(ed) Peter Ashwood-Smith

Slides:



Advertisements
Similar presentations
1/13/2009January Interim New Orleans aq Shortest Path Bridging Recap Don Fedyk János Farkas
Advertisements

Nov 2009IEEE 802.1aq Atlanta IEEE 802.1aq Shortest Path Bridging Equal Cost Tree (ECT) Framework Proposal Peter Ashwood-Smith incorporating graphics by:
IEEE 802.1aq control of the Mac-in-Mac Hash/TTL B-VID(s) Jan 2011 Peter Ashwood-Smith
Shortest Path Bridging IEEE 802
Overlay Transport Virtualization (OTV)
CCNA3 v3 Module 7 v3 CCNA 3 Module 7 JEOPARDY K. Martin.
Communication Networks Recitation 3 Bridges & Spanning trees.
IPv6 Routing IPv6 Workshop Manchester September 2013
Introduction into VXLAN Russian IPv6 day June 6 th, 2012 Frank Laforsch Systems Engineer, EMEA
IETF 73 November aq Shortest Path Bridging Overview for IETF Don Fedyk Editor 802.1aq.
802.1aq and 802.1Qbp Support over EVPN draft-allan-l2vpn-spb-evpn-00 Dave Allan, Jeff Tantsura, Don Fedyk, Ali Sajassi.
IS-IS Extensions to support OTV Hasmit Grover Ayan Banerjee Dhananjaya Rao.
MULTICASTING Network Security.
1 Multipoint Ethernet Connection Protection
VPLS Extensions for Provider Backbone Bridging - draft-balus-l2vpn-vpls-802.1ah-01.txt John Hoffmans – KPN Geraldine Calvignac - France Telecom Raymond.
NETWORK LAYER (2) T.Najah AlSubaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
IETF68 CCAMP1 GMPLS Control of Ethernet Forwarding Don Fedyk Loa Andersson
1 Computer Networks IP Multicast. 2 Recall Unicast Broadcast Multicast sends to a specific group.
Lecture Week 10 Link-State Routing Protocols. Objectives Describe the basic features & concepts of link-state routing protocols. List the benefits and.
TRansparent Interconnection of Lots of Links (TRILL) March 11 th 2010 David Bond University of New Hampshire: InterOperability.
IEEE Plenary San Francisco
CSC 600 Internetworking with TCP/IP Unit 8: IP Multicasting (Ch. 17) Dr. Cheer-Sun Yang Spring 2001.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Link-State Routing Protocols Routing Protocols and Concepts – Chapter 10.
10/13/2015© 2008 Raymond P. Jefferis IIILect 07 1 Internet Protocol.
TRILL with Multicast draft-hares-trill-mutlicast.00.txt Susan Hares.
Chapter 22 Network Layer: Delivery, Forwarding, and Routing Part 5 Multicasting protocol.
VPLS Extensions for Provider Backbone Bridging - draft-balus-l2vpn-vpls-802.1ah-02.txt John Hoffmans – Geraldine Calvignac -
©2013 Avaya Inc. All rights reservedFebruary 26-28, 2013 | Orlando, FL.
Introduction to OSPF Nishal Goburdhan. Routing and Forwarding Routing is not the same as Forwarding Routing is the building of maps Each routing protocol.
GMPLS Control of Ethernet IVL Switches draft-fedyk-gmpls-ethernet-ivl-00 GELS BOF, IETF 64 Don Fedyk, Dave Allan,
1 Kyung Hee University Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs.
Computer Networks 15-1 Chapter 15. Connecting LANs, Backbone Networks, and Virtual LANs 15.1 Connecting devices 15.2 Backbone networks 15.3 Virtual LANs.
Setup and Manage PBB-based Tunnels with PWE3 Mechanism Ping Pan (Hammerhead Systems) Shane Amante (Level 3) Nasser El-Aawar (Level 3) Chicago, IETF 69.
IS-IS An introduction to IGP routing protocols Hagai Kahana.
Module 1 Ethernet-Vlan Technology 3FL15001BBADWBZZ Edition 01
Topic 5 Spanning tree protocol
Omniran CF00 1 VLANs in relation to P802.1CF NRM Date: Authors: NameAffiliationPhone Max RiegelNokia Networks
Chapter 21 Multicast Routing
Bridges and Extended LANs
Switch 1 Switch 2 Switch 3 Blocking Forwarding ROOT BRIDGE BRIDGE’S ROOT PORT DESIGNATED PORT DESIGNATED BRIDGE.
1 Generalized EC Type 2 support EC Type 1&2 supporting bridges Maarten Vissers
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Link-State Routing Protocols Routing Protocols and Concepts – Chapter 10.
82 nd IETF Taipei1 SPB over MPLS draft-mack-crane-l2vpn-spb-o-mpls-00.txt Ben Mack-Crane Lucy Yong
The Role of Ethernet in Optical Networks Dave Allan, Sr. Advisor, CTO office Nortel
Doc.: IEEE /0598r0 Submission May 2004 Tyan-Shu Jou, et al., Janusys NetworksSlide 1 Is Spanning Tree Protocol Right for ESS Mesh? Tyan-Shu Jou,
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
+ Dynamic Routing Protocols 2 nd semester
Open Shortest Path First (OSPF)
Instructor Materials Chapter 5: Dynamic Routing
OSPF (Open Shortest Path First)
ECE 544 Protocol Design Project 2016
Routing Protocols and Concepts
Chapter 4 Data Link Layer Switching
Link-State Routing Protocols
VLANs: Virtual Local Area Networks
Migrating Your Network to Avaya Fabric Connect
Is Spanning Tree Protocol Right for ESS Mesh?
Chapter 5: Dynamic Routing
© 2002, Cisco Systems, Inc. All rights reserved.
IS-IS Reverse Metric IETF 97, Seoul
IEEE 802.1Qca Path Control and Reservation
NT2640 Unit 9 Activity 1 Handout
Module 8: Ethernet Switching
Bridges and Extended LANs
Link-State Routing Protocols
Chapter 16 Connecting LANs, Backbone Networks, and Virtual LANs
NTHU CS5421 Cloud Computing
Link-State Routing Protocols
IS-IS VPLS for Data Center Network draft-xu-l2vpn-vpls-isis-02
Is Spanning Tree Protocol Right for ESS Mesh?
Presentation transcript:

(ed) Peter Ashwood-Smith IS-IS Extensions Supporting IEEE 802.1aq Shortest Path Bridging http://www.ietf.org/internet-drafts/draft-ietf-isis-ieee-aq-00.txt David Allan (ed) Peter Ashwood-Smith Nigel Bragg (ed) Don Fedyk Paul Unbehagen] IETF 78 Maastricht / July 2010

FORWARDING ON THESE FIELDS ONLY IEEE 802.1 wishes to provide SPF/L2VPN routing to existing Ethernet ASIC based data paths 2005 2008 1998 B-VID I-TAG B-TAG B-DA B-SA DA SA Ethertype C-VID Q-TAG S-VID C-TAG S-TAG I-SID Ethernet 802.3 Provider Backbone Bridges 802.1ah 802.1ad VLAN Mac in Mac Q in Q FORWARDING ON THESE FIELDS ONLY BECAUSE …. USING THESE DATAPATHS

They are routed with distance vector style protocol(s) ( They are routed with distance vector style protocol(s) (*)STP that create trees .. not ideal at larger scales because… 2 – long way from shortest paths.. 1- Can’t use these links SOURCE A1.. A100 ROOT DEST 3 - LEARN A1..A100 on tree..

We wish to achieve this….. All links usable Shortest Paths Equal Cost x N Animation Courtesy of Guoli Yin AND …

An L2VPN (E-LAN) with 7 members Support logical connectivity (L2VPN) An L2VPN (E-LAN) with 7 members Want to have single point membership provisioning. Want automatic unicast and multicast forwarding. Want existing Ethernet OA&M to work unchanged. This causes requirements for symmetric and congruent unicast/multicast. Animation Courtesy of Guoli Yin

The set of all pruned SPF trees for a given VPN is referred to as an “active topology” for that VPN service. Active topology for VPN instance 256 with 8 members.

IS-IS is the logical choice Topology discovery Each bridge is aware of the physical topology We add a new link metric just for SPB. Service discovery VPN membership is included “ISID”. Calculations produce FIB: [DA, VID] => NextHop(s) 16 different variations (ECT-ALGORITHMs) produces different Equal cost behaviors isolate by VID.

802.1aq ISIS LSP extensions at a glance LSPID Seq Num Checksum …. ---------------------------------------------- 4455.6677.0001.00-00 0x0000007a 0xc01f ….. SOURCE 4455.6677.0001.00 HOST NAME Instance_1 NLPID SPB (0xC1) AREA ADDR 22.3344 NBR ID 4455.6677.0004.00 COST: 10 NBR ID 4455.6677.0003.00 COST: 10 SPSOURCEID 07-00-01 SPB ECT-ALGORITHM 1 ECT-VID 101 SPB ECT-ALGORITHM 0 ECT-VID 100 SPB BMAC 44-55-66-77-00-01 ECT-VID 100 SPB ISID 255T&R ECT-VID 101 SPB ISID 256T&R (1) :4 10 (2) 255 (3) :1 :3 10 256 (4) LSP fragment for node :1 with 2 peers :4 and :3 and two services 255, 256 (5)

SPB sub-TLV layout +-----+----+-----------------+--------+------+-------------+ | PDU |TLV | SUB-TLV | TYPE | TYPE | #OCCURRENCE | +-----+----+-----------------+--------+------+-------------+ IIH MT-Port-Capability 143 SPB-B-VID 5 1 SPB-Digest 6 1 LSP MT-Capability 144 SPB-Inst 1 1 SPB-I-OALG 2 >=0 SPBM-SI 3 >=0 SPBV-ADDR 4 >=0 MT-Intermediate-System 222 SPB-Metric 12 1 SPB-A-OALG 13 >=0

SPB specific Link Metric - nodal +-+-+-+-+-+-+-+-+ |Type=SPB-Metric| = 12 +-+-+-+-+-+-+-+-+ | Length | (1 byte) +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | SPB-LINK-METRIC | (3 bytes) +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Num of ports | (1 byte) +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Port Identifier | (2 bytes) +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Provides a the link metric used for min sum optimization in Disjkstra. When link metrics differ in each direction uses MAX of both. Independent of IP link metrics. Additional identifiers used for construction of a single CIST. P2P links only.

SPBM Service Identifier (VPN membership) - nodal +-+-+-+-+-+-+-+-+ |Type = SPBM-SI | = 3 +-+-+-+-+-+-+-+-+ | Length | (1 byte) +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | B-MAC ADDRESS | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | B-MAC ADDRESS (6 bytes) | Res. | Base-VID (12 bits) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |T|R| Reserved | ISID #1 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |T|R| Reserved | ISID #2 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |T|R| Reserved | ISID #n | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ The work-horse sub-TLV Indicate that a particular node hosts members of a VPN (ISID). Indicates properties (Transmit/Receive) of that member Allows additional addresses B-MACs for multi homing etc.

SPB Instance Identifier - nodal +-+-+-+-+-+-+-+-+ |Type = SPB-Inst| = 1 +-+-+-+-+-+-+-+-+ | Length | (1 byte) +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | CIST Root Identifier (4 bytes) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | CIST Root Identifier (cont) (4 bytes) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | CIST External ROOT Path Cost (4 bytes) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Bridge Priority | (2 bytes) +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |R R R R R R R R R R R|V| SPSOURCEID | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Num of Trees | (1 bytes) +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | VLAN-ID (1) Tuples (8 bytes) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | VLAN-ID (N) Tuples (8 bytes) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ A nodes properties – described to all other nodes. VIDs in use, what algorithms associated with VID Data path modes etc.

Hello Extensions IIH +-+-+-+-+-+-+-+-+ |Type=SPB-Digest| = 6 +-+-+-+-+-+-+-+-+ | Length | (1 byte) +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | MCID (50 Bytes) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Aux MCID (50 Bytes) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Agreement Digest (32 Bytes) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |RES | A | D| +-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+ |Type= SPB-B-VID| = 5 +-+-+-+-+-+-+-+-+ | Length | (1 byte) +-+-+-+-+-+-+-+-+-------------------------------+ | ECT - VID Tuple (1) (6 bytes) | +-----------------------------------------------+ | ......................... | +-----------------------------------------------+ | ECT - VID Tuples (N) (6 bytes) | +-----------------------------------------------+