Multiple Links Failover Mechanism for RPR Interconnected Rings IEEE802.17 WG Orlando, Florida USA March 11~16, 2007.

Slides:



Advertisements
Similar presentations
EVC structure for a Protected E-Line service
Advertisements

Igor Umansky Huub van Helvoort
Network Protection and Restoration Session 5 - Optical/IP Network OAM & Protection and Restoration Presented by: Malcolm Betts Date:
Satoshi NARIKAWA NTT (G.8032 Acting Co-editor)
BUDAPEST UNIVERSITY OF TECHNOLOGY AND ECONOMICS Budapest University of Technology and Economics Verification of RSTP Convergence and Scalability by Measurements.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-1 Extending Switched Networks with Virtual LANs Introducing VLAN Operations.
Topic 7 Local Area Networks (LAN)
Ethernet Automatic Protection Switching (EAPS)
Spanning Tree Protocol
Switching & Operations. Address learning Forward/filter decision Loop avoidance Three Switch Functions.
Nirmala Shenoy, Daryl Johnson, Bill Stackpole, Bruce Hartpence Rochester Institute of Technology 1.
Chapter 9 Local Area Network Technology
SPANNING TREE PROTOCOL (STP) VARIANTS Rapid Spanning Tree Protocol (RSTP) -The reason behind the word «rapid» Multiple Spanning Tree Protocol (MSTP)
Bridging. Bridge Functions To extend size of LANs either geographically or in terms number of users. − Protocols that include collisions can be performed.
1 CCNA 3 v3.1 Module 7. 2 CCNA 3 Module 7 Spanning Tree Protocol (STP)
1 Interconnecting LAN segments Repeaters Hubs Bridges Switches.
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—3-1 Implementing Spanning Tree Describing STP Stability Mechanisms.
Implementing a Highly Available Network
Sept 14, 2004CS573: Network Protocols and Standards1 Spanning Tree Algorithm Network Protocols and Standards Autumn
© 2002, Cisco Systems, Inc. All rights reserved..
1 K. Salah Module 4.3: Repeaters, Bridges, & Switches Repeater Hub NIC Bridges Switches VLANs GbE.
LOGO Local Area Network (LAN) Layer 2 Switching and Virtual LANs (VLANs) Local Area Network (LAN) Layer 2 Switching and Virtual LANs (VLANs) Chapter 6.
1 Computer Networks LAN Bridges and Switches. 2 Where are we?
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: LAN Redundancy Scaling Networks.
Chapter 11 Extending LANs: Fiber Modems, Repeaters, Bridges, & Switches Hub Bridge Switch.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-1 Configuring Catalyst Switch Operations Introducing Basic Layer 2 Switching and Bridging Functions.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: LAN Redundancy Scaling Networks.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 7 Spanning-Tree Protocol Cisco Networking Academy.
1 Spanning Tree Algorithm Advanced Computer Networks.
Example STP runs on bridges and switches that are 802.1D-compliant. There are different flavors of STP, but 802.1D is the most popular and widely implemented.
Presented by: Philippe Klein, Broadcom SRP Redundant Multipath Stream Selection (4) IEEE AVB WG Sep 2011 phkl-srp-stream-path-selection-0911-v01.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 LAN Switching and Wireless Implement Spanning Tree Protocols (STP) Chapter.
Bridging. Bridge Functions To extend size of LANs either geographically or in terms number of users. − Protocols that include collisions can be performed.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
© 2002, Cisco Systems, Inc. All rights reserved..
Created By NGIT. LAN Switching  A LAN switch is a device that provides much higher port density at a lower cost than traditional bridges. For this.
LOGO Local Area Network (LAN) Layer 2 Switching and Virtual LANs (VLANs) Local Area Network (LAN) Layer 2 Switching and Virtual LANs (VLANs) Chapter 6.
Clustering In A SAN For High Availability Steve Dalton, President and CEO Gadzoox Networks September 2002.
S7C5 – Spanning Tree Protocol And other topics. Switch Port Aggregation Bundling –Combining 2 to 8 links of FE (Fast Ethernet) or GE (Gigabit) Full duplex.
Spanning Tree V1.2 Slide 1 of 1 Purpose:
Switching Topic 6 Rapid spanning tree protocol. Agenda RSTP features – Port states – Port roles – BPDU format – Edge ports and link types – Proposals.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 7 Spanning Tree Protocol.
1 Version 3.0 Module 7 Spanning Tree Protocol. 2 Version 3.0 Redundancy Redundancy in a network is needed in case there is loss of connectivity in one.
IEEE 802.X Standards The Institute of Electrical and Electronics Engineers (IEEE) has developed a series of networking standards to ensure that networking.
ICS 156: Networking Lab Magda El Zarki Professor, ICS UC, Irvine.
Topic 5 Spanning tree protocol
Virtual MAC Redundancy Protocol (VMRP) IEEE WG Hyatt Regency Dallas, TX USA Nov 12~17, 2006.
Yan Wang Proposed amendments of control frames for c Yan Wang Huawei technologies.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implement Spanning Tree Protocols (STP) LAN Switching and Wireless – Chapter.
RPR Interconnection Topologies IEEE WG Orlando, Florida USA March 11~16, 2007.
1 LAN switching and Bridges Relates to Lab Outline Interconnection devices Bridges/LAN switches vs. Routers Bridges Learning Bridges Transparent.
Chapter-5 STP. Introduction Examine a redundant design In a hierarchical design, redundancy is achieved at the distribution and core layers through additional.
Media Access Methods MAC Functionality CSMA/CA with ACK
Spanning Tree Protocol
Transparent Bridging.
Some aspects to be determined in PIRC July
MPLS-TP Survivability Framework
Spanning Tree Algorithm
The Load Balancing Schemes Observations
Lecture#10: LAN Redundancy
Spanning Tree Protocol
Chapter 16: Distributed System Structures
Spanning Tree Protocol
RNI Requirements Imposed by PBB-TE
NT2640 Unit 9 Activity 1 Handout
Technical Requirements for IEEE ESS Mesh Networks
Spanning Tree Protocol (STP)
COS 561: Advanced Computer Networks
Presentation transcript:

Multiple Links Failover Mechanism for RPR Interconnected Rings IEEE WG Orlando, Florida USA March 11~16, 2007

Multiple Link Failures Scenario When there are two failure links in the interconnected RPR rings, and these two failure links are separated by the interconnected stations. There is way to protect the traffic to be not impacted by the defect. Note: If the two failure links are not separated by the interconnected stations, or if the failure links are more than two, then traffic are always impacted, and there is no need to consider the mechanism to protect the traffic. Or else introduce the complexity with the minimal probability. Although the probability for two link failures are also minimal, if the traffic can be protected at the tiny cost, is it worthwhile to do it?

Multiple Links Failover Mechanism For the different load balancing scheme, the multiple links failover mechanism should be the same. It’s possible that this same mechanism will result in the different behaviors in the different load balancing schemes.

VLAN Balancing Failover Example Through topology database, the interconnected stations are aware of the two link failures. To protect the traffic in the local ring and across the rings, two interconnected stations become both active nodes for any VLANs. After the defect is recovered, there should be some mechanism to prevent the data loop. Note: The blue and red line indicates the data transmission path.

VLAN Balancing Failover Example - Cont After the defect disappears, for the unknown unicast/broadcast frames, to avoid the loop, the following steps are executed, 1) RB1 and RB2 send the control message to declare the defect recovery, and behave as if the defect still exists, keep in the protection state. That means, if the wrap protection mode is used, then the RB1 and RB2 are still in wrap mode, if the steering protection mode is used, RB1 and RB2 will not send any frame to the recovered link. 2) After receive the defect recovery message, RI1 and RI2 will go back to the normal state, that is one is in the active state and the other one is in the standby state for the specified VLAN. 3) Then RI1 and RI2 will send the acknowledge message to inform RB1 and RB2 to go to normal state from protection state. Or alternatively in order not delaying the topology convergence, after the defect disappears, RB1 and RB2 can temporarily set the MTU to for example 64bytes to let the RPR control frame go through, but block the data frames. After receiving the acknowledge message from RI1/RI2, MTU go back to normal value. Step 1 Step 3 Step 2 Note: The green line indicates the control message transmission path.

Spatial Balancing Failover Example Through topologies database, the interconnected stations are aware of the two link failures. To protect the traffic in local ring and across the rings, two interconnected stations both should forward the traffic across the ring, and the flooding scopes are all around the ring separately. After the defect is recovered, there should be some mechanism to prevent the frame duplication. Note: The blue and red line indicates the data transmission path.

Spatial Balancing Failover Example -Cont Note: The green line indicates the control message transmission path. The blue line indicates the data transmission path. Step 1 Step 3 Step 2 After the defect disappears, for the unknown unicast/broadcast frames, to avoid the loop, the following steps are executed, 1) RB1 and RB2 send the control message to declare the defect recovery, and behave as if the defect still exists, keep in the protection state. That means, if the wrap protection mode is used, then the RB1 and RB2 are still in wrap mode, if the steering protection mode is used, RB1 and RB2 will not send any frame to the recovered link. 2) After receive the defect recovery message, RI1 and RI2 will go back to the normal state, that is two nodes will coordinate to forward the traffic across the ring, using the TTL scoping the traffic to prevent the frame duplication. 3) Then RI1 and RI2 will send the acknowledge message to inform RB1 and RB2 to go to normal state from protection state. Or alternatively in order not delaying the topology convergence, after the defect disappears, RB1 and RB2 can temporarily set the MTU to for example 64bytes to let the RPR control frame go through, but block the data frames. After receiving the acknowledge message from RI1/RI2, MTU go back to normal value.

Hashing Balancing Failover Example For the Hashing balancing scheme, when in the multipoint link failures, the interconnected stations behave more like the interconnected stations of the VLAN balancing scheme. Only the active/standby state is substituted for the Hash 0/1 states at the interconnected stations.

Interconnected station failure An observation: the interconnected station failure is equivalent to the multiple link failures, the alike failover mechanism can be used. Based on this observation, the following slide consider another interconnect RPR ring deployment, and the corresponding link failover mechanism.

Link failover in the following deployment scenario When use the above network topology, in case of the interconnected link failure: For the VLAN load balancing scheme, when the link connected to the station which is in the active state fails, then it transits to the standby state immediately, the interconnected stations which is in the standby state becomes the active state. For the TTL based load balancing scheme, any one of the interconnected links fails will result in the interconnected station on the other link takes the responsibility to forward the traffic all around the ring. For the Hash load balancing scheme, any one of the interconnected links fails will result in the interconnected station on the other link becomes both 0/1 states, and forwards all the frames with whatever hash value is.

Link failover in the following deployment scenario-Cont When the defect disappears, For the VLAN load balancing scheme, only after the original standby station goes back to the standby state, then the original active station can forward the traffic across ring normally. For the TTL based load balancing scheme, only after the interconnected RPR station, which resides on the defect free link, changes the state to the coordinated forwarding through TTL, then another interconnected RPR station on the recovered links can begin to forward the traffic across the ring. For the Hash load balancing scheme, only after the original hash 0 station goes back into 0 state, then the original hash 1 state station can begin to forward the traffic across ring normally.

Link failover in the following deployment scenario-Cont For the Hash and VLAN load balancing scheme, it’s necessary that the directly connected bridges act as the same state, i.e., both as the active (standby) or both as 0 (1) state. That means the extra synchronization message is needed between the two directly connected hybrid bridges. Whatever the load balancing scheme is,  The link detection mechanism between the interconnected bridges is needed, or else adapt the link failure notification from the server layer to monitor the link liveness.  When the interconnected link failure is detected by one of the interconnected bridges, there should be indication to the other bridge on the local ring to change the state, in order to protect the traffic in the local ring and across the ring. An observation: In this situation, it’s somewhat alike with the interconnected station failure in the Topology A, except that the station failure in Topology A can be detected through the TP database directly.

Thank you