- vertraulich / confidential - 65. IETF Meeting BoF, March 2006 Haag, Thomas, T-Systems ENPS PCT15th Seite 1, 22nd of March 2006 IETF BoF Session Layer.

Slides:



Advertisements
Similar presentations
Ethernet Switch Features Important to EtherNet/IP
Advertisements

Akihiro Tanabe, Daisuke Andou, Kaori Izutsu, Tsunemasa Hayashi and Hiroshi Tohjo NTT Access Network Service Systems Laboratories {atanabe, dandou,
Presented by: Eng. Karam Al-sofy
SAVI Requirements and Solutions for ISP IPv6 Access Network ISP-access-01.txt.
Copyright ©Universalinet.Com, LLC 2009 Internet To connect a subscriber to Cable Services, Internet connectivity serves as the endpoint to the subscriber.
Quality of Service Update
IP over ETH over IEEE draft-riegel-16ng-ip-over-eth-over Max Riegel
Implementing Inter-VLAN Routing
CCNA – Network Fundamentals
Multi-Layer Switching Layers 1, 2, and 3. Cisco Hierarchical Model Access Layer –Workgroup –Access layer aggregation and L3/L4 services Distribution Layer.
UNIT-IV Computer Network Network Layer. Network Layer Prepared by - ROHIT KOSHTA In the seven-layer OSI model of computer networking, the network layer.
Multimedia over DSL By Phil Moy. May 14, Agenda n DSL Forum Working Text 80 - Multiservice Architecture & Framework Requirements n DSL Forum Working.
IPv6 Address Provisioning In IPv6 world there are three provisioning aspects wich are independent of whether the IPv6 node is a Host or CE router: IPv6.
Rev A8/8/021 ABC Networks
IETF72 ANCP WG1 ANCP Applicability to PON draft-bitar-wadhwa-ancp-pon-00.txt Nabil Bitar, Verizon Sanjay Wadhwa, Juniper Networks.
IETF74 ANCP WG1 ANCP Applicability to PON draft-bitar-wadhwa-ancp-pon-01.txt Update on Differences from DSL Nabil Bitar, Verizon Sanjay Wadhwa, Juniper.
1 Introducing the Specifications of the Metro Ethernet Forum.
Lecture 1, 1Spring 2003, COM1337/3501Computer Communication Networks Rajmohan Rajaraman COM1337/3501 Textbook: Computer Networks: A Systems Approach, L.
Speaker 2006/XX/XX Speaker 2007/XX/XX IGMP Snooping CK NG Technical Marketing.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 GSMPv3 applicability to L2CP draft-wadhwa-gsmp-l2control-configuration-00.txt.
Framework & Requirements for an Access Node Control Mechanism in Broadband Multi-Service Networks ANCP WG IETF 70 – Vancouver draft-ietf-ancp-framework-04.txt.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
National Institute of Science & Technology Voice Over Digital Subscriber Line (VoDSL) Vinay TibrewalEE [1] VoDSL: Next Generation Voice Solution.
Access Protocols PPP vs. DHCP Chapter 5. Overview PPP DHCP User identities Assignment of IP addresses Assignment of other parameters.
1 Pertemuan 16 WAN Technologies Overview. Discussion Topics WAN technology WAN devices WAN standards WAN encapsulation Packet and circuit switching WAN.
Chapter 1. Introduction. By Sanghyun Ahn, Deot. Of Computer Science and Statistics, University of Seoul A Brief Networking History §Internet – started.
Framework & Requirements for an Access Node Control Mechanism in Broadband Multi-Service Networks ANCP WG IETF 71 – Philadelphia draft-ietf-ancp-framework-05.txt.
Cisco 3 - LAN Perrine. J Page 110/20/2015 Chapter 8 VLAN VLAN: is a logical grouping grouped by: function department application VLAN configuration is.
Metro Ethernet UNI Standards Update Gary Southwell VP of Product Marketing Internet Photonics MEF Marketing Collateral co-chair
By: Aleksandr Movsesyan Advisor: Hugh Smith. OSI Model.
A Conference Gateway Supporting Interoperability Between SIP and H.323 Jiann-Min Ho (Presenter) Jia-Cheng Hu Information Networking Institute Peter Steenkiste.
William Stallings Data and Computer Communications
Framework & Requirements for an Access Node Control Mechanism in Broadband Multi-Service Networks IETF 66 - ANCP WG July 9-14, 2006 draft-ooghe-ancp-framework-00.txt.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 9 Virtual Trunking Protocol.
AIMS Workshop Heidelberg, 9-11 March 1998 P616 - ENHANCED ATM ISSUES Network Layers over ATM Rüdiger Geib Deutsche Telekom Tel Fax +49.
Chapter Thirteen The Other Protocols. Objectives You’ll get a brief overview of –IPX/SPX –NetBEUI –Appletalk How each protocol handles addressing The.
Framework & Requirements for an Access Node Control Mechanism in Broadband Multi-Service Networks draft-ietf-ancp-framework-02.txt Presenter: Dong Sun.
Access Node Control Protocol (ANCP) IETF 66, Montreal Wojciech Dec Matthew Bocci
CSE5803 Advanced Internet Protocols and Applications (14) Introduction Developed in recent years, for low cost phone calls (long distance in particular).
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Protocols and Architecture Slide 1 Use of Standard Protocols.
Chapter 4 Version 1 Virtual LANs. Introduction By default, switches forward broadcasts, this means that all segments connected to a switch are in one.
1 12-Jan-16 OSI network layer CCNA Exploration Semester 1 Chapter 5.
Chapter 3 Selecting the Technology. Agenda Internet Technology –Architecture –Protocol –ATM IT for E-business –Selection Criteria –Platform –Middleware.
Admission Control in IP Multicast over Heterogeneous Access Networks
Gap between ANCP and TR-147 Hongyu Li Nov Introduction  Background  TR-147 Layer 2 Control defines business requirements  GSMP was chosen as.
Layer 2 Control Protocol BoF (L2CP) IETF 65, Dallas, TX Wojciech Dec Matthew Bocci
System Optimization Networking
1 COMP 431 Internet Services & Protocols The IP Internet Protocol Jasleen Kaur April 21, 2016.
DOTS Requirements Andrew Mortensen November 2015 IETF 94 1.
Extension of the MLD proxy functionality to support multiple upstream interfaces 1 Luis M. Contreras Telefónica I+D Carlos J. Bernardos Universidad Carlos.
ANCP Migration Carrier Analysis Thomas Haag; Birgit Witschurke,
Ethernet Packet Filtering - Part1 Øyvind Holmeide Jean-Frédéric Gauvin 05/06/2014 by.
سمینار تخصصی What is PSTN ? (public switched telephone network) تیرماه 1395.
INTERNET PROTOCOL TELEVISION (IP-TV)
Chapter 5 Network and Transport Layers
<draft-ohba-pana-framework-00.txt>
PANA in DSL networks draft-morand-pana-panaoverdsl-01.txt
LMAP BoF 1. ISP use case 2. Framework
Instructor Materials Chapter 6: VLANs
Sanjay Wadhwa Juniper Networks
INTERNET PROTOCOL TELEVISION (IP-TV)
Broadband Components Customer Premises Equipment(CPE)
VLAN Trunking Protocol
ANCP Applicability to PON draft-bitar-wadhwa-ancp-pon-00
PPPoE Internet Point to Point Protocol over Ethernet
Network Virtualization
Application Layer Mobility Management Scheme for Wireless Internet
Lecture 2: Overview of TCP/IP protocol
Framework for DWDM interface Management and Control
Presentation transcript:

- vertraulich / confidential IETF Meeting BoF, March 2006 Haag, Thomas, T-Systems ENPS PCT15th Seite 1, 22nd of March 2006 IETF BoF Session Layer 2 Control between Access Node and BNG Version 1.0

- vertraulich / confidential IETF Meeting BoF Layer 2 Control Haag,Thomas, ENPS PCT15th Seite 2, 22nd of March 2006 Layer 2 Control Mechanism Co-authors Thomas Haag, Deutsche Telekom Sanjay Wadhwa, Juniper Sven Ooghe, Alcatel Peter Arberg, Redback Norbert Voigt, Ole Anderson Helleberg, Ericsson Michel Platnic, ECI Wojciech Dec,

- vertraulich / confidential IETF Meeting BoF Layer 2 Control Haag,Thomas, ENPS PCT15th Seite 3, 22nd of March 2006  Problem Statement – Overall  Reference Architecture  Problem Statement – Use Cases  Use Case 1 - Access Line Discovery  Use Case 2 - OAM in ATM/Ethernet  Use Case 3 - Multicast  Use Case 4 - Line Configuration  Best Practice - Plugfest Access Line Discovery  Protocol Requirements Layer 2 Control Mechanism Content

- vertraulich / confidential IETF Meeting BoF Layer 2 Control Haag,Thomas, ENPS PCT15th Seite 4, 22nd of March 2006 Layer 2 Control Mechanism Problem Statement - Overall Several sources like ITU-T H.610, DSLForum TR-059 describe the DSL architecture for delivery of voice, video and data services:  The approaches require a static configured data link on layer 2  The models define beside the data link the EMS architecture.  Each network element is usually controlled by one element manager.  The service node usually has no knowledge about actual DSL link characteristics - problem of “non synchronized” EMS  Service oriented user entitlement control for Multicast unsolved  End to End OAM in ATM/Ethernet based access networks unsolved

- vertraulich / confidential IETF Meeting BoF Layer 2 Control Haag,Thomas, ENPS PCT15th Seite 5, 22nd of March 2006 PC RG/ CPE RG/ CPE GigE 1 (10)GigE VDSL2/ ADSL2+ Fast Ethernet DSLAMBNGIP Edge Router- MC-Server GigE STB PPPoE L2CP (Link Rate Discovery)) MC-Switch Hierarchical Scheduler  PPPoE/IPoE session carries all traffic between BNG and DSLAM  BNG is Multicast-Replication point.  BNG receives information about DSL bit rate from the DSLAM via the principles of a Layer 2 Control Protocol.  The BNG performs the QoS handling in downstream. QoS mapping works according hierarchical scheduling. Layer 2 Control Mechanism Reference Architecture Layer 2 Aggregation

- vertraulich / confidential IETF Meeting BoF Layer 2 Control Haag,Thomas, ENPS PCT15th Seite 6, 22nd of March 2006 Layer 2 Control Mechanism Problem Statement – Use Cases  Use Case Access Line Discovery (former Link Rate Discovery):  Reporting the characteristics of the access links of an access device to a device that uses the information for e.g. queuing/scheduling purposes;  Enforcement of service parameters on selected access links including physical layer (e.g. DSL sync. rate) or network layer service parameters (e.g p scheduling configuration on the access link);  Use Case OAM  Triggering a point-to-point OAM mechanism on selected access links.  Mechanism include ATM OAM in case of ATM-Ethernet inter working and Ethernet OAM in case of E2E Ethernet network.  Use Case Multicast  Communicating multicast information between a subscriber management device and an access device in order to allow, for example, centralized policy control.  Use Case Line Configuration  Triggered by subscriber request or Policy Server request the BNG may send line configuration information to the DSLAM.

- vertraulich / confidential IETF Meeting BoF Layer 2 Control Haag,Thomas, ENPS PCT15th Seite 7, 22nd of March 2006 Layer 2 Control Mechanism Use Case 1: Access Line Discovery - Problem Statement  Running Rate Adaptive Mode on DSL the data link between CPE and service node no bandwidth guarantee because of different shaper adjustment  to prevent packet loss same shaper settings between DSL and service node needed  alternative solution beside DHCP and PPPoE intermediate agent is not applicable because of having this information only if the customer is in session. BNG

- vertraulich / confidential IETF Meeting BoF Layer 2 Control Haag,Thomas, ENPS PCT15th Seite 8, 22nd of March 2006 Layer 2 Control Mechanism Use Case 1: Access Line Discovery – The Way out  To close the gap of different non congruent bandwidth settings in the DSLAM and BNG the DSLAM must report to the service node to inform this element of the actual bandwidth to adapt it’s shaper for downstream traffic to the actual DSL line rate.  For transmitting the messages a layer 2 control communication channel between DSLAM and service node should be used

- vertraulich / confidential IETF Meeting BoF Layer 2 Control Haag,Thomas, ENPS PCT15th Seite 9, 22nd of March 2006 Layer 2 Control Mechanism (Future Work) Use Case 2: OAM – Problem Statement ADSL2plus/ATM  replacing ATM with Ethernet at the V-interface  U-interface will keep ATM for the time being  domain related management systems per access domain, regional domain and service domain - problem of “non synchronized” EMS  Inter working between ATM and Ethernet to preserve existing operational functionality is essential  End to end OAM visibility on L2 between BNG and CPE within layer 2 for addressing customer connection (default ID) BNG

- vertraulich / confidential IETF Meeting BoF Layer 2 Control Haag,Thomas, ENPS PCT15th Seite 10, 22nd of March 2006 Layer 2 Control Mechanism (Future Work) Use Case 2: OAM – The Way Out  A solution for inter working between ATM based technologies at the U- interface and Ethernet based aggregation network needs to be worked out  The solution must be applicable to ADSL2plus, and VDSL2  BNG triggers DSLAM for OAM operation using Layer 2 Control Mechanism

- vertraulich / confidential IETF Meeting BoF Layer 2 Control Haag,Thomas, ENPS PCT15th Seite 11, 22nd of March 2006 Layer 2 Control Mechanism (Future Work) Use Case 3:Multicast - Problem Statement  Multicast services getting increasingly important  IPTV services, resource efficient, moving to Ethernet  ATM architecture: “transactional multicast”  older DSL Forum work (PD-021)  avoid IGMP processing in access/aggregation nodes  Ethernet architecture: IGMP snooping / IGMP proxy  Ethernet access/aggregation nodes control multicast content replication  draft-ietf-magma-snoop-12.txt, draft-ietf-magma-igmp-proxy-06.txt  DSL Forum TR-101 (e.g. VLAN L2Control per DSLAM, no PPPoE) Internet Data BNG IGMP (1:1 VLAN per subscriber, Internet/Traffic PPPoE) N:1 Multicast VLAN (all channels; data+IGMP) IGMP/IP Multicast Replication DSLAM per Subscriber Control Channel

- vertraulich / confidential IETF Meeting BoF Layer 2 Control Haag,Thomas, ENPS PCT15th Seite 12, 22nd of March 2006 Layer 2 Control Mechanism (Future Work) Use Case 3: Multicast – The Way Out  For running multicast it may be useful to communicate multicast related information between BNG and an Access Node to allow e.g. centralized policy control  Installing/removing per-user multicast access rights (“user entitlement”) on selected access ports on an Access Node  Synchronization between the IGMP router in the BNG and the IGMP snooper/proxy in the Access Node (e.g. for accounting purposes)

- vertraulich / confidential IETF Meeting BoF Layer 2 Control Haag,Thomas, ENPS PCT15th Seite 13, 22nd of March 2006 Layer 2 Control Mechanism (Future Work) Use Case 4: Line Configuration - Problem Statement  The Access Node is not session and/or user aware  Statically configured service/subscriber DSL parameter require reconfiguration by operator implying b2b transaction between ISP and Access Provider  This system does not enable an automated operation/delivery process BNG

- vertraulich / confidential IETF Meeting BoF Layer 2 Control Haag,Thomas, ENPS PCT15th Seite 14, 22nd of March 2006 Layer 2 Control Mechanism (Future Work) Use Case 4: Line Configuration – The Way Out  Triggered by subscriber request the BNG may send line configuration information to the DSLAM using Report messages.  The BNG should get such line configuration data from a policy server (e.g. RADIUS).  The BNG may update the line configuration due to a subscriber service level change (e.g. triggered by the policy server).

- vertraulich / confidential IETF Meeting BoF Layer 2 Control Haag,Thomas, ENPS PCT15th Seite 15, 22nd of March 2006 Target Plug fest November 2005 :  multi-vendor inter-operable implementations of Use Case Link Rate Discovery are based on "Layer2 control protocol extensions to GSMP" outlined in draft-wadhwa-gsmp-l2control-configuration- 00.txt Upcoming Plugfest for Use Case OAM Line Configuration and Multicast:  Verification of Use Case:  OAM  Multicast  Line Configuration  Appreciate to continue future work based on frame work using an IETF standardized communication protocol Layer 2 Control Mechanism Best Practice - Plugfest & Interop Testing

- vertraulich / confidential IETF Meeting BoF Layer 2 Control Haag,Thomas, ENPS PCT15th Seite 16, 22nd of March 2006 “shutdown” sequence allowing graceful shut down Protocol Requirements “keep-alive” mechanism to auto detect loss of connectivity “request/response” transaction-oriented model. If the response is negative, state of the Access Node must be unchanged. “report” model for the Access Node to spontaneously communicate to the BNG changes of states the protocol should be mapped on top of the IP network layer (possibly via a transport layer). allowing to convey long messages “boot” sequence for control capabilities (common subset) between two peers Layer 2 Control Mechanism Protocol Requirements