Hierarchical J/P attributes draft-ietf-pim-hierarchicaljoinattr-01.txt

Slides:



Advertisements
Similar presentations
Draft-ietf-pim-port-06. port-06 update Changes made in response to second wglc comments and following discussion Many minor editorial issues fixed Changed.
Advertisements

PIM ECMP Assert draft-hou-pim-ecmp-00 IETF 80, Prague.
HTML Overview - Cascading Style Sheets (CSS). Before We Begin Make a copy of one of your HTML file you have previously created Make a copy of one of your.
Session Announcement Protocol Colin Perkins University College London.
Agenda Who is Secured What is Secured Logic and the Effective Permissions Guidelines and Best Practices.
You gotta be cool. Inheritance Base Classes and Derived Classes Inheritance: Public, Protected, Private What is inherited from the base class? Multiple.
IP Addressing. TCP/IP addresses -Addressing in TCP/IP is specified by the Internet Protocol (IP) -Each host is assigned a 32-bit number -Called the IP.
An Engineering Approach to Computer Networking
1 Introduction to Computability Theory Lecture13: Mapping Reductions Prof. Amos Israeli.
LEADER ELECTION CS Election Algorithms Many distributed algorithms need one process to act as coordinator – Doesn’t matter which process does the.
Learning Ontologies from RDF Annotations Alexandre Delteil, Catherine Faron-Zucker, Rose Dieng ACACIA project, INRIA, 2004 Sophia Antipolis, France.
1 Internet Networking Spring 2004 Tutorial 7 Multicast Routing Protocols.
Slide Set 15: IP Multicast. In this set What is multicasting ? Issues related to IP Multicast Section 4.4.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
Spanning Tree and Multicast. The Story So Far Switched ethernet is good – Besides switching needed to join even multiple classical ethernet networks Routing.
SharePoint document libraries I: Introduction to sharing files How to add and edit files Wondering how to actually work with a document library? You’re.
CHP - 9 File Structures. INTRODUCTION In some of the previous chapters, we have discussed representations of and operations on data structures. These.
IP Addressing Introductory material. An entire module devoted to IP addresses.
Formex XML Two years after introduction Dr. Holger Bagola Publications Office Directorate A ‘OJ and Access to Legislation’ ‘Methodology and development’
INF 384 C, Spring 2009 Ontologies Knowledge representation to support computer reasoning.
Website Development with Dreamweaver
IP Multicast Lecture 3: PIM-SM Carl Harris Communications Network Services Virginia Tech.
SharePoint document libraries I: Introduction to sharing files Sharjah Higher Colleges of Technology presents:
(Business) Process Centric Exchanges
March 12, 2008© Copyright 2008 John Buford SAM Overlay Protocol draft-buford-irtf-sam-overlay-protocol-01.txt John Buford, Avaya Labs Research IETF 71.
Multicast Routing Protocols. The Need for Multicast Routing n Routing based on member information –Whenever a multicast router receives a multicast packet.
Robin Mullinix Systems Analyst GeorgiaFIRST Financials PeopleSoft Query: The Next Step.
© J. Liebeherr, All rights reserved 1 Multicast Routing.
Interdomain IPv6 multicast Stig Venaas UNINETT. PIM-SM and Rendezvous Points Interdomain multicast routing is usually done with a protocol called PIM-SM.
E.Bertino, L.Matino Object-Oriented Database Systems 1 Chapter 5. Evolution Seoul National University Department of Computer Engineering OOPSLA Lab.
Multrans Path Optimization draft-zhou-mboned-multrans-path-optimization-02 Cathy ZHOU Qiong SUN IETF 84, Vancouver.
Draft-ietf-pim-source- discovery-bsr-01 IJsbrand Wijnands, Stig Venaas, Michael Brig,
RADEXT WG RADIUS Attribute Guidelines Greg Weber March 21 st, 2006 IETF-65, Dallas v1 draft-weber-radius-attr-guidelines-02.txt draft-wolff-radext-ext-attribute-00.txt.
Copyright © 2010 Verizon Foundation. All Rights Reserved. This document may be reproduced and distributed solely for uses that are both (a) educational.
1 Multicast Routing Blackhole Avoidance draft-asati-pim-multicast-routing-blackhole-avoid-00 Rajiv Asati Mike McBride IETF 72, Dublin.
Copyright © 2007, Oracle. All rights reserved. Using Document Management and Collaboration Appendix B.
Desired Behavior  This proposed mechanism provides a robust means of electing an RP from a subset of the domain’s PIM routers which are configured and.
Unnecessary Multicast Flooding Problem Statement
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—1-1 BGP Overview Establishing BGP Sessions.
Draft-ietf-pim-port-03 wglc. WGLC responses Thomas suggested a long list of changes, mostly editorial –I believe I addressed all Dimitri also had comments.
VCE IT Theory Slideshows by Mark Kelly study design By Mark Kelly, vceit.com, Begin.
85th IETF – Atlanta, USA J. Asghar IJ. Wijnands S.Krishnaswawy V. Arya draft-asghar-pim-explicit-rpf-vector-00
86th IETF – Orlando, USA J. Asghar IJ. Wijnands S.Krishnaswawy V. Arya draft-asghar-pim-explicit-rpf-vector-01
Jonathan Rosenberg dynamicsoft
GMPLS Signaling Extensions for G
RADEXT WG RADIUS Attribute Guidelines
CHP - 9 File Structures.
MVPN Update Continued work on both architecture draft and BGP-MVPN draft Seeing “light at end of tunnel” ☺ Progress since last time: Carrier’s carrier.
(How the routers’ tables are filled in)
Data Virtualization Tutorial: XSLT and Streaming Transformations
In-Band Authentication Extension for Protocol Independent Multicast (PIM) draft-bhatia-zhang-pim-auth-extension-00 Manav Bhatia
(draft-archana-pimwg-pim-ping-00.txt)
IP Multicast Fast Reroute follow-up on draft-dimitri-rtgwg-mfrr-framework-00 RTG Working Group IETF 75 meeting Stockholm (Sweden) July 2009.
draft-ietf-pim-source-discovery-bsr-05
draft-lts-pim-hello-mtu-01
ECE 544 Protocol Design Project 2016
Draft-venaas-bier-pfm-sd-00 PIM Flooding Mechanism and Source Discovery for BIER Stig Venaas, IJsbrand Wijnands, Mankamana.
Charles E. Perkins RFC 2002bis Charles E. Perkins
PIM Null Register packing
MAC Address Acquisition Protocol
An Engineering Approach to Computer Networking
MAC Address Acquisition Protocol
Optional Read Slides: Network Multicast
MVPN Source Discovery Interoperation
PIM DR IMPROVEMENT draft-ietf-pim-dr-improvement-05
PIM Assert Message Packing
draft-ietf-pim-ipv4-prefix-over-ipv6-nh
draft-venaas-bier-mtud-01
draft-ietf-pim-drlb-08
Presentation transcript:

Hierarchical J/P attributes draft-ietf-pim-hierarchicaljoinattr-01.txt

Introduction An hierarchical scheme with the following properties –If an attribute type and value applies to every (S,G) in the message, only include it once in the message –Also, if an attribute type and value applies to every (S,G) for a given group G, only include it once for the group G Changes since last version –Proposing a way of not inheriting selected attributes

J/P message format PIM Ver| Type | Reserved | Checksum Upstream Neighbor Address (Encoded-Unicast format) Reserved | Num groups | Holdtime Group Set 1 … Group Set n Multicast Group Address 1 (Encoded-Group format) Number of Joined Sources | Number of Pruned Sources Joined Source Address 1 (Encoded-Source format) … Joined Source Address m (Encoded-Source format) Pruned Source Address 1 (Encoded-Source format) … Pruned Source Address k (Encoded-Source format) Each message contains a single Upstream Neighbor Address and a number of group sets Each Group Set contains a Group Address followed by lists of joined sources and pruned sources We have 3 different address objects, all in an encoded format Upstream Neighbor Address Multicast Group Address Source Address

J/P Attribute Hierarchy Upstream Neighbor Address Group Address Source Address Source Address Source Address Source Address Attributes can by specified anywhere in the hierarchy. An attribute type/value applies to all the sources below If the same type is at multiple levels, the most specific applies Attributes that apply to each of the sources

An attribute for all but 1 source? Upstream Neighbor Address Group Address Source Address Source Address Source Address Source Address This attribute will apply to all sources. How to have this attribute for all but one source? 1 Attribute applies to each of the sources. How to have it for all but one source?

Do Not Inherit (DNI) attribute Proposing an attribute that lists attributes that should not be inherited The value consists of a list of 1 or more attribute types The specified attributes will be ignored if they are specified at a higher level in the hierarchy

An attribute for all but 1 source Upstream Neighbor Address Group Address Source Address Source Address Source Address Source Address 1 Attribute applies to all sources except the one with DNI blue 11 1 DNI blue Here we have DNI attribute for the one source to not inherit

An attribute for all but 1 group? Upstream Neighbor Address Group Address Source Address Source Address Source Address Source Address 1 Attribute applies to all sources except the one with DNI blue. 1 1 DNI blue Here we have DNI attribute for the one group to not inherit

Upstream Neighbor Address Group Address Source Address Source Address Source Address Source Address 1 Attribute applies to all sources except the one with DNI blue 21 1 DNI blue Here we have DNI attribute for the one source to not inherit More complex example 2

Is Do Not Inherit a good idea? Too complex? Attributes can always be specified per source instead if needed Not that hard to parse The logic for using DNI when formatting a J/P more complex

Next steps? Keep Do Not Inherit or revert to previous version? If we keep DNI, is current draft ready for WGLC? If we revert to previous version I will post revision 02 similar to 00. Would it be OK to do WGLC on the new revision?