Budapest University of Technology and Economics Department of Telecommunications and Media Informatics Optimized QoS Protection of Ethernet Trees Tibor.

Slides:



Advertisements
Similar presentations
EdgeNet2006 Summit1 Virtual LAN as A Network Control Mechanism Tzi-cker Chiueh Computer Science Department Stony Brook University.
Advertisements

BUDAPEST UNIVERSITY OF TECHNOLOGY AND ECONOMICS DEPARTMENT OF TELECOMMUNICATIONS AND MEDIA INFORMATICS BUDAPEST UNIVERSITY OF TECHNOLOGY AND ECONOMICS.
BUDAPEST UNIVERSITY OF TECHNOLOGY AND ECONOMICS Budapest University of Technology and Economics Verification of RSTP Convergence and Scalability by Measurements.
Traffic Engineering with Forward Fault Correction (FFC)
Winter 2004 UCSC CMPE252B1 CMPE 257: Wireless and Mobile Networking SET 3f: Medium Access Control Protocols.
Nirmala Shenoy, Daryl Johnson, Bill Stackpole, Bruce Hartpence Rochester Institute of Technology 1.
SPANNING TREE PROTOCOL (STP) VARIANTS Rapid Spanning Tree Protocol (RSTP) -The reason behind the word «rapid» Multiple Spanning Tree Protocol (MSTP)
CSE 534 Fundamentals of Computer Networks Lecture 4: Bridging (From Hub to Switch by Way of Tree) Based on slides from D. Choffnes Northeastern U. Revised.
CS 4700 / CS 5700 Network Fundamentals Lecture 7: Bridging (From Hub to Switch by Way of Tree) Revised 1/14/13.
Multi-Layer Switching Layers 1, 2, and 3. Cisco Hierarchical Model Access Layer –Workgroup –Access layer aggregation and L3/L4 services Distribution Layer.
CPSC Topics in Multimedia Networking A Mechanism for Equitable Bandwidth Allocation under QoS and Budget Constraints D. Sivakumar IBM Almaden Research.
31 May, 2006Stefan Stancu1 Control and Data Networks Architecture Proposal S. Stancu, C. Meirosu, B. Martin.
PROFITABLE CONNECTION ASSIGNMENT IN ALL OPTICAL WDM NETWORKS VISHAL ANAND LANDER (Lab. for Advanced Network Design, Evaluation and Research) In collaboration.
Tesseract A 4D Network Control Plane
Comparison of MSTP and (G)ELS Benchmarking Carrier Ethernet Technologies Workshop Session AI.1: Scientific and Technical Results Krakow, Poland April 30,
Multipath Protocol for Delay-Sensitive Traffic Jennifer Rexford Princeton University Joint work with Umar Javed, Martin Suchara, and Jiayue He
CSE390 Advanced Computer Networks Lecture 7: Bridging (From Hub to Switch by Way of Tree) Based on slides from D. Choffnes Northeastern U. Revised Fall.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
SMUCSE 8344 Constraint-Based Routing in MPLS. SMUCSE 8344 Constraint Based Routing (CBR) What is CBR –Each link a collection of attributes (performance,
BUDAPEST UNIVERSITY OF TECHNOLOGY AND ECONOMICS DEPARTMENT OF TELECOMMUNICATIONS AND MEDIA INFORMATICS BUDAPEST UNIVERSITY OF TECHNOLOGY AND ECONOMICS.
Optimizing Metro Ethernet
MUSE Winter School 2006 BE M Traffic Engineering in Ethernet-based Access Networks MUSE Winter School BB Europe Geneva December 11.
Lawrence G. Roberts CEO Anagran September 2005 Enabling Data-Intensive iGrid Applications with Advanced Network Technology.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: LAN Redundancy Scaling Networks.
Roadmap-Based End-to-End Traffic Engineering for Multi-hop Wireless Networks Mustafa O. Kilavuz Ahmet Soran Murat Yuksel University of Nevada Reno.
Fast Failover for Control Traffic in Software-defined Networks Globecom 2012 Neda B. & Ying Z. Presented by: Szu-Ping Wang.
Bell Labs Advanced Technologies EMEAAT Proprietary Information © 2004 Lucent Technologies1 Overview contributions for D27 Lucent Netherlands Richa Malhotra.
STP Part II PVST (Per Vlan Spanning Tree): A Vlan field is added to the BPDU header along with Priority & Mac. Priority is 32768, Mac Address is MAC or.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: LAN Redundancy Scaling Networks.
DaVinci: Dynamically Adaptive Virtual Networks for a Customized Internet Jennifer Rexford Princeton University With Jiayue He, Rui Zhang-Shen, Ying Li,
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implement Spanning Tree Protocols LAN Switching and Wireless – Chapter 5.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Implement Spanning Tree Protocols LAN Switching and Wireless – Chapter 5.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implement Spanning Tree Protocols LAN Switching and Wireless – Chapter 5 Part.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 LAN Switching and Wireless Implement Spanning Tree Protocols (STP) Chapter.
Improving Capacity and Flexibility of Wireless Mesh Networks by Interface Switching Yunxia Feng, Minglu Li and Min-You Wu Presented by: Yunxia Feng Dept.
Paper Presentation – CS 702, Fall 2007 DPNM Lab. “On the Optimal Configuration of Metro Ethernet for Triple Play” Andras Kern, Istvan Moldovan, and Tibor.
Minimax Open Shortest Path First (OSPF) Routing Algorithms in Networks Supporting the SMDS Service Frank Yeong-Sung Lin ( 林永松 ) Information Management.
S4-Chapter 3 WAN Design Requirements. WAN Technologies Leased Line –PPP networks –Hub and Spoke Topologies –Backup for other links ISDN –Cost-effective.
Designing Routing Protocol For Mobile Ad Hoc Networks Navid NIKAEIN Christian BONNET EURECOM Institute Sophia-Antipolis France.
DaVinci: Dynamically Adaptive Virtual Networks for a Customized Internet Jiayue He, Rui Zhang-Shen, Ying Li, Cheng-Yen Lee, Jennifer Rexford, and Mung.
Spanning Tree V1.2 Slide 1 of 1 Purpose:
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks TCP.
1 Version 3.0 Module 7 Spanning Tree Protocol. 2 Version 3.0 Redundancy Redundancy in a network is needed in case there is loss of connectivity in one.
CCNP 3: Chapter 3 Implementing Spanning Tree. Overview Basics of implementing STP Election of Root Bridge and Backup Enhancing STP RSTP MSTP EtherChannels.
Topic 5 Spanning tree protocol
CO5023 LAN Redundancy.
11/02/2001 Workshop on Optical Networking 1 Design Method of Logical Topologies in WDM Network with Quality of Protection Junichi Katou Dept. of Informatics.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implement Spanning Tree Protocols (STP) LAN Switching and Wireless – Chapter.
1 Traffic Engineering By Kavitha Ganapa. 2 Introduction Traffic engineering is concerned with the issue of performance evaluation and optimization of.
Chapter-5 STP. Introduction Examine a redundant design In a hierarchical design, redundancy is achieved at the distribution and core layers through additional.
Designing Multi-hop Wireless Backhaul Networks with Delay Guarantees Girija Narlikar, Gordon Wilfong, and Lisa Zhang Bell Lab. Infocom 2006.
MPLS Introduction How MPLS Works ?? MPLS - The Motivation MPLS Application MPLS Advantages Conclusion.
Instructor Materials Chapter 3: STP
Implement Spanning Tree Protocols
Implement Spanning Tree Protocols
Lecture#10: LAN Redundancy
Configuring Catalyst Switch Operations
Large-scale (Campus) Lan design (Part I)
Intra-Domain Routing Jacob Strauss September 14, 2006.
Implement Spanning Tree Protocols
An Equal-Opportunity-Loss MPLS-Based Network Design Model
CS 4700 / CS 5700 Network Fundamentals
Frank Yeong-Sung Lin (林永松) Information Management Department
CCNA Routing and Switching Scaling Networks v6.0
Kevin Lee & Adam Piechowicz 10/10/2009
L12. Network optimization
CS 4700 / CS 5700 Network Fundamentals
Frank Yeong-Sung Lin (林永松) Information Management Department
Implement Spanning Tree Protocols
Presentation transcript:

Budapest University of Technology and Economics Department of Telecommunications and Media Informatics Optimized QoS Protection of Ethernet Trees Tibor Cinkler, András Kern, István Moldován

BME-TMIT Ericsson, January 2006, ● Ethernet is the most dominating LAN technology ●Cheap equipment + high speed (up to 10 Gbps) ● Switched Ethernet - Carrier grade properties are required: ●Traffic Engineering ●Resilience Ethernet in Metro Access Networks

BME-TMIT Ericsson, January 2006, Spanning Tree Protocol (STP) ●Reverse learning + broadcast based packet switch ●Tree–like topology desired ●STP: ●Defines loop-free logical packet forwarding topology ●Spans a tree between the switches ●Problems:  Slow convergence (improved by RSTP)  Bad network utilization

BME-TMIT Ericsson, January 2006, Multiple Spanning Tree Protocol ●MORE VLAN based spanning trees ●Multiple spanning tree instances ●Each tree runs a separate RSTP instance ●1 VLAN  1 tree ●Number of trees is decision of the operator ●By default tree spanning is “Topology-Driven”: ●Port costs based on topology and link capacities ●Costs can be set manually (to obtain desired trees)

BME-TMIT Ericsson, January 2006, Protection switching ●802.3ad Link Aggregation ●uses redundant links for load balancing and protection ●Using MSTP ●2 MSTI trees, two paths: red and green ●VLAN 1 -> MST 1, VLAN 2 -> MST 2 ●A and B uses VLAN 1, in case of failure switch to VLAN 2 LAN VLAN 1 MST 1 VLAN 2 MST 2 (backup) A B

BME-TMIT Ericsson, January 2006, ●Typical Metro Topology: ●Aggregated traffic (demands) goes from the access to the edge nodes. ●Root of the trees at Edges node  one or more trees per edge node Model assumptions Traffic Source Traffic Destinatio n

BME-TMIT Ericsson, January 2006, Optimization framework ●Optimize the spanning trees ●Goal is to minimize the used network resources to maximize network throughput ●Provide 1:1 protection ●To protect all traffic is expensive - protect only a part of the traffic: the prioritized traffic ●Best Effort can use the protection paths

BME-TMIT Ericsson, January 2006, Formal description: ILP ●Integer Linear Program is used ●Result is a global optimal solution ●Constraints ●Total load does not exceed the link capacities and QoS limits ●If a demand uses a link the assigned tree will also use it ●Tree constraints (no cycles) ●Backup paths must be disjoint

BME-TMIT Ericsson, January 2006, Evaluation Criteria ●Maximal Throughput of the network ●Scaling up the offered load ●The allocated capacity for protection ●Resilience vs. Throughput: the amount of traffic lost in case of failure ●Complexity

BME-TMIT Ericsson, January 2006, Throughput gain

BME-TMIT Ericsson, January 2006, Throughput w/ protection

BME-TMIT Ericsson, January 2006, Capacities allocated

BME-TMIT Ericsson, January 2006, Heuristic ●Decomposition: ●Demand Routing (DR) ●Based on Simulated Allocation (SAL) ●Tree Assignment and Placement (TAP) ●Tree construction algorithm ●Results verified by simulations ●comparison to ILP solution

BME-TMIT Ericsson, January 2006, Heuristic Results

BME-TMIT Ericsson, January 2006, Relative throughputs

BME-TMIT Ericsson, January 2006, Conclusion ●We present an optimization TE Framework for QoS and protection ●ILP – not scalable ●Heuristics – scalable, close to optimal ●We show that: ●With optimization we can use redundant links –Throughput doubles compared to STP ●Optimized 1:1 protection –The same throughput as STP but all protected ●Protecting QoS traffic only is reasonable tradeoff

BME-TMIT Ericsson, January 2006, Thank you for your attention!

BME-TMIT Ericsson, January 2006, The End…

BME-TMIT Ericsson, January 2006, QoS model ●Priority based scheduling: ●Lower priority traffic is not served until there is higher priority traffic in the queue. ●To ensure low delay for each QoS class: amount of higher priority traffic should be limited for each link ●The ratios are examples, and should be determined individually for each operator 10% 20% remaining 30%

BME-TMIT Ericsson, January 2006, QoS provisioning ●Edges: ●Classification - VLANs ●Admission control, policing ●All nodes ●Queuing, scheduling ●Preprovisioned VLAN based QoS pipes ●Traffic engineered paths for VLAN pipes ●Resources assigned to pipes ●Optimization ensures that QoS requirements are met for each link

BME-TMIT Ericsson, January 2006, Loss in case of failure ●Throughput loss is compared to the network throughput without failure ●losses are measured immediately after the link failure, so the restoration capability of the STP is not considered