Nov 2009IEEE 802.1aq Atlanta IEEE 802.1aq Shortest Path Bridging Equal Cost Tree (ECT) Framework Proposal Peter Ashwood-Smith incorporating graphics by:

Slides:



Advertisements
Similar presentations
16-1 ©2006 Raj JainCSE574sWashington University in St. Louis Energy Management in Ad Hoc Wireless Networks Raj Jain Washington University in Saint Louis.
Advertisements

EE384y: Packet Switch Architectures
Computer Networks TCP/IP Protocol Suite.
& dding ubtracting ractions.
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 12 Cross-Layer.
OSPF 1.
Introduction to IP Routing Geoff Huston. Routing How do packets get from A to B in the Internet? A B Internet.
Multiplication X 1 1 x 1 = 1 2 x 1 = 2 3 x 1 = 3 4 x 1 = 4 5 x 1 = 5 6 x 1 = 6 7 x 1 = 7 8 x 1 = 8 9 x 1 = 9 10 x 1 = x 1 = x 1 = 12 X 2 1.
Division ÷ 1 1 ÷ 1 = 1 2 ÷ 1 = 2 3 ÷ 1 = 3 4 ÷ 1 = 4 5 ÷ 1 = 5 6 ÷ 1 = 6 7 ÷ 1 = 7 8 ÷ 1 = 8 9 ÷ 1 = 9 10 ÷ 1 = ÷ 1 = ÷ 1 = 12 ÷ 2 2 ÷ 2 =
1 Building a Fast, Virtualized Data Plane with Programmable Hardware Bilal Anwer Nick Feamster.
Interconnection: Switching and Bridging CS 4251: Computer Networking II Nick Feamster Fall 2008.
MSTP Reflection VectorIEEE March 2005 Atlanta 1 MSTP Reflection Vector Norman Finn, Cisco Systems.
IEEE 802.1aq control of the Mac-in-Mac Hash/TTL B-VID(s) Jan 2011 Peter Ashwood-Smith
ECMP for 802.1Qxx Proposal for PAR and 5 Criteria Version 2 16 people from ECMP ad-hoc committee.
DRNI – Intra-DAS Link Version 01 Stephen Haddock July 20,
1 Hyades Command Routing Message flow and data translation.
1 A. Sshaikh, A. Greenberg; Nov 01 UCSC Sigcomm IMW Experience in Black-box OSPF Measurement Aman Shaikh, UCSC Albert Greenberg, AT&T Labs-Research.
Process a Customer Chapter 2. Process a Customer 2-2 Objectives Understand what defines a Customer Learn how to check for an existing Customer Learn how.
1 1  1 =.
Around the World AdditionSubtraction MultiplicationDivision AdditionSubtraction MultiplicationDivision.
Shortest Path Bridging IEEE 802
Multipath Routing for Video Delivery over Bandwidth-Limited Networks S.-H. Gary Chan Jiancong Chen Department of Computer Science Hong Kong University.
Evaluating Window Joins over Unbounded Streams Author: Jaewoo Kang, Jeffrey F. Naughton, Stratis D. Viglas University of Wisconsin-Madison CS Dept. Presenter:
Block Cipher Modes of Operation and Stream Ciphers
Jennifer Rexford Princeton University MW 11:00am-12:20pm Logically-Centralized Control COS 597E: Software Defined Networking.
SE-292 High Performance Computing
Look at This PowerPoint for help on you times tables
Megastore: Providing Scalable, Highly Available Storage for Interactive Services. Presented by: Hanan Hamdan Supervised by: Dr. Amer Badarneh 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Distance Vector Routing Protocols Routing Protocols and Concepts –
Outline Minimum Spanning Tree Maximal Flow Algorithm LP formulation 1.
Project Management 6e..
Developing the Project Plan
Chapter 20 Network Layer: Internet Protocol
U-turn Alternates for IP/LDP Fast-Reroute draft-atlas-ip-local-protect-uturn-01.txt Alia Atlas Gagan Choudhury
BUDAPEST UNIVERSITY OF TECHNOLOGY AND ECONOMICS Budapest University of Technology and Economics Verification of RSTP Convergence and Scalability by Measurements.
1..
Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
IPv6 Routing.
Route Optimisation RD-CSY3021.
Ethernet Data Center Routing Challenges and 802.1aq/SPB new work PETER ASHWOOD-SMITH
Chapter 9: Subnetting IP Networks
25 seconds left…...
Chapter 2 Entity-Relationship Data Modeling: Tools and Techniques
1 12/18/ :21 Chapter 12Bridges1 Rivier College CS575: Advanced LANs Chapter 12: Bridges.
& dding ubtracting ractions.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Link-State Routing Protocols Routing Protocols and Concepts – Chapter.
1 Incentive-Compatible Interdomain Routing Joan Feigenbaum Yale University Vijay Ramachandran Stevens Institute of Technology Michael Schapira The Hebrew.
Link State Routing Jean-Yves Le Boudec Fall
Enhanced Interior Gateway Routing Protocol (EIGRP) Part 2
IPv6 Routing IPv6 Workshop Manchester September 2013
DIJKSTRA’s Algorithm. Definition fwd search Find the shortest paths from a given SOURCE node to ALL other nodes, by developing the paths in order of increasing.
IETF 73 November aq Shortest Path Bridging Overview for IETF Don Fedyk Editor 802.1aq.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Link-State Routing Protocols Routing Protocols and Concepts – Chapter.
Chapter 12 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Read a routing table  Configure a static route 
Lecture Week 10 Link-State Routing Protocols. Objectives Describe the basic features & concepts of link-state routing protocols. List the benefits and.
Introduction to OSPF Nishal Goburdhan. Routing and Forwarding Routing is not the same as Forwarding Routing is the building of maps Each routing protocol.
GMPLS Control of Ethernet IVL Switches draft-fedyk-gmpls-ethernet-ivl-00 GELS BOF, IETF 64 Don Fedyk, Dave Allan,
1 Module 4: Implementing OSPF. 2 Lessons OSPF OSPF Areas and Hierarchical Routing OSPF Operation OSPF Routing Tables Designing an OSPF Network.
(ed) Peter Ashwood-Smith
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Link-State Routing Protocols Routing Protocols and Concepts – Chapter 10.
CSE 421 Computer Networks. Network Layer 4-2 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside.
Routing Protocols and Concepts
Link-State Routing Protocols
CS 457 – Lecture 12 Routing Spring 2012.
Intra-Domain Routing Jacob Strauss September 14, 2006.
Link-State Routing Protocols
Dynamic Routing and OSPF
Chapter 8: Single-Area OSPF
Link-State Routing Protocols
Bridges Neil Tang 10/10/2008 CS440 Computer Networks.
Presentation transcript:

Nov 2009IEEE 802.1aq Atlanta IEEE 802.1aq Shortest Path Bridging Equal Cost Tree (ECT) Framework Proposal Peter Ashwood-Smith incorporating graphics by: Guoli Yin incorporating MCID input from: Nigel Bragg ECT from : Mick Seaman (per –d2-1) 1

Nov 2009IEEE 802.1aq Atlanta Presentation Structure There are strict requirements on ECT algorithms compatible with SPB : –we summarise these Nonetheless, a number of different algorithms have been identified and successfully prototyped : –we give a couple of examples So what is the best way to preserve rigour and allow future algorithm innovation ? Define an extensible Framework (compatible with previous work). and populate it initially with currently known and validated algorithms 2

Nov 2009IEEE 802.1aq Atlanta Algorithm requirements review: Shortest paths computed by SPB must be symmetric and downstream congruent. Symmetry required for: Learning in the case of SPPV Ingress checking (SA lookup miss => discard) for SPPM Downstream congruence required for: Hop by hop destination-based (DA/VID) forwarding, every hop agrees on same rest of path, so state scales O(N) vs. O(N 2 ) Equal cost shortest paths computed by SPB must be resolved by a technique which is independent both of the direction of computation and the location in the topology of the computing node. 3

Nov 2009IEEE 802.1aq Atlanta Tie-Breaking – base algorithm When only one shortest path there is no issue. When two equal min sum of link metric paths exist must deterministically pick 1. Basic tie breaker is called LowPathID : a lexicographically ordered list of the BridgeIds forming the Path LowPathId will pick path with the minimum BridgeId between fork/join points. LowPathId is trivial to implement in Dijkstra, just backtrack when join occurs: Track min BridgeId on each path until they converge (fork point). LowPathId is the path with the min of the two mins between fork/join. BridgeId = BridgePriority concatenated with SysIID Winner can be tuned by adjusting BridgePriority Min= Min=2 joinfork 4

Nov 2009IEEE 802.1aq Atlanta HOW DOES IT WORK IN PRACTICE? Low PathID As applied to a 7 member E-LAN ISID 100 all members support both transmit/receive. SPF tree shown from each member : using Low PathID algorithm. Symmetry highlighted Between 35 and 40. N 5 Animated GIF, run interactive to view.

Nov 2009IEEE 802.1aq Atlanta Tie-Breaking – 15 additional algorithms allow ECT There are 15 additional algorithms defined, allows ECT diversity. Each starts by running a 1:1 permutation on the BridgeIDs with XOR against known (network-global) masks. The LowPathID algorithm #1 is run after XOR with mask 0x0 (no change). For example, algorithm #2 will invert all the bytes in the BridgeID. We have been calling this highPathId so uses all 1s as its mask. Each of the other 14 algorithms uses a different bit mask to XOR the BridgeID into a new unique permutation. We implement all 16 by XOR-ing with the mask and finding min of min. The masks are as follows (in hex), each nibble in 8 byte mask uses same value. 00 ff cc bb aa 99 dd ee 6

Nov 2009IEEE 802.1aq Atlanta #S #D 0 | FF | 22 1 | FE | 23 0 | FF | 22 2 | FD | 20 0 | FF | 22 3 | FC | 21 #1#2#3 XOR-MASKs RESULT N = min {BridgeID XOR MASK[i]} #N = Bridge ID Low Path ID (alg=1) High Path ID (alg = 2) Alg=9 EXAMPLE ECT diversity for Algorithms 1,2 and 9 KEY #1 xor 0 = 1 #1 xor FF = FE #1 xor 22 = 23 #2 xor 0 = 2 #2 xor FF = FD #2 xor 22 = 20 #3 xor 0 = 3 #3 xor FF = FC #3 xor 22 = 21 BridgeID INPUT 7

Nov 2009IEEE 802.1aq Atlanta HOW DOES IT WORK IN PRACTICE? 8 X ECT 66 nodes Metro style 8 x ECT 36 node DS-style/fat HUGE improvement over Low/high PathID (x 2 ECT). But routes get missed because: If Diameter = D and avg adjacency = A there are: O((A-1 )D) paths. What other approaches can we take to maximize diversity? Animated GIF, run interactive to view. 8

Nov 2009IEEE 802.1aq Atlanta There seem to be numerous different classes of ECT algorithm with different properties. 1.Minimum/Max of some nodal identifier over paths. 1:1 Permutations of that identifier to spread min around. Operator can explicitly set identifiers to tweak spreading. 2.Minimum/Max of some link identifier over paths. 1:1 Permutations of that link identifier to spread min around. Operator can override link id to tweak spreading. 3.Minimum/Max of a sum of a secondary metric. Hash produces the secondary metric. User can override the secondary metric to tweak spreading. 4.Algorithms which consider previous ECT algorithms path usage to increase diversity. (Requires serial run instead of parallel). 9

Nov 2009IEEE 802.1aq Atlanta Since there seems to be a rich area of research to look into new ECT algorithms and with proper ECT diversity a form of traffic engineering emerges. So we propose: 1.Fix the 16 ECT algorithms as defined in –d2-1 and advance the spec…but 2.Include a framework that allows new ECT algorithms to be implemented. 3.Framework to include hello/LSA policies & TLVs for safe migration. 4.Framework includes concept of Opaque ECT-DATA on a node or link basis for future ECT algorithms. 5.Vendors/Researchers and future standards work can build into this framework without changes to IETF ISIS work or even IEEE 802.1aq. Vendors could sell proprietary ECT behaviors or publish informational. Other standards bodies can add custom behaviors, Data Center etc. 10

Nov 2009IEEE 802.1aq Atlanta The proposal – full text submitted to Don Fedyk ECT-ALGORITHM ::= OUI:24 || INDEX:8 OUI = C2, INDEX 0-16 defined by 802.1aq. 0=STP, 1=LowPathID etc. ISID ECT-ALGORITHM So we expand from 8 bit Algorithm to 32 bits in SPB Instance sub TLV. HELLO { } * Hello protocol carries algorithm identifier and VID used and indication of its current usage state for clean migration. LSP { }* Announces support for given algorithm and the VID to use. SPBM ECT-VID and DATA-VID are the same and are just the B-VID. Otherwise SPBV then ECT-VID is Base-VID and DATA-VID is the SPVID. LSP OPAQUE-NODE-ECT-TLV || ECT-ALGORITHM … ECT-DATA LSP OPAQUE-LINK-ECT-TLV || ECT-ALGORITHM … ECT-DATA Allows future expansion. 11

Nov 2009IEEE 802.1aq Atlanta ECT MIGRATION USE-FLAGs should be advertised when ISIDs reference an ECT-ALGORITHM. Hellos should set USE-FLAG if they are locally referencing or remotely seeing references to the ECT-ALGORITHM. Adjacency permitted if {, } * match. If mismatch for a given ECT-ALGORITHM the adjacency is allowed only if USE-FLAG not set on at least one end. this allows a new ECT-ALGORITHM to be introduced gradually whilst the network continues running the current production algorithm Must not locally use an ECT-ALGORITHM unless all adjacencies agree on ECT-VID. This should permit a new ECT-ALGORITHM to be turned on, advertised and then migrated to. It also permits movement away from an ECT-ALGORITHM and then the deprecation of that ECT-ALGORITHM network wide once no longer in use. 12

Nov 2009IEEE 802.1aq Atlanta MCID – migration issues (SPB only) 1.It may not be possible to accurately populate the VID space a priori. 2.and since we do not want to take down an adjacency just because we are adding a new un anticipated VID 3.We propose to allow an AUX-MCID to be advertised. 4.An adjacency is not rejected if the primary MCIDs dont match as long as there is a match of the AUX-MCID with the primary MCID. i.e. either the primary OR the auxiliary MCID of one bridge must match the primary MCID of the other to keep the adjacency up. 5.This allows configuration of one end of a link followed by out of sync configuration of the other end without loss of adjacency. 6.Responsibility for ensuring that primary and auxiliary MCIDs represent compatible super/sub-sets of VIDs lies with the network administrator but in-service upgrade of this sort is not for the amateur anyway 13