Mike Takefman7/16/2007IEEE 802.17 RPRWG PIRC Architecture July 2007 Plenary Session San Francisco Mike Takefman Cisco Systems.

Slides:



Advertisements
Similar presentations
DRNI – Intra-DAS Link Version 01 Stephen Haddock July 20,
Advertisements

EVC structure for a Protected E-Line service
Networks & Communications
Data Communications and Networking
Network Devices Repeaters, hubs, bridges, switches, routers, NICs.
Topic 7 Local Area Networks (LAN)
Chapter 4 Retiming.
Switching & Operations. Address learning Forward/filter decision Loop avoidance Three Switch Functions.
1 Address Selection, Failure Detection and Recovery in MULTI6 draft-arkko-multi6dt-failure-detection-00.txt Multi6 Design Team -- Jari Arkko, Marcelo Bagnulo,
SPANNING TREE PROTOCOL (STP) VARIANTS Rapid Spanning Tree Protocol (RSTP) -The reason behind the word «rapid» Multiple Spanning Tree Protocol (MSTP)
VMAC for VRRPv3? Analysis of Design Tradeoffs
VLANs Virtual LANs CIS 278.
Oct 12, 2004CS573: Network Protocols and Standards1 Virtual LANs Network Protocols and Standards Autumn
802.17c Protected Inter-Ring Connection Rafi Ram - Corrigent Systems March 2007.
Lectures on Network Flows
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 Computer Networks Internetworking Devices. 2 Repeaters Hubs Bridges –Learning algorithms –Problem of closed loops Switches Routers.
P2P Course, Structured systems 1 Introduction (26/10/05)
Jan 10, 2008CS573: Network Protocols and Standards1 Virtual LANs Network Protocols and Standards Winter
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
Switches in Networking B. Konkoth. Network Traffic  Scalability  Ability to handle growing amount of work  Capability of a system to increase performance.
Introduction to InfoSec – Recitation 12 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
ABC Co. Network Implementation High reliability is primary concern – near 100% uptime required –Customer SLA has stiff penalty clauses –Everything is designed.
Network topologies. What is a network topology? Physical arrangement of the devices in a communications network. Most commonly used are bus and star.
Chapter 11 Extending LANs: Fiber Modems, Repeaters, Bridges, & Switches Hub Bridge Switch.
1 Meeyoung Cha (KAIST) Sue Moon (KAIST) Chong-Dae Park (KAIST) Aman Shaikh (AT&T Labs – Research) IEEE INFOCOM 2005 Poster Session Positioning Relay Nodes.
Web Based Applications
© 2001, The Technology Firm 1 Switching and Bridging The Technology Firm
Chapter 2 Network Design Essentials Instructor: Nhan Nguyen Phuong.
IEEE 802.1q - VLANs Nick Poorman.
Multiple Links Failover Mechanism for RPR Interconnected Rings IEEE WG Orlando, Florida USA March 11~16, 2007.
Cisco 3 - LAN Perrine. J Page 110/20/2015 Chapter 8 VLAN VLAN: is a logical grouping grouped by: function department application VLAN configuration is.
 A star topology is one of the most common network setups where each of the devices and computers on a network connect to a central hub.
Draft-francois-segment-routing-ti-lfa-00 Pierre Francois, IMDEA Networks Institute Clarence Filsfils, Ahmed Bashandy, Cisco Systems Bruno Decraene, Stephane.
Splitting the number Numbers, like everything else, can be split up into smaller parts. For atoms, these smaller parts are called quarks. For numbers,
CP Summer School Modelling for Constraint Programming Barbara Smith 2. Implied Constraints, Optimization, Dominance Rules.
OSI Model. Switches point to point bridges two types store & forward = entire frame received the decision made, and can handle frames with errors cut-through.
Cisco 3 - Switching Perrine. J Page 16/4/2016 Chapter 4 Switches The performance of shared-medium Ethernet is affected by several factors: data frame broadcast.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 16 Connecting LANs, Backbone Networks, and Virtual LANs.
Switching Topic 3 VTP. Agenda VTP basics Components Frames and advertisements Domains and revision numbers VTP operations VTP pruning VTP issues.
Chapter 8 Maximum Flows: Additional Topics All-Pairs Minimum Value Cut Problem  Given an undirected network G, find minimum value cut for all.
PC-Trees & PQ-Trees. 2 Table of contents Review of PQ-trees –Template operations Introducing PC-trees The PC-tree algorithm –Terminal nodes –Splitting.
Credit:  refers to the physical arrangement of the computers and other networking devices that are linked together.
Chapter 2 Network topology and Networking devices.
1/13 draft-carpenter-nvo3-addressing-00 Brian Carpenter Sheng Jiang IETF 84 Jul/Aug 2012 Layer 3 Addressing Considerations for Network Virtualization Overlays.
1 IEEE interim, Orlando, Florida, March, 2008new-nfinn-fast-chains-rings-par5c-0308-v1 Fast Recovery for Chains and Rings Proposal for PAR and 5.
1 Protection in SONET Path layer protection scheme: operate on individual connections Line layer protection scheme: operate on the entire set of connections.
Lecture 7. Building Forwarding Tables There are several methods Static Method Dynamic Methods Centralized Distributed Distance Vector Link State.
Connectors, Repeaters, Hubs, Bridges, Switches, Routers, NIC’s
Network Devices Repeaters, hubs, bridges, switches, routers, NIC’s.
Network Topology and LAN Technologies
Large-scale (Campus) Lan design (Part II)
Some aspects to be determined in PIRC July
802.17c Protected Inter-Ring Connection
Lab 2 – Hub/Switch Data Link Layer
The minimum cost flow problem
Chapter 4 Data Link Layer Switching
Configuring EtherChannels and Switch Troubleshooting
Lab 2 – Hub/Switch Data Link Layer
Lectures on Network Flows
+ – If we look at any two people in the group in isolation,
3.4 Push-Relabel(Preflow-Push) Maximum Flow Alg.
Network Topologies Charles Warren.
 What is Topology  Categories of Topology  Definition, structure, advantage and disadvantage of all of the following topologies: o Mesh o Bus o Ring.
Insurance IFRS Seminar December 2, 2016 Session 37
Light ENNI – aka Split LAG …
Connectors, Repeaters, Hubs, Bridges, Switches, Routers, NIC’s
Virtual LAN (VLAN).
Presentation transcript:

Mike Takefman7/16/2007IEEE RPRWG PIRC Architecture July 2007 Plenary Session San Francisco Mike Takefman Cisco Systems

Mike Takefman7/16/2007IEEE RPRWG My PIRC High Level Goals Built on top of b MAC Assumption is an L2 switched network PIRC has to provide loop-free dual connectivity Multiple Load-Balancing methods Compatible with non-PIRC stations ideally no MAC or operational changes needed for other nodes usable with existing standard product chips

Mike Takefman7/16/2007IEEE RPRWG Where To Put Filtering PIRC is essentially adding new filtering rules to the system assumption is that ingress and egress filter rules exist Our scope requires that these filtering rules exist in the MAC level, but the actual position is implementation dependant side effect on whether b learning occurs no easy way to arbitrarily allow or not allow learning question is one of compliance Tributary support requires egress filtering rules in addition to ingress rules

Mike Takefman7/16/2007IEEE RPRWG Hash Filtering Previous presentations have pointed out that certain constraints must be followed in order to insure connectivity net result is that the basic hash function is based on outer VLAN hence this form of hash filtering is essentially VLAN filtering and any other hashing function is by definition proprietary

Mike Takefman7/16/2007IEEE RPRWG 2 Span Failure Scenarios It has been suggested that PIRC support both 1 and 2 span failures it must be assumed that the network is otherwise loop free 2 cuts on a leaf ring is trivial as a loop cannot be created 2 cuts on an intermediate ring is more interesting and has a few cases D C B A

Mike Takefman7/16/2007IEEE RPRWG 2 Span Failure Scenarios D C B A Isolated Node no connectivity to that node no loops created Nothing can be done, and there are no PIRC issues

Mike Takefman7/16/2007IEEE RPRWG 2 Span Failure Scenarios D C B A Isolated Neighbour Ring no connectivity to that sub-tree no loop created Nothing can be done, and there are no PIRC issues

Mike Takefman7/16/2007IEEE RPRWG 2 Span Failure Scenarios D C B A Isolated Partial Ring full connectivity possible no loop created PIRC could restore connectivity A&B operated normally D&C both do full forwarding

Mike Takefman7/16/2007IEEE RPRWG 2 Span Failure Scenarios D C B A Split Ring full connectivity possible BUT loop created with current suggested PIRC filtering PIRC could restore connectivity A&B, C&D forward everything from neighbour ring to “broken ring” one of A|B, C|D forward to neighbour ring never forward back from mate done with egress filtering if tribs are needed else ingress

Mike Takefman7/16/2007IEEE RPRWG 2 Span Failure Scenarios D C B A How to recognize split ring? Nodes on affected ring observe mate has disappeared on one ring but not the other

Mike Takefman7/16/2007IEEE RPRWG 2 Span Failure Scenarios D C A B Does the split ring scenario scale to 3 PIRC pairs? A&B,C&D are partially isolated from B&E A&B is split from C&D the problem is that the split rules are different from the partially isolated rules implies you need to apply rules based on ringSA -> YUCK E F

Mike Takefman7/16/2007IEEE RPRWG Conclusions Dual Failure scenario can only be handled for limited cases likely not worth doing