802.17c Protected Inter-Ring Connection Rafi Ram - Corrigent Systems January 2007.

Slides:



Advertisements
Similar presentations
Effective Cooperative Channel Sensing for CR Ad Hoc Networks Wireless Network Lab. Copyright Wireless Networks Lab. CSE. SNU. All rights reserved.
Advertisements

CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 19 Introduction to Computer Networks.
Switching & Operations. Address learning Forward/filter decision Loop avoidance Three Switch Functions.
Cisco 3 - Switch Perrine. J Page 15/8/2015 Chapter 8 What happens to the member ports of a VLAN when the VLAN is deleted? 1.They become inactive. 2.They.
802.17c Protected Inter-Ring Connection Rafi Ram - Corrigent Systems March 2007.
“Internetworking” Bridges –Transparent bridges –Source Routing - Transparent Bridges Routers (Network Layer) Brouters
Internetworking Different networks –Different bit rates –Frame lengths –Protocols.
1 I.S Introduction to Telecommunication in Business Chapter 6 Network Hardware Components Dr. Jan Clark FALL, 2002.
Dec 14, 2006CS573: Network Protocols and Standards1 LAN Addressing Network Protocols and Standards Autumn
Oct 21, 2004CS573: Network Protocols and Standards1 IP: Addressing, ARP, Routing Network Protocols and Standards Autumn
CS335 Networking & Network Administration Tuesday, May 11, 2010.
The Laboratory of Computer Communication and Networking SRP Simulation Over Ethernet.
1 K. Salah Module 4.0: Network Components Repeater Hub NIC Bridges Switches Routers VLANs.
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
A Routing Vector Method (RVM) for Routing Bluetooth Scatternets Pravin Bhagwat IBM.Thomas J. Watson Research Center,Yorktown Heights,NY.
© 2002, Cisco Systems, Inc. All rights reserved..
1 K. Salah Module 4.3: Repeaters, Bridges, & Switches Repeater Hub NIC Bridges Switches VLANs GbE.
1 25\10\2010 Unit-V Connecting LANs Unit – 5 Connecting DevicesConnecting Devices Backbone NetworksBackbone Networks Virtual LANsVirtual LANs.
Connecting LANs, Backbone Networks, and Virtual LANs
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 9 TCP/IP Protocol Suite and IP Addressing.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-1 Configuring Catalyst Switch Operations Introducing Basic Layer 2 Switching and Bridging Functions.
1 Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
Chapter 4: Managing LAN Traffic
CCNA 1 v3.0 Module 9 TCP/IP Protocol Suite and IP Addressing
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 7 Spanning-Tree Protocol Cisco Networking Academy.
Lecture 9: Ethernet and Token Ring Networks
CS3502: Data and Computer Networks Local Area Networks - 4 Bridges / LAN internetworks.
The Computer Communication Lab (236340) Winter Resilient Packet Ring GUI Simulator Developed By: Anton Spirkov Slava
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
Chapter 8: Virtual LAN (VLAN)
Oct 21, 2014CS524: Advanced Computer Networks1 LAN Addressing Advanced Computer Networks.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
Jaringan Komputer Dasar Data Link Layer (2) Aurelio Rahmadian.
OSI Model. Switches point to point bridges two types store & forward = entire frame received the decision made, and can handle frames with errors cut-through.
1 CSCD 433 Network Programming Fall 2011 Lecture 5 VLAN's.
DSR: Introduction Reference: D. B. Johnson, D. A. Maltz, Y.-C. Hu, and J. G. Jetcheva, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks,”
Chapter 9 Hardware Address & Frame Type Identification Hardware address of frame Addressing schemes Ethernet Frame header format.
1 CS4550: Computer Networks II Review Data Link Layer.
Chapter 9 Hardware Addressing and Frame Type Identification 1.Delivering and sending packets 2.Hardware addressing: specifying a destination 3. Broadcasting.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 9 Virtual Trunking Protocol.
CCNA 1 v3.0 Module 9 TCP/IP Protocol Suite and IP Addressing
STORE AND FORWARD & CUT THROUGH FORWARD Switches can use different forwarding techniques— two of these are store-and-forward switching and cut-through.
LAN Switching Concepts. Overview Ethernet networks used to be built using repeaters. When the performance of these networks began to suffer because too.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 7 Spanning Tree Protocol.
M. Veeraraghavan (originals by J. Liebeherr) 1 Need for Routing in Ethernet switched networks What do bridges do if some LANs are reachable only in multiple.
ICS 156: Networking Lab Magda El Zarki Professor, ICS UC, Irvine.
Submission doc.: IEEE 11-13/ ak-r1 July 2013 Norman Finn, Cisco SystemsSlide 1 Comparison of Receiver Subset Techniques Date: Authors:
Yan Wang Proposed amendments of control frames for c Yan Wang Huawei technologies.
CS3502: Data and Computer Networks Loca Area Networks - 3 Adaptive Tree Walk Token Ring LAN : IEEE slotted rings FDDI.
Computer Communication and Networking Lecture # 4 by Zainab Malik 1.
802.17c Protected Inter-Ring Connection Rafi Ram - Corrigent Systems March 2008.
TCP/IP Protocol Suite and IP Addressing Presented By : Dupien AMS.
Address Resolution Protocol Yasir Jan 20 th March 2008 Future Internet.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:
802.17c Protected Inter-Ring Connection Rafi Ram - Corrigent Systems May 2007.
IP: Addressing, ARP, Routing
Virtual Local Area Networks or VLANs
Link Layer 5.1 Introduction and services
Instructor Materials Chapter 5: Ethernet
Some aspects to be determined in PIRC July
Scaling the Network: The Internet Protocol
CS4470 Computer Networking Protocols
802.17c Protected Inter-Ring Connection
LAN Vulnerabilities.
The Load Balancing Schemes Observations
ARP: Address Resolution Protocol
Virtual LANs.
Chapter 13. LAN Technology
Scaling the Network: The Internet Protocol
Presentation transcript:

802.17c Protected Inter-Ring Connection Rafi Ram - Corrigent Systems January 2007

2 PGM State Machine ICF = Inter-Connect Functionality

3 Frame Filtering A protection group member station shall transmits and receives data frames through the ring interconnection according to its state : –State “Mate Down” : forward all frames –State “Both Active” : forward frames with even or odd hash result (depending if it is the “0” or “1” member) –Otherwise (“Self Down” or “Hold-Off”), do not forward any frame

4 Transmission of OAM_SAS_Notify A protection group member shall transmit a selective OAM_SAS_Notify frame when : –Its local interconnect functionality changes state from up to down –Its state changes from “Mate Down” (to “Both Active” or “Self Down”) Note : According to b, after a topology change (e.g. station “down”), each station performs selective MAC table flush

5 Transmission of PGM Status Messages Every protection group member periodically broadcasts a PGM status message In addition, a protection group member shall also generate a message when its state changes from or to “Self Down” state

6 Hold-Off State The purpose of the Hold-Off state is guarantee that there shall be no loops when an interconnection functionality is restored The time period of the Hold-Off timer shall be set according to the worst case transit delay through the ring

7 Removing a PG Member Provisioning When an active PG membership provisioning is removed, the station must transmit a PGM status message with “down” state, so the mate would know it no longer should expect PGM status messages

8 Detection of Miss-Configuration When a protection group member receives a PGM message with the same “0”/”1” provisioning as itself, it could assert an appropriate “miss-configuration” alarm

9 Removing the Need for the “0”/”1” Provisioning A station can detect if it is the “0” or “1” member according to the RPR MAC address If its RPR MAC address is lower than its mate it is the “0” member, otherwise the “1” member This removes a potential miss-configuration of the “0”/”1” provisioning A conflict may arise if PG are provisioned on both sides (rings) of the interconnect, and a certain station is “0” on one ring but “1” on the other

10 Hashing based on MAC Address Performing the hash function on the users MAC address might be problematic: –Loss of connectivity : ARP packets might be forwarded though a different interconnect station then the unicast traffic that will follow the ARP –Persistent flooding : A specific flow might be forwarded though different interconnect stations in each direction (A-to-Z and Z-to-A)

11 Enhancement for MAC Table Scalability Suggested enhancement main concept : –Allow the interconnecting stations to do forwarding based on the RPR MAC addresses and not the users MAC addresses –The size of the MAC table is proportional to the total number of stations in the interconnected nodes and not the total number of users The suggested enhancement resemble the concept of MAC-in-MAC

12 MAC Table Scalability Suggestion Details Each station on a ring is assigned with a unique index (SI), a number in the range 1 to 255 A station’s SI value does not change if other stations are added or removed from the ring A frame which is forwarded between inter- connected rings is tagged with ICT (inter-connect tags) The inter-connect tag consists the destination interconnect SI and the source interconnect SI A bit in the extendedControl indicates if the frame is tagged (similar to the “ef” bit)

13 Data Frame Format with ICT

14 Assignment of RPR DA/SA and ICT for Interconnect flows The RPR DA is the MAC address of the destination (off-ring) station The RPR SA is the MAC address of the source (off-ring) station The destSI is the SI of the station that should do the interconnect. A value of “0” indicates that it is not known if interconnection is required The srcSI is the SI of the station that did the interconnect. A value of “0” indicates that frame did not originate from interconnect station

15 MAC Table Learning The interconnect stations learn only the RPR MAC address of the frames they forward The stations connected to the users learn the users MAC addresses and their association to RPR MAC addresses and indication if the RPR stations are on the local ring or through interconnect station

16 Interconnection Frame Forwarding A station receiving a frame with its SI in the destSI (in the ICT) shall forward the frame through the interconnection

17 Flooding ABCDEFG HIJKM a m MCAma Ama ARPR APGI=201 aASI(I) MCAma 0SI(I)

18 Unicast Forwarding ABCDEFG HIJKM a m AMam am AMam ARPR MPGI=101 APGI=201 MRPR mMSI(C) SI(I) AM SI(C) aASI(I) 0 0