MUSE Winter School 2006 BE M Traffic Engineering in Ethernet-based Access Networks MUSE Winter School BB Europe Geneva December 11.

Slides:



Advertisements
Similar presentations
BUDAPEST UNIVERSITY OF TECHNOLOGY AND ECONOMICS DEPARTMENT OF TELECOMMUNICATIONS AND MEDIA INFORMATICS BUDAPEST UNIVERSITY OF TECHNOLOGY AND ECONOMICS.
Advertisements

BUDAPEST UNIVERSITY OF TECHNOLOGY AND ECONOMICS Budapest University of Technology and Economics Verification of RSTP Convergence and Scalability by Measurements.
CCNA3 v3 Module 7 v3 CCNA 3 Module 7 JEOPARDY K. Martin.
Communication Networks Recitation 3 Bridges & Spanning trees.
Part 2: Preventing Loops in the Network
Connecting LANs: Section Figure 15.1 Five categories of connecting devices.
SPANNING TREE PROTOCOL (STP) VARIANTS Rapid Spanning Tree Protocol (RSTP) -The reason behind the word «rapid» Multiple Spanning Tree Protocol (MSTP)
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—3-1 Implementing Spanning Tree Spanning Tree Protocol Enhancements.
Introduction to Computer Networks 09/23 Presenter: Fatemah Panahi.
1 25\10\2010 Unit-V Connecting LANs Unit – 5 Connecting DevicesConnecting Devices Backbone NetworksBackbone Networks Virtual LANsVirtual LANs.
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
BUDAPEST UNIVERSITY OF TECHNOLOGY AND ECONOMICS DEPARTMENT OF TELECOMMUNICATIONS AND MEDIA INFORMATICS BUDAPEST UNIVERSITY OF TECHNOLOGY AND ECONOMICS.
LOGO Local Area Network (LAN) Layer 2 Switching and Virtual LANs (VLANs) Local Area Network (LAN) Layer 2 Switching and Virtual LANs (VLANs) Chapter 6.
1 Computer Networks LAN Bridges and Switches. 2 Where are we?
Layer 2 Switch  Layer 2 Switching is hardware based.  Uses the host's Media Access Control (MAC) address.  Uses Application Specific Integrated Circuits.
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: LAN Redundancy Scaling Networks.
Virtual LAN Design Switches also have enabled the creation of Virtual LANs (VLANs). VLANs provide greater opportunities to manage the flow of traffic on.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: LAN Redundancy Scaling Networks.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.1 Module 7 Spanning Tree Protocol.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 7 Spanning-Tree Protocol Cisco Networking Academy.
CCNA Guide to Cisco Networking Fundamentals Fourth Edition
Saeed Darvish Pazoki – MCSE, CCNA Abstracted From: Cisco Press – ICND 2 – Chapter 2 Spanning tree Protocol 1.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implement Spanning Tree Protocols LAN Switching and Wireless – Chapter 5 Part.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 LAN Switching and Wireless Implement Spanning Tree Protocols (STP) Chapter.
Steffen/Stettler, , 4-SpanningTree.pptx 1 Computernetze 1 (CN1) 4 Spanning Tree Protokoll 802.1D-2004 Prof. Dr. Andreas Steffen Institute for.
Budapest University of Technology and Economics Department of Telecommunications and Media Informatics Optimized QoS Protection of Ethernet Trees Tibor.
© UNIVERSITY of NEW HAMPSHIRE INTEROPERABILITY LABORATORY The Multiple Spanning Tree Protocol 802.1Q
Chapter 8: Virtual LAN (VLAN)
1 Kyung Hee University Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs.
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
Computer Networks 15-1 Chapter 15. Connecting LANs, Backbone Networks, and Virtual LANs 15.1 Connecting devices 15.2 Backbone networks 15.3 Virtual LANs.
Click to edit Master subtitle style
S7C5 – Spanning Tree Protocol And other topics. Switch Port Aggregation Bundling –Combining 2 to 8 links of FE (Fast Ethernet) or GE (Gigabit) Full duplex.
Sem1 - Module 8 Ethernet Switching. Shared media environments Shared media environment: –Occurs when multiple hosts have access to the same medium. –For.
Spanning Tree V1.2 Slide 1 of 1 Purpose:
STP LAN Redundancy Introduction Network redundancy is a key to maintaining network reliability. Multiple physical links between devices provide redundant.
Chapter 3 - VLANs. VLANs Logical grouping of devices or users Configuration done at switch via software Not standardized – proprietary software from vendor.
1 Data Link Layer Lecture 23 Imran Ahmed University of Management & Technology.
Switching Topic 6 Rapid spanning tree protocol. Agenda RSTP features – Port states – Port roles – BPDU format – Edge ports and link types – Proposals.
Switching Topic 2 VLANs.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 7 Spanning Tree Protocol.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 16 Connecting LANs, Backbone Networks, and Virtual LANs.
1 Version 3.0 Module 7 Spanning Tree Protocol. 2 Version 3.0 Redundancy Redundancy in a network is needed in case there is loss of connectivity in one.
CCNP 3: Chapter 3 Implementing Spanning Tree. Overview Basics of implementing STP Election of Root Bridge and Backup Enhancing STP RSTP MSTP EtherChannels.
Chapter 4 Version 1 Virtual LANs. Introduction By default, switches forward broadcasts, this means that all segments connected to a switch are in one.
Topic 5 Spanning tree protocol
CO5023 LAN Redundancy.
Ch. 15 Connecting LANs.
1 Chapter 3: Packet Switching (Switched LANs) Dr. Rocky K. C. Chang 23 February 2004.
1 RST _05_2001_c1 © 2001, Cisco Systems, Inc. All rights reserved. LAN Protocols Bill Dufresne SE-IV Cisco Systems CCIE, Content/Video Specialist.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implement Spanning Tree Protocols (STP) LAN Switching and Wireless – Chapter.
Chapter-5 STP. Introduction Examine a redundant design In a hierarchical design, redundancy is achieved at the distribution and core layers through additional.
Exploration 3 Chapter 5. Redundancy in Switched Networks Switches learn the MAC addresses of devices on their ports so that data can be properly forwarded.
Instructor Materials Chapter 3: STP
Spanning Tree Protocol
3. Internetworking (part 2: switched LANs)
Chapter 4 Data Link Layer Switching
VLANs: Virtual Local Area Networks
Lecture#10: LAN Redundancy
Virtual LANs.
Configuring Catalyst Switch Operations
Spanning Tree Protocol
Spanning Tree Protocol
NT2640 Unit 9 Activity 1 Handout
Chapter 16 Connecting LANs, Backbone Networks, and Virtual LANs
CCNA Routing and Switching Scaling Networks v6.0
Spanning Tree Protocol (STP)
Dr. Rocky K. C. Chang 23 February 2004
Cisco networking CNET-448
Presentation transcript:

MUSE Winter School 2006 BE M Traffic Engineering in Ethernet-based Access Networks MUSE Winter School BB Europe Geneva December 11 th, 2006

Traffic Engineering in Ethernet — 2 MUSE Winter School 2006 Budapest University of Technology and Economics Ethernet in Aggregation  Takes the advantage that Ethernet is cheap High bandwidth for low cost  Migration DSL with ATM aggregation -> DSL with Ethernet aggregation  However requires enhancements for: QoS Scalability Reliability, better resilience Traffic separation Operation, Administration & Management

Traffic Engineering in Ethernet — 3 MUSE Winter School 2006 Budapest University of Technology and Economics Overview  Bridge operation MAC learning Forwarding  Virtual LANs VLANs  Spanning Tree Protocols STP RSTP MSTP  Traffic Engineering and protection based on MSTP

Traffic Engineering in Ethernet — 4 MUSE Winter School 2006 Budapest University of Technology and Economics Ethernet Bridge Operation  Frame forwarding based on destination MAC address MAC addresses supposed to be unique  If destination not known: flooding and learn the source MAC  If destination MAC is already learned, forward only to that port  Example: A->D: broadcast D->A: port 3 – learn D’s MAC – C->D: port 1 MAC addr.Port A3 B1 C2 A C B D 1 1 bridge

Traffic Engineering in Ethernet — 5 MUSE Winter School 2006 Budapest University of Technology and Economics A VLAN = A Broadcast Domain = Logical Network (Subnet) VLAN Overview Layer 2 connectivity Logical organizational flexibility Single broadcast domain Management Basic security

Traffic Engineering in Ethernet — 6 MUSE Winter School 2006 Budapest University of Technology and Economics Routing Between VLANs Problem: Isolated Broadcast Domains Because of their nature, VLANs inhibit communication between VLANs. Communications between VLANs requires a Layer 3 services module.

Traffic Engineering in Ethernet — 7 MUSE Winter School 2006 Budapest University of Technology and Economics VLAN standard: IEEE 802.1Q  IEEE 802.1Q adds a VLAN tag to frames allows to extend VLANs over multiple bridges VID = 12 bit = 4096 VLANs possible adds also 3 priority bits (p-bits)  Tagging usually is based on port the port “tags” the packet to a predefined value the uplinks carrying multiple VLANs are trunk ports  VLAN bridge operation ingress filtering switching egress filtering

Traffic Engineering in Ethernet — 8 MUSE Winter School 2006 Budapest University of Technology and Economics QoS support in Ethernet  Priority bits in the VLAN tag p-bits: 3 bit CoS - 8 possible classes 4 classes are enough: – Realtime, Multimedia, Excellent Effort, Best Effort  The QoS model is Diffserv: Intelligence at the network edges Internal switches do priority queuing only – Based on CoS  An end-to-end resource management model to provide QoS CAC to avoid congestion, Policing to ensure QoS of admitted services Scheduling and Queuing to keep QoS guarantees

Traffic Engineering in Ethernet — 9 MUSE Winter School 2006 Budapest University of Technology and Economics Spanning Tree (802.1D, 802.1w, 802.1s)  Purpose: to maintain loop-free topologies in redundant/resilient Layer 2 infrastructures  Provides automatic path recovery services upon link or device failure  By default, 802.1D (STP) implements pessimistic & safe behavior => slow convergence, typically 30 to 50 seconds, timer- based operations  Many vendor specific enhancements available for scalability, safety and convergence speed  IEEE Standards 802.1w (RSTP), 802.1s (MSTP) include a superset of these enhancements

Traffic Engineering in Ethernet — 10 MUSE Winter School 2006 Budapest University of Technology and Economics X X Root is elected based on lowest bridge ID (priority and MAC address concatenated) F F F F F F F B B F F F F F Root Port is now logically blocking: does not send/receive traffic F F F F Loop-free Connectivity Spanning Tree Basics

Traffic Engineering in Ethernet — 11 MUSE Winter School 2006 Budapest University of Technology and Economics IEEE 802.1D STP operation  Bridges first elect a root bridge based on lowest bridge ID (priority and MAC address concatenated)  Starting from the root they build the tree each port has a cost the tree is spanned using the minimum cost paths each port not used by the tree will be blocked 15 seconds to build the tree  After spanning the tree starts the MAC address learning 15 seconds again  The bridges start forwarding

Traffic Engineering in Ethernet — 12 MUSE Winter School 2006 Budapest University of Technology and Economics Bridge Protocol Data Unit (BPDU) The BPDU used by STP is responsible for: Electing a root bridge Determining the location of loops Blocking to prevent loops Notifying the network of changes Monitoring the state of the spanning tree

Traffic Engineering in Ethernet — 13 MUSE Winter School 2006 Budapest University of Technology and Economics  New IEEE protocol (802.1w) Compatible with 802.1D  Faster Convergence & Timer independent IF only point-to-point FDX Links are used IF all edge ports are correctly identified IF no 802.1D interaction required  Includes functionality equivalent to vendor’s proprietary solutions  What is new New Port Role Modified BPDU BPDU handling Rapid port state transition New topology change mechanism 802.1D Compatibility 802.1w - Rapid STP Basics

Traffic Engineering in Ethernet — 14 MUSE Winter School 2006 Budapest University of Technology and Economics Alternate Port (Disc): Port blocked by BPDUs from a different bridge – redundant path to the Root Backup Port (Disc): Port blocked by BPDUs sent from the same bridge – redundant path to a segment A B Root AB RR DD D AB D Designated Port (Fwd): Port sending the best BPDU on a segment R Root Port (Fwd): Port receiving the best BPDU for the bridge – shortest path to the Root in terms of path cost RSTP Port Roles

Traffic Engineering in Ethernet — 15 MUSE Winter School 2006 Budapest University of Technology and Economics Proposal Agreement Rapid Transition to Forwarding  A has a better id than B  A sends a proposal to B to become designated  B compares the received priority and replies with an agreement  B’s port becomes Root port -> forwarding  A’s port becomes Designated -> forwarding Bridge A Bridge ID=1 Bridge B Bridge_ID=2  When port comes up, bridge sends BPDU with proposal flag set to become designated for that segment  Response is BPDU with agreement flag set if remote bridge selects the port on which it received the proposal as its root port  As soon as agreement is received, port moves to forwarding

Traffic Engineering in Ethernet — 16 MUSE Winter School 2006 Budapest University of Technology and Economics Proposal Block Proposal Agreement Forward Edge port Proposal Agreement Forward IEEE 802.1w sequence of events  Receive a proposal Block all other non-edge ports  Send an agreement back Put the new root port to forwarding  Send out proposals on other ports  Receive agreement from others Put ports into forwarding

Traffic Engineering in Ethernet — 17 MUSE Winter School 2006 Budapest University of Technology and Economics Evolution to multiple trees & regions - MSTP  Why regions? Different administrative control over different parts of the L2 network Not all switches in the network might run/support MST - different kinds of STP divide network into STP regions All benefits of MST are available INSIDE the region, outside it is single instance (topology) for all vlans  MST region is a linked group of MST switches with same MST configuration Inside region: many instances – IST – Internal Spanning Tree (instance 0), always exists on ALL ports – MSTI - Multiple Spanning Tree Instance Outside of region: one instance

Traffic Engineering in Ethernet — 18 MUSE Winter School 2006 Budapest University of Technology and Economics Inside ViewWorld View Root D MST Region Root D M B C CST MST IST CST 802.1Q Common SPT => Single Instance only IST 802.1s Internal SPT => receives and sends BPDUs to the CST represents the MST to the Outside World as CST Bridge MST 802.1s Multiple SPT => represent several VLANs mapped to a single MST Instance 802.1s: CST, IST, MST - Lots of Trees...

Traffic Engineering in Ethernet — 19 MUSE Winter School 2006 Budapest University of Technology and Economics MST BPDU Protocol information for the MSTis Protocol information for the IST CST MST Region MST instances MSTIs are STP instances existing only inside the region MSTIs do not interact directly with the outside of the region MST only send 1 BPDU for all the instances with one M-record per instance Only one instance has timer related parameters (the IST instance) MST BPDUs are sent on every port BPDUs are sent both ways on a link as opposed to 802.1D where BPDUs are only sent by designated bridge

Traffic Engineering in Ethernet — 20 MUSE Winter School 2006 Budapest University of Technology and Economics MSTP advantages  Network topology with 2 Edges  The ring provides redundancy  Spanning Tree Protocol  MSTP Protocol 2 trees

Traffic Engineering in Ethernet — 21 MUSE Winter School 2006 Budapest University of Technology and Economics With MSTP we can do  Traffic Engineering Load balancing paths can be “engineered” traffic mapping to different engineered paths  Protection Multiple disjoint trees VLAN 1 assigned to primary tree, VLAN 2 to backup tree On failure, traffic is switched to VLAN 2, using the backup tree (requires IP level switching/failover logic)  Of course, for a simple tree physical topology it is useless

Traffic Engineering in Ethernet — 22 MUSE Winter School 2006 Budapest University of Technology and Economics Protection switching  Using MSTP 2 MSTI trees, two paths: red and green VLAN 1 -> MST 1, VLAN 2 -> MST 2 A and B uses VLAN 1, in case of failure switch to VLAN 2 LAN VLAN 1 MST 1 VLAN 2 MST 2 (backup) A B  Alternatives: 802.3ad Link Aggregation uses redundant links for load balancing and protection

Traffic Engineering in Ethernet — 23 MUSE Winter School 2006 Budapest University of Technology and Economics Traffic Engineering  Usually done at Layer 3 We need to do at Layer 2!  Traffic Engineering using MSTP: Set up multiple trees Multiple trees use different cost set – results different trees Different VLANs assigned to different trees -> different paths for VLANs load sharing by VLAN assignment  Enables: multiple paths between two nodes shorter paths between nodes

Traffic Engineering in Ethernet — 24 MUSE Winter School 2006 Budapest University of Technology and Economics Traffic Engineering in aggregation CPN NSP/ISP ASP NAP EN 2 Ethernet aggreg. NW AN CPE EN 1 CPN Services offered through EN 1 MSTP instancesService VLANs Services offered through EN 2 Service VLANs of red services assigned to MST instance 1 Service VLANs of green services assigned to MST instance 2

Traffic Engineering in Ethernet — 25 MUSE Winter School 2006 Budapest University of Technology and Economics Root cost =1 cost =100cost =1 cost =100 Root cost =100 cost =1 cost =100 cost =1 Root MSTP optimization  MSTP requires configuration  Trees are set up by setting different port costs  Port cost assignment: 1 for forwarding, #of bridges+1 for blocking

Traffic Engineering in Ethernet — 26 MUSE Winter School 2006 Budapest University of Technology and Economics An example for Traffic Engineering  We target OPTIMAL UTILIZATION of the network utilize alternate paths take into consideration traffic parameters too keep QoS guarantees  Multiple trees rooted in Edge Nodes  Optimization offline  Set up port costs for all bridges to get the desired trees

Traffic Engineering in Ethernet — 27 MUSE Winter School 2006 Budapest University of Technology and Economics Optimization  Optimize the spanning trees: the goal is to minimize the used network resources to maximize network throughput  Provide 1:1 protection To protect all traffic is expensive - protect only a part of the traffic: the prioritized traffic Best Effort can use the protection paths  Optimization algorithms developed within MUSE Integer Linear Programming formulation is given – The solution is optimal spanning trees – Slow for practical sized networks Heuristic solution – near optimal, but much faster

Traffic Engineering in Ethernet — 28 MUSE Winter School 2006 Budapest University of Technology and Economics Achievable throughput

Traffic Engineering in Ethernet — 29 MUSE Winter School 2006 Budapest University of Technology and Economics Capacities allocated

Traffic Engineering in Ethernet — 30 MUSE Winter School 2006 Budapest University of Technology and Economics Conclusions  Ethernet in the MAN–„carrier grade” requirements  STP protocol has disadvantages: single tree inhibits load sharing MSTP provides means for TE Enhances scalability  We present an optimization TE Framework for QoS and protection  We show that: With optimization we can use redundant links – Throughput doubles compared to STP Optimized 1:1 protection – The same throughput as STP but all protected Protecting QoS traffic only is reasonable tradeoff

Traffic Engineering in Ethernet — 31 MUSE Winter School 2006 Budapest University of Technology and Economics Thank you for your attention! Questions?

Traffic Engineering in Ethernet — 32 MUSE Winter School 2006 Budapest University of Technology and Economics Publications on Ethernet TE Optimization 11th European Conference on Networks & Optical Communications (MSAN2005) “Optimizing QoS Aware Ethernet Spanning Trees”, First International Conference on Multimedia Services Access Networks (DRCN2005) “Optimized QoS Protection of Ethernet Trees”, Conference on Next Generation Internet Design and Engineering (EuroNGI2006) “On the Optimal Configuration of Metro Ethernet for Triple Play” IEEE Symp. on Computers and Communications (ISCC2006) “Scalable Tree Optimization for QoS Ethernet” World Telecommunications Congress (WTC2006) “Traffic-driven Optimization of Routing for Metropolitan Ethernet Networks”