy or light? There are at least two distinct methods we can pursue for defining an Ether NNI: Heavy: A Buffer Network is built along the lines suggested in new-nfinn-buffer-networks-0310-v01.pdf with an explicit data encapsulation. Light: Buffer Network is built using “virtual nodes,” i.e. the multiple physical Nodes of each Portal cooperate to give the appearance of a Portal consisting of a single Node. Each method has its advantages and drawbacks, and all of the drawbacks can be addressed. This is a classic engineering decision.

Heavy ENNI

Heavy ENNI 1a 1b 3b 3c Region C 2a 2b 4b 4c Region A 5b 5c Buffer Network B The Regions choose which NNI (shown by a heavy red line) is used for each service. Each Node in the Buffer Network, whether real or virtual, must exist, so that data can be reliably delivered from NNI to NNI. One would expect that the Terminal Pairs (1a-1b, 5b-5c, etc.) are physical devices, and the NNIs virtual.

Heavy ENNI 1a 1b 3b 3c Region C 2a 2b 4b 4c Region A 5b 5c Buffer Network B The Heavy ENNI maximizes the independence of the two Regions. In order to minimize failure recovery times, we create explicit paths through the Buffer network from NNI to NNI, e.g. (3c –) 3b – 5b – 1b (– 1a), protected (presumably) by CFM.

Heavy ENNI – issues 1a 1b 3b 3c Region C 2a 2b 4b 4c Region A 5b 5c Buffer Network B The physical links between Terminal Nodes (e.g. between 3 and 4) are shared by the Buffer Network (3b-4b) and the Region (3c-4c). This makes the choice of encapsulation for frames between 3 and 4 or 1 and 2 somewhat difficult, and can affect the choice of encapsulation across the Buffer Network (1b-3b).

Heavy ENNI – issues 1a 1b 3b 3c Region C 2a 2b 4b 4c Region A 5b 5c Buffer Network B If the data forwarding and encapsulation methods of the two Regions are different (e.g. 802.1ad vs. VPLS), the choice of encapsulation for the Buffer Network can be difficult, especially with regard to physical link sharing (3-4 or 1-2). Separating the Terminal Pairs into physically separate devices solves this, of course, but is expensive.

Heavy ENNI – issues 1a 1b 3b 3c Region C 2a 2b 4b 4c Region A 5b 5c Buffer Network B The need to minimize the propagation of errors by enforcing a single NNI entry/exit point for each service can lead to “hairpinning” data needlessly across a physical link, as above where1a-1b and 4b-4c are the preferred NNIs for the blue service, requiring the double use of the 3b3c-4b4c physical link.

Light ENNI

Light ENNI 1 a a Region C 3 b b Region A c Link Aggregation The Terminal Nodes in each Region appear, to the other Region, to be a single Terminal Node (bridge, switch, or whatever). All of the inter-Region Links are combined into a single Aggregated Link using LACP. Links among Nodes in the same Region are invisible and irrelevant to the ENNI.

Light ENNI 1 a a Region C 3 b b Region A c Link Aggregation The means by which the Virtual Terminal Nodes are implemented does not need to be standardized; this author sees no requirement for 3a, 3b, and 3c to come from three different vendors. The choice of physical link is always up to the transmitting Virtual Terminal Node, and the receiving Virtual Terminal Node must live with the choice.

Light ENNI 1 a a Region C 3 b b Region A c Link Aggregation Physical level CFM can be used to improved failure detection time for the physical links. Obviously, the two Regions have to agree on a data encapsulation, but a 1:1 service encapsulation translation can be performed at either (or both) ends, and no encapsulation-dependent CFM is required.

Light ENNI – issues Clearly, service-based physical link selection is preferred to other methods, e.g., hashing the IP 5-tuple. For efficiency of routing, a means (perhaps LACP extensions) should be provided for one Region to express a preference (not a demand) for which link should be used for which service. For optimum maintainability, it we should provide a means (perhaps LACP extensions) for the two Virtual Terminal Nodes to agree to use the same physical link for both directions for a given service (or bundle of services).

Light ENNI – issues a a Region C 1 3 X X b b X X Region A c Link Aggregation The physical components of a Virtual Terminal Node appear to be a single Node to (at least) the other Region, and perhaps to other Nodes internal to the Region, as well. If one component of a Virtual Terminal Node fails (say 1b) then its attached Links fail, but the remaining Nodes (1a in this case) continue to function; recovery is quick.

Light ENNI – issues a a 1 Region C X 3 b b 1 Region A c Link Aggregation If the Link between two components of a Virtual Terminal Node (e.g. 1a-1b) fails, both components can takeover the Node’s identity, but act independently (the “split brain” scenario), with disastrous results. For this reason, “inter-VTN links” are made extra-reliable, and in some implementations, are assumed to be failure-proof.

Light ENNI – issues We cannot (in the author’s opinion) design a network standard around “failure proof links”. Since we are assuming that LACP is being used to establish Aggregated Links between Virtual Terminal Nodes, we could enhance LACP so that the devices connected to a Virtual Terminal Node can assist the VTN in detecting a “split brain” scenario. But, split brain detection is necessarily a hippity-hippity-hop operation, involving multiple Nodes; there is no equivalent to the (3c –) 3b – 5b – 1b (– 1a) Maintenance Association described for the Heavy ENNI. Split brain detection will be slower than MA failure detection.

Light ENNI – issues Recovery from the split brain is up to the implementation: Some implementations have no issues with a split brain. The issue can be handled with current LACP, removing Links to one of the physical Nodes from the aggregation. One of the physical Nodes can change its identity.

Summary

ENNI: Plusses and minuses Heavy: + CFM (enhanced) ensures fast failover in all situations. – The Buffer Network requires its own encapsulation across Links interior to a Region. – Data can be “hairpinned”. Light: + Encapsulation choices are flexible; no links are shared between Region and Buffer Network. – Detecting a split brain could slow the reaction time when a Link between elements of a virtual Node fails.

“Light NNI” vs. Alon/Sprecher

Why VTNs and LACP for Light NNI? In the data plane, the scheme shown here for “Light NNI” is essentially identical to that given in new-alon-service-protection-over-external-interfaces-03-10-v01-.pdf, which does not talk about virtual nodes or LACP. Using virtual nodes and LACP: Sidesteps a number of questions about the data plane, e.g., how can a Region’s routing/bridging protocol ensure delivery over the correct inter-Regional Link? Offers a mechanism (LACP) to provide some assurance that the inter-Regional Links are correctly connected. Provides a basis (again, LACP) for conveying necessary control information such as Service-to-Link assignment preferences. Solves the problem (via LACP), present in both schemes, of distinguishing between Node failures and Link failures.