SFC OAM Requirements and Framework

Slides:



Advertisements
Similar presentations
Fraunhofer FOKUS 2007 VoIP Defender The Future of VoIP Protection Fraunhofer FOKUS Institute, Germany.
Advertisements

MPLS-TP BFD for CC-CV proactive and RDI functionalities
1 Introducing the Specifications of the Metro Ethernet Forum.
Lecture 2 - Networking Devices
Surendra Kumar Jim Guichard Paul Quinn Cisco Systems, Inc.
BIER Ping IETF 92 draft-kumarzheng-bier-ping-00
RIP V1 W.lilakiatsakun.
Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
H. 323 Chapter 4.
Network Service Header (NSH) draft-quinn-sfc-nsh IETF 90
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
20 03 TASTE OF RESEARCH SUMMER SCHOLARSHIPS Author: Wei Zhang Supervisor: Tim Moors Efficient Voice Over Wireless Network Abstract The objective of this.
Report of Interconnectivity Testing of Service Function Chaining by Six Companies NTT Alaxala Networks Cisco Systems Hitachi Alcatel-Lucent Japan et al.
Internetworking Fundamentals (Lecture #2) Andres Rengifo Copyright 2008.
COMPUTER NETWORKS.
Draft-ietf-sfc-architecture Prepared by Carlos Pignataro and Joel Halpern.
Gursharan Singh Tatla Transport Layer 16-May
Building a Simple Network
1 Introducing the Specifications of the Metro Ethernet Forum.
Data Communications and Networks Chapter 2 - Network Technologies - Circuit and Packet Switching Data Communications and Network.
1 © 2002, Cisco Systems, Inc. All rights reserved. draft-nadeau-pwe3-vccv-00.txt IETF #56 San Francisco, CA USA Thomas D. Nadeau Monique.
Petrozavodsk State University, Alex Moschevikin, 2003NET TECHNOLOGIES Internet Control Message Protocol ICMP author -- J. Postel, September The purpose.
NetSim ZigBee Simulation Code Walkthrough in 10 steps
LISP Mapping Request Format And related topics Joel M. Halpern
Multiple Links Failover Mechanism for RPR Interconnected Rings IEEE WG Orlando, Florida USA March 11~16, 2007.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 7 Spanning-Tree Protocol Cisco Networking Academy.
Cisco S2 C4 Router Components. Configure a Router You can configure a router from –from the console terminal (a computer connected to the router –through.
Standard for a Convergent Digital Home Network for Heterogeneous Technologies Zhimeng Du 12/5/2013.
Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks” IEEE Communications.
E Multimedia Communications Anandi Giridharan Electrical Communication Engineering, Indian Institute of Science, Bangalore – , India Multimedia.
Univ. of TehranAdv. topics in Computer Network1 Advanced topics in Computer Networks University of Tehran Dept. of EE and Computer Engineering By: Dr.
49th IETF - San Diego - 1 Mobile Networks Support in IPv6 - Draft Update draft-ernst-mobileip-v6-01.txt - Thierry Ernst - MOTOROLA Labs Ludovic Bellier.
Fast Handoff for Seamless wireless mesh Networks Yair Amir, Clauiu Danilov, Michael Hilsdale Mobisys’ Jeon, Seung-woo.
COMON NETWORK STRUCTURES BY :Karla Barragán. STAR topology Star networks are one of the most common computer network topologies. In its simplest form,
Multimedia Wireless Networks: Technologies, Standards, and QoS Chapter 3. QoS Mechanisms TTM8100 Slides edited by Steinar Andresen.
OSI Model. Switches point to point bridges two types store & forward = entire frame received the decision made, and can handle frames with errors cut-through.
1 draft-sajassi-mohan-l2vpn-vpls-fm-00.txt draft-mohan-sajassi-l2vpn-vpls-pm-00.txt Dinesh Mohan (Nortel) IETF-59, Seoul March.
Packet switching network Data is divided into packets. Transfer of information as payload in data packets Packets undergo random delays & possible loss.
Cisco Network Devices Chapter 6 powered by DJ 1. Chapter Objectives At the end of this Chapter you will be able to:  Identify and explain various Cisco.
Anonymity - Background R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide.
IEEE j Relay-Based Wireless Access Networks VASKEN GENC, SEAN MURPHY, YANG YU, AND JOHN MURPHY, UNIVERSITY COLLEGE DUBLIN SCHOOL OF COMPUTER SCIENCE.
Abstraction and Control of Transport Networks
Protocol Layering Chapter 11.
SYSTEM ADMINISTRATION Chapter 2 The OSI Model. The OSI Model was designed by the International Standards Organization (ISO) as a structural framework.
82 nd IETF Taipei1 SPB over MPLS draft-mack-crane-l2vpn-spb-o-mpls-00.txt Ben Mack-Crane Lucy Yong
NVO3 OAM Requirements draft-ashwood-nvo3-oam-requirements-01 P. Ashwood-Smith, L. Xia, R. Iyengar, T. Tsou, A. Sajassi, M. Boucadair, C. Jacquenet, M.
Data Communication Network Models
Multicast Issues in Networks Using NVO3 Anoop Ghanwani, Dell Linda Dunbar, Huawei Vinay Bannai, Paypal Ram Krishnan, Brocade draft-ghanwani-nvo3-mcast-issues-011.
Why Fabric? 1 Complicated technology/vendor/device specific provisioning for networks, especially heterogeneous network DC Network – STP, TRILL, SPB, VXLAN,
Securing Access to Data Using IPsec Josh Jones Cosc352.
J. Halpern (Ericsson), C. Pignataro (Cisco)
SFC Trace Issue Analysis and Solutions IETF 94 Yokohama draft-yang-sfc-trace-issue-analysis-00 Xu. Yang L. Zhu G. Karagiannis.
Developing an Implementation Framework for the Future Internet using the Y-Comm Architecture, SDN and NFV Glenford Mapp Associate Professor Middlesex University,
Ready-to-Deploy Service Function Chaining for Mobile Networks
Networking Using the OSI Model.
ODL SFC, Implementing IETF SFC November 14, 2016
Taekhee Kim Hyun Yu, Chiwook Jeong, Youngtae Han, Eunkyoung Paik
Anoop Ghanwani Linda Dunbar Mike McBride Vinay Bannai Ramki Krishnan
Overlay OAM Design Team Report
Introduction to Networking
IOS Network Model 2nd semester
I2RS Large Flow Use Case draft-krishnan-i2rs-large-flow-use-case-00
Multi-layer OAM for SFC Networks draft-wang-sfc-multi-layer-oam-09
Controlling Service Function Access to NSH
SFC Path Consistency OAM
IETF 100, November 2017 Singapore
Comparing draft-ietf-mpls-sfc and draft-malis-mpls-sfc-encapsulation
How OAM Identified in Overlay Protocols draft-mirsky-rtgwg-oam-identify Greg Mirsky IETF-104 March 2019, Prague.
Geneve applicability for service function chaining draft-boutros-nvo3-geneve-applicability-for-sfc-02 Sami Boutros Dharma Rajan Philip Kippen Pierluigi.
Presentation transcript:

SFC OAM Requirements and Framework draft-krishnan-sfc-oam-req-framework-00 IETF 90 Ram (Ramki) Krishnan, Brocade Communications Anoop Ghanwani, Dell Pedro A. Aranda Gutierrez & Diego Lopez, Telefonica I+D Joel Halpern & Sriganesh Kini, Ericsson Andy Reid, BT 7/23/2014

Layered OAM Architecture SFC OAM does not attempt to monitor actual SFs SFC OAM does not replace or obviate the need for transport-level OAM functions such as NVO3 OAM, IEEE 802.1ag, MPLS OAM, or whatever else may be applicable depending on the network technology that the SFC is implemented on 7/23/2014

SFC OAM Requirements Topologies SFF Connectivity Check SFP Trace Entire SFP or portion of an SFP Point-to-point and multipoint SFC OAM for SFFs that send data packets to more than one output SFF Connectivity Check Test the liveness of a given SFF along a given SFP It should be possible to allow such SFC OAM messages to be sent along the same path that a given data packet would follow SFP Trace Provide the list of SFFs that comprise the SFC 7/23/2014

SFC OAM Requirements (2) Performance Measure SFP parameters such as the loss, delay, and delay variation Leakage of OAM Messages An SFF should not forward OAM messages to a device that would discard such messages as a result of not knowing how to process them, e.g. an SF or an end station 7/23/2014

SFC OAM Requirements (3) SF Types Transparent SFs These SFs typically do not make any modifications to the packet It is straightforward for the SFF to process OAM messages without any knowledge of the SF(s) SFs that modify the packet Modify one or more of MAC, Overlay, IP, transport headers (e.g. NAT) The application session itself may be terminated and a new session initiated, e.g. a load balancer that offers HTTPS termination 7/23/2014

More on SFs that Modify the Packet There are known cases where SFs modify data packets or metadata and trigger reclassification (either implicitly or explicitly) SFC OAM messages are not expected to be processed by SFs Thus any SF-driven reclassification would introduce complexities for SFC OAM 7/23/2014

Differences with Respect to Other SFC OAM Drafts SFC OAM behavior in cases where SFs modify the packet Various topologies such as point-to-point or multipoint 7/23/2014

Next Steps Discuss with authors of <draft-aldrin-sfc-oam-framework> Merge the drafts? 7/23/2014

Thank You 7/23/2014