BFD Proxy Connections over Monitored Links Brian Snyder monitored-links-00.

Slides:



Advertisements
Similar presentations
Chapter 1: Introduction to Scaling Networks
Advertisements

Wide Area Wi-Fi Sam Bhoot. Wide Area Wi-Fi  Definition: Wi-Fi (Wireless Fidelity) n. – popular term for high frequency wireless local area networks operating.
Dynamic Routing Overview 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Radhika Niranjan Mysore, Andreas Pamboris, Nathan Farrington, Nelson Huang, Pardis Miri, Sivasankar Radhakrishnan, Vikram Subramanya, and Amin Vahdat Department.
Dynamic Routing Scalable Infrastructure Workshop, AfNOG2008.
Copyright 2002 Year 2 - Chapter 5/Cisco 3 - Module 5 Routing Protocols: IGRP By Carl Marandola.
1 In VINI Veritas: Realistic and Controlled Network Experimentation Jennifer Rexford with Andy Bavier, Nick Feamster, Mark Huang, and Larry Peterson
Routing and Routing Protocols
Tesseract A 4D Network Control Plane
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 10 Routing Fundamentals and Subnets.
Institute of Technology Sligo - Dept of Computing Chapter 11 Layer 3 Protocols Paul Flynn.
ROUTING PROTOCOLS Rizwan Rehman. Static routing  each router manually configured with a list of destinations and the next hop to reach those destinations.
Lecture Week 3 Introduction to Dynamic Routing Protocol Routing Protocols and Concepts.
IST 228\Ch5\IP Routing1. 2  Review of Chapter 4 Start the router simulator. You will see the prompt "Router>". This is the user mode prompt. Change the.
Spanning Tree and Multicast. The Story So Far Switched ethernet is good – Besides switching needed to join even multiple classical ethernet networks Routing.
Routing ROUTING. Router A router is a device that determines the next network point to which a packet should be forwarded toward its destination Allow.
Microsoft Virtual Academy Module 4 Creating and Configuring Virtual Machine Networks.
1 Energy Efficient Communication in Wireless Sensor Networks Yingyue Xu 8/14/2015.
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
Introduction to IT and Communications Technology Justin Champion C208 – 3292 Ethernet Switching CE
ICMP (Internet Control Message Protocol) Computer Networks By: Saeedeh Zahmatkesh spring.
InterVLAN Routing Design and Implementation. What Routers Do Intelligent, dynamic routing protocols for packet transport Packet filtering capabilities.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Routing with a Distance Vector Protocol in an Enterprise Network Introducing.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking BGP, Flooding, Multicast routing.
Copyright 2003 CCNA 1 Chapter 8 Routing Fundamentals and Subnets By Joe Parisien.
Example STP runs on bridges and switches that are 802.1D-compliant. There are different flavors of STP, but 802.1D is the most popular and widely implemented.
Chapter 8: Virtual LAN (VLAN)
Routing ROUTING Presented by Aditya Kumar Gupta Lecturer, Department of Computer Application SMS Varanasi.
Switching breaks up large collision domains into smaller ones Collision domain is a network segment with two or more devices sharing the same Introduction.
© 2002, Cisco Systems, Inc. All rights reserved..
© 2002, Cisco Systems, Inc. All rights reserved. 1 Determining IP Routes.
© Synergon Informatika Rt., 1999 Chapter 12 Connecting Enterprises to an Internet Service Provider.
Network Security Lecture 20 Presented by: Dr. Munam Ali Shah.
ﺑﺴﻢﺍﷲﺍﻠﺭﺣﻣﻥﺍﻠﺭﺣﻳﻡ. Group Members Nadia Malik01 Malik Fawad03.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
An OLSR implementation, experience, and future design issues.
CCNA 2 Week 9 Router Troubleshooting. Copyright © 2005 University of Bolton Topics Routing Table Overview Network Testing Troubleshooting Router Issues.
AD-HOC NETWORK SUBMITTED BY:- MIHIR GARG A B.TECH(E&T)/SEC-A.
© 1999, Cisco Systems, Inc. 1-1 Chapter 2 Overview of a Campus Network © 1999, Cisco Systems, Inc.
COP 5611 Operating Systems Spring 2010 Dan C. Marinescu Office: HEC 439 B Office hours: M-Wd 2:00-3:00 PM.
Using BGP between PE and CE in EVPN draft-li-l2vpn-evpn-pe-ce-01 Zhenbin Li, Junlin Zhuang, Shunwan Zhuang (Huawei Technologies) IETF 90, Toronto, Canada.
© 2015 Mohamed Samir YouTube channel All rights reserved. Samir Agenda Instructor introduction 1. Introduction toEldarin 2.
CCNA 2 Week 6 Routing Protocols. Copyright © 2005 University of Bolton Topics Static Routing Dynamic Routing Routing Protocols Overview.
Routers Operate in a Mesh –Many possible alternative routes between two stations Only One of Many Possible Alternative Routes Packet.
CCNA 1 v3.0 Module 10 Routing Fundamentals and Subnets.
Routing and Routing Protocols
MULTI-PROTOCOL LABEL SWITCHING Brandon Wagner. Lecture Outline  Precursor to MPLS  MPLS Definitions  The Forwarding Process  MPLS VPN  MPLS Traffic.
1 12-Jan-16 OSI network layer CCNA Exploration Semester 1 Chapter 5.
THE IMPACT OF OSPF ROUTING ON MILITARY MANETS BY ROCCO LUPOI UNDER THE GUIDANCE OF DR. GRANT WIGLEY THESIS - BACHELOR OF COMPUTER SCIENCE (HONOURS) - LHIS.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—6-1 Scaling Service Provider Networks Scaling IGP and BGP in Service Provider Networks.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Networks, Part 2 March 7, Networks End to End Layer  Build upon unreliable Network Layer  As needed, compensate for latency, ordering, data.
VS (Virtual Subnet) draft-xu-virtual-subnet-03 Xiaohu Xu IETF 79, Beijing.
Prof. Alfred J Bird, Ph.D., NBCT Office – Science 3rd floor – S Office Hours – Monday and Thursday.
Cisco Study Guide
Cisco 3 - Switch Perrine. J Page 17/3/2016 Chapter 3 Which of the following are found in the EIGRP neighbor table? (Choose two.) 1.routes installed by.
Prof. Alfred J Bird, Ph.D., NBCT Office – McCormick 3rd floor 607 Office Hours – Monday 3:00 to 4:00 and.
Data Communications Chapter 1 – Data Communications, Data Networks, and the Internet.

Constraints on Automated Key Management for Routing Protocols
InterVLAN Routing 1. InterVLAN Routing 2. Multilayer Switching.
A Cluster-based Routing Protocol for Mobile Ad hoc Networks
Virtual Local Area Networks or VLANs
Connecting Network Components
Mobicom ‘99 Per Johansson, Tony Larsson, Nicklas Hedman
Virtual LANs.
Software Defined Networking (SDN)
IS-IS VPLS for Data Center Network draft-xu-l2vpn-vpls-isis-02
Presentation transcript:

BFD Proxy Connections over Monitored Links Brian Snyder monitored-links-00 IETF90 Toronto July 20-25, 2014

Problem Offering a layer 2 solution to the Satellite market exposed new challenges. L3 routing KA timer settings would result in tradeoff between convergence time versus bandwidth overhead. Satellite bandwidth is very expensive, overhead needs to be minimized. (There could be thousands of modems in one network). Customers are used to very quick convergence as we were previously directly attached L3 devices.

Possible Solutions 1 DLEP – Designed for MESH environments – Multicast complications – Not ubiquitous – Not a ratified standard – Can take time for vendors to implement Limited L3 application support (ex: no BGP) Scalability (<100 connections) VLAN Trunking

Possible Solutions 2 BFD – Not as informative as DLEP (no link state). – Proxy design would break security extensions – Very “chatty”. Even more so then L3 hello timers.(*) (*) No “deal breakers”… because…..

Overview The radio link state is monitored for station keeping purposes – “Chattiness” could be minimized by spoofing BFD messaging in the radio devices. L3 KA timers can be pushed as high as possible. (Ideally they could be turned off). Satellite outroutes are a broadcast channel, so IGP routing is a natural choice. Asynchronous timer routing protocols are ideal as outroute and inroute have very different characteristics. – Inroute design decisions must scale to the thousands. – Therefore, one could rely on outroute HELLO packets to drive convergence and tune down inroute as low as possible. Hence, EIGRP and IS-IS are ideal.

Proxy Design Goals The proxy can ‘sniff’ the traffic to auto-learn about BFD sessions. (0 config) “Eat” all the KA BFD packets from external devices. This keeps all the BFD overhead off the monitored (and expensive) link. Reply to all the KA packets to keep sessions alive. (If DUM is up) Inject BFD control packets (state change events) to connected network equipment in order to communicate DUM status events.

Proxy Details Proxy must keep an OAM object per reachable neighbor. Demux by destination MAC. Upon intercepting further BFD packets and locating OAM object (Plus internal checks) – If DUM is down, drop. – If state is : ADMIN_DOWN: Forward on monitored link DOWN: Reply with constructed BFD Packet (Clear your discriminator field) INIT: Reply with constructed BFD Packet (Set state UP) UP: Reply with constructed BFD Packet

Constructed Reply Packets Swap source and destination MAC addresses Swap source and destination IP addresses Swap discriminator fields Set UDP checksum to 0 (optimization)

Integration Improvements BFD Timers: Allowing for connected equipment to configure a very high BFD interval value. This use case puts forth a useful situation where sub-second failure is not needed but where BFD is still very useful. Relaxing timer configuration strictness would help scale. BFD Demand Mode implementation: Alternative to above, this would allow all the KA processing to disappear -> event driven is more scalable. BFD Protocol: Adding the notion of a proxier could assist with enabling security support in this use case.

Example Flow

Questions??