ICCP extension for the MSP application Presenter: Yuxia Ma Author: Hongjie Hao draft-hao-pwe3-iccp-extension-for-msp-00.

Slides:



Advertisements
Similar presentations
Requirements for DRNI on layer 3 gateway devices
Advertisements

Geneva, 27 May 2010 Types and Characteristics of Packet Transport Network (PTN) Equipment (Draft Recommendation - G.ptneq) Jia He and Hilmar Hofmann G.ptneq.
Pseudowire freeze mechanism draft-jin-pwe3-pw-freeze-00 Lizhong Jin Bhumip. Khasnabish.
Chapter 1: Introduction to Scaling Networks
INTRODUCTION WIRELESS TECHNOLOGY BECOMING HOTTER WIRELESS TECHNOLOGY BECOMING HOTTER TRANSITION TOWARDS MOBILITY OVER PAST 20 YEARS TRANSITION TOWARDS.
By Ram Gopal, Alex Audu, Chaoping Wu, Hormuzd Khosravi Forwarding and Control Element Protocol (FACT)
Ver 1,12/09/2012Kode :CIJ 340,Jaringan Komputer Lanjut FASILKOM Routing Protocols and Concepts – Chapter 2 Static Routing CCNA.
CCNA2 Module 4. Discovering and Connecting to Neighbors Enable and disable CDP Use the show cdp neighbors command Determine which neighboring devices.
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
MPLS-TP PWE3 dual-homed protection (MPDP)
Pseudowire Endpoint Fast Failure Protection draft-shen-pwe3-endpoint-fast-protection-00 Rahul Aggarwal Yimin Shen
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 2 Network Models.
Dual-Homing Protection for MPLS and MPLS-TP Pseudowires
1 Computer Networks Switching Technologies. 2 Switched Network Long distance transmission typically done over a network of switched nodes End devices.
IETF80, Prague1 LDP Extensions for Optimized MAC Address Withdrawal in VPLS model 3 supporting Qualified learning draft-chen-l2vpn-vpls-mac-opt-qualified-01.
Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.
Presentation on Osi & TCP/IP MODEL
GVPNs: Generalized VPNs using BGP and GMPLS Toolkit draft-ouldbrahim-ppvpn-gvpn-bgpgmpls-06.txt Hamid Ould-Brahim Yakov Rekhter
Common Devices Used In Computer Networks
TCP/SYN Attack – use ACL to allow traffic from TCP connections that were established from the internal network and block packets from an external network.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 4 Introduction to Network.
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 2 Network Models.
Requirements for the Conversion Between Permanent Connections and Switched Connections in a Generalized Multiprotocol Label Switching (GMPLS) Network Internet.
1 IETF 78: NETEXT Working Group IPSec/IKEv2 Access Link Support in Proxy Mobile IPv6 IPSec/IKEv2-based Access Link Support in Proxy Mobile IPv6 Sri Gundavelli.
12/8/2015 draft-blb-mpls-tp-framework-01.txt A framework for MPLS in Transport networks draft-blb-mpls-tp-framework-01.txt Stewart Bryant (Cisco), Matthew.
Draft-ietf-pim-source- discovery-bsr-01 IJsbrand Wijnands, Stig Venaas, Michael Brig,
BZUPAGES.COM 2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
THE OSI MODEL ISO is the organization.OSI is the model. ISO  International Standards Organization OSI  Open Systems Interconnection.
By Alex Audu, Jamal H. Salim, Avri Doria Forces-IPTML Design.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Mobile IPv6 with IKEv2 and revised IPsec architecture IETF 61
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Softwire Security Requirement Update draft-ietf-softwire-security-requirements-02.txt IETF Meeting, Prague March 19, 2007 Shu Yamamoto Carl Williams Florent.
Applicability of Existing Solutions to the Problem Space draft-takeda-l1vpn-applicability-03.txt.
Routing Information Protocol
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 5 – VoIP and the OSI Model.
1 OSPF Based L1VPN Auto-Discovery ( draft-bryskin-l1vpn-ospf-auto-discovery-00.txt ) Igor Bryskin (Movaz Networks) : Lou Berger (LabN.
RIP Routing Protocol. 2 Routing Recall: There are two parts to routing IP packets: 1. How to pass a packet from an input interface to the output interface.
I E T F 6 3, 3 rd. A U G U S T draft-frost-pwe3-timing-pw-reqs-00 IETF 63 PWE3 Working Group Paris, August 2005.
NVO3 Overlay P2MP Ping draft-xia-nvo3-overlay-p2mp-ping-00 Liang Xia, Weiguo Hao, Greg Mirsky July 2014 Toronto.
82 nd Taipei Protection Mechanisms for LDP P2MP/MP2MP LSP draft-zhao-mpls-mldp-protections-00.txt Quintin Zhao, Emily Chen, Huawei.
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
OSPF Link Overload draft-hegde-ospf-link-overload Shraddha Hegde Hannes Gredler Pushpasis Sarkar.
Inter-Chassis Communication Protocol for L2VPN PE Redundancy draft-ietf-pwe3-iccp-01.txt Luca Martini, Chris Metz (Cisco) SamerSalam.
Service Flows Distribution and Handoff Technique based on MIPv6 draft-liu-dmm-flows-distribution-and-handoff-00
Instructor Materials Chapter 2: Scaling VLANs
Instructor & Todd Lammle
Application – Transport – Network
Chapter 2 Network Models.
Instructor Materials Chapter 9: NAT for IPv4
Fast Handover for Multicast in Proxy Mobile IPv6
Routing and Switching Essentials v6.0
Multi-chassis PON Protection in MPLS
Introduction to Networking
IOS Network Model 2nd semester
Chapter 2: Scaling VLANs
Lec 5 Layers Computer Networks Al-Mustansiryah University
2018 Huawei H Real Questions Killtest
Chapter 3: Open Systems Interconnection (OSI) Model
Routing Protocols and Concepts – Chapter 2
Instructor Materials Chapter 9: NAT for IPv4
Chapter 4 Introduction to Network Layer
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
ICCP extension for the MSP application
CCNA 2 v3.1 Module 11 Access Control Lists (ACLs)
Home Hub and Mobile Hub.
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
PW Control Word Stitching
Presentation transcript:

ICCP extension for the MSP application Presenter: Yuxia Ma Author: Hongjie Hao draft-hao-pwe3-iccp-extension-for-msp-00

Background Sometimes the SDH and Packet Transport equipments are co-existed in the mobile backhaul network, to achieve a smooth migration from SDH to Packet Transport network. The figure below depicts the scenario. The Multiplex section protection protocol(MSP) is used to protect the side of UNI. SDH PTN1 BS PTN2 PTN3 Service Router MSP SDH

Problem statement The network between PE and CE is SDH network. The PEs and CE run the linear MSP. The PEs need a mechanism to synchronize the state and configuration data between the PEs. ICCP is the exact tool to do the synchronization. PE2 PE1 CE Pseudowire ICCP

ICCP allows synchronization of state and configuration data between a set of two or more PEs forming a RG. It provides reliable message transport and in-order delivery between nodes in a RG with secure authentication mechanisms built into the protocol. ICCP draft specified the pseudowire redundancy application TLVs and multi-chassis LACP application TLVs. These TLVs are not included the message of MSP application. This draft extends the ICCP TLVs to support the MSP application. Problem statement (cont)

The extend TLVs (1) The draft extends the ICCP TLVs. Multiplex Section Protection (MSP) Application TLVs are : MSP Connect TLV Establish the MSP application connection MSP Disconnect TLV Terminate the MSP application connection MSP Group Config TLV Synchronize the configuration of local protect group, such as group mode, type, WTR time etc. MSP Port Config TLV Synchronize the configuration of local port, such as role, port name etc.

The extend TLVs (2) MSP Link State TLV Synchronize the link state of local node, such as SF, SD MSP Switch Command TLV Synchronize the local node’s switch command, such as manual switch, forced switch, clear etc. MSP Group State TLV Synchronize the state of protect group, such as WTR, no request, manual switch etc. MSP Synchronization Request TLV Request to retransmit the configuration and state MSP Synchronization Data TLV Response the synchronization request TLV

Thanks for the comment from Stewart: “The scenario looks similar to Figure 1 in the ICCP draft. Please can you clarify the problem in the ICCP draft that you are addressing.” Answer Figure 1 in the ICCP draft described the generic multi-chassis redundancy model. When the network is SDH network, it is just the situation we talked. But ICCP draft does not specify the MSP application TLVs. This draft extends the TLVs to achieve the MSP application. Comments from the list

Looking forward to seeing more comments! Next step