1 IJsbrand Wijnands (ED) Cisco Eric Rosen (ED) Juniper Andrew DolganowAlcatel-Lucent Tony PrzygiendaEricsson Sam AldrinHuawei.

Slides:



Advertisements
Similar presentations
Identifying MPLS Applications
Advertisements

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v MPLS VPN Technology Introducing the MPLS VPN Routing Model.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—8-1 MPLS TE Overview Understanding MPLS TE Components.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Multicast in BGP/MPLS VPNs draft-ietf-l3vpn-2547bis-mcast-00.txt.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 6: Multiarea OSPF Scaling Networks.
© 2010 Cisco and/or its affiliates. All rights reserved. 1 Segment Routing Clarence Filsfils – Distinguished Engineer Christian Martin –
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—2-1 Label Assignment and Distribution Introducing Typical Label Distribution in Frame-Mode MPLS.
CS4550 Computer Networks II IP : internet protocol, part 3 : routing policies, IPv6.
BIER WG2015-Mar-251 Update on BIER Architecture and BIER MPLS Encapsulation A few changes and additions since early revisions of the drafts Some issues.
BGP Extensions for BIER draft-xu-idr-bier-extensions-01 Xiaohu Xu (Huawei) Mach Chen (Huawei) Keyur Patel (Cisco) IJsbrand Wijnands (Cisco)
Draft-psenak-ospf-bier-extensions-02.txt IETF 88, November 3-8, 2013 P. Psenak, N. Kumar, IJ. Wijnands – Cisco Systems J. Zhang – Juniper Networks A. Dolganow.
CS Summer 2003 Lecture 14. CS Summer 2003 MPLS VPN Architecture MPLS VPN is a collection of sites interconnected over MPLS core network. MPLS.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 4: Frame Mode MPLS Implementation.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 4: Frame Mode MPLS Implementation.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 4: Frame Mode MPLS Implementation.
Bit Indexed Explicit Replication BIER
Multicast VPN using BIER IETF 91, Honolulu ietf
MPLS L3 and L2 VPNs Virtual Private Network –Connect sites of a customer over a public infrastructure Requires: –Isolation of traffic Terminology –PE,
Announcements List Lab is still under construction Next session we will have paper discussion, assign papers,
A Study of MPLS Department of Computing Science & Engineering DE MONTFORT UNIVERSITY, LEICESTER, U.K. By PARMINDER SINGH KANG
1 LAN switching and Bridges Relates to Lab 6. Covers interconnection devices (at different layers) and the difference between LAN switching (bridging)
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—1-1 MPLS Concepts Introducing Basic MPLS Concepts.
Network Layer (3). Node lookup in p2p networks Section in the textbook. In a p2p network, each node may provide some kind of service for other.
1 11-Sep-15 S Ward Abingdon and Witney College Link State CCNA Exploration Semester 2 Chapter 10.
Lecture Week 10 Link-State Routing Protocols. Objectives Describe the basic features & concepts of link-state routing protocols. List the benefits and.
1 Routing Protocols. 2 Distributed Routing Protocols Rtrs exchange control info Use it to calculate forwarding table Two basic types –distance vector.
Collected By: Mehdi Daneshvar Supervisor: E.M.Kosari.
Network Layer introduction 4.2 virtual circuit and datagram networks 4.3 what’s inside a router 4.4 IP: Internet Protocol  datagram format  IPv4.
IGP Multicast Architecture Lucy Yong, Weiguo Hao, Donald Eastlake Andrew Qu, Jon Hudson, Uma Chunduri November 2014 Honolulu USA draft-yong-rtgwg-igp-mutlicast-arch-00.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Link-State Routing Protocols Routing Protocols and Concepts – Chapter 10.
Interior Gateway Protocol. Introduction An IGP (Interior Gateway Protocol) is a protocol for exchanging routing information between gateways (hosts with.
IGP Multicast Architecture Lucy Yong, Weiguo Hao, Donald Eastlake Andrew Qu, Jon Hudson, Uma Chunduri November 2014 Honolulu USA draft-yong-rtgwg-igp-mutlicast-arch-00.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 2 Single-Area OSPF.
© J. Liebeherr, All rights reserved 1 Multicast Routing.
Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Understanding and troubleshooting of Nat address Translation( NAT) and IP.
CCNA 2 Week 6 Routing Protocols. Copyright © 2005 University of Bolton Topics Static Routing Dynamic Routing Routing Protocols Overview.
MPLS VPNs by Richard Bannister. The Topology The next two slides display both the physical and logical topology of our simple example network –Please.
MPLS Concepts Introducing Basic MPLS Concepts. Outline Overview What Are the Foundations of Traditional IP Routing? Basic MPLS Features Benefits of MPLS.
W&L Page 1 CCNA CCNA Training 3.4 Describe the technological requirements for running IPv6 in conjunction with IPv4 Jose Luis Flores /
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—6-1 Scaling Service Provider Networks Scaling IGP and BGP in Service Provider Networks.
Routing Protocols Brandon Wagner.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 Module 10 Routing Fundamentals and Subnets.
Describe basic routing concepts. Routers Interconnect Networks Router is responsible for forwarding packets from network to network, from the original.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Link-State Routing Protocols Routing Protocols and Concepts – Chapter 10.
© 2015 Cisco and/or its affiliates. All rights reserved. Public 1 Toerless Eckert, IJsbrand Wijnands,
BIER Bit Indexed Explicit Replication MBONED, IETF 92 Greg Shepherd.
Multi-protocol Label Switching
Connecting IPv4 Islands over IPv6 MPLS Using IPv4 Provider Edge Routers(4PE) Zhenqiang Li China Mobile.
BIER Use Case in VXLAN draft-wang-bier-vxlan-use-case-00 Linda Wang (Presenting) Sandy. Zhang & F. Hu.
Multi Node Label Routing – A layer 2.5 routing protocol
(How the routers’ tables are filled in)
Multicast VPN using BIER
Routing Protocols and Concepts
Link-State Routing Protocols
draft-wijnands-mpls-mldp-vpn-in-band-signaling-00
(How the routers’ tables are filled in)
Debashish Purkayastha, Dirk Trossen, Akbar Rahman
Link-State Routing Protocols
Dynamic Routing and OSPF
BIER PIM SIGNALLING Hooman Bidgoli, Jayant Kotalwar, Andrew Dolganow (Nokia) Fengman Xu (Verizon) IJsbrand Wijnands, Mankamana Mishra (Cisco) Zhaohui.
Routing Protocols Charles Warren.
BIER PIM Signaling Draft-hfa-bier-pim-tunneling-00 IETF 99
Link-State Routing Protocols
IS-IS VPLS for Data Center Network draft-xu-l2vpn-vpls-isis-02
draft-ietf-bier-ipv6-requirements-01
Inter-domain Multicast using BIERv6
BIER P2MP mLDP Signaling
MLDP Signaling over BIER
BIER Prefix Redistribute draft-zwzw-bier-prefix-redistribute-00
Presentation transcript:

1 IJsbrand Wijnands (ED) Cisco Eric Rosen (ED) Juniper Andrew DolganowAlcatel-Lucent Tony PrzygiendaEricsson Sam AldrinHuawei

2

IETF 91 - Honolulu, Hawaii, November 9-14, BitString BIER Domain LSA 1 - A/32 LSA 5 – E/32 LSA 4 – D/32 LSA 3 – C/32 LSA 2 – B/32 1. Assign a unique Bit Position from a BitString to each BFER in the BIER domain. 2. Each BFER floods their Bit Position to BFR-prefix mapping using the IGP (OSPF, ISIS) B/32 A/32 C/32 D/32 E/

IETF 91 - Honolulu, Hawaii, November 9-14, BIER Domain 1. Assign a unique Bit Position from a mask to each edge router in the BIER domain. 2. Each edge router floods their bit-position-to-ID mapping with a new LSA – OSPF or ISIS 3. All BFR’s use unicast RIB to calculate a best path for each BFR-prefix BitMaskNbr 0011A 0100B 1000C 4. Bit Positions are OR’d together to form a Bit Mask per BFR-nbr 5. Packets are forwarded and replicated hop-by-hop using the Bit Forwarding Table..

IETF 91 - Honolulu, Hawaii, November 9-14, C AB D F E Overlay session 0001 F-BMNbr 0111B F-BMNbr 0011C 0100E F-BMNbr 0001D 0010F 0001 AND &0011&0111 &0001 F-BMNbr 0011C B

IETF 91 - Honolulu, Hawaii, November 9-14, C AB D F E Overlay session F-BMNbr 0111B F-BMNbr 0011C 0100E F-BMNbr 0001D 0010F AND 0100 AND &0011&0111 &0001 &0100 F-BMNbr 0011C B AND

IETF 91 - Honolulu, Hawaii, November 9-14, C AB D F E F-BMNbr 0111B F-BMNbr 0011C 0100E F-BMNbr 0001D 0010F AND AND F-BMNbr 0011C B &0011&0111 &0001 &0100&0010 AND Overlay session

IETF 91 - Honolulu, Hawaii, November 9-14, As you can see from the previous slides, the result from the bitwise AND (&) between the Bit Mask in the packet and the Forwarding table is copied in the packet for each neighbor. This is the key mechanism to prevent duplication. Look at the next slide to see what happens if the bits are not reset If the previous bits would not have been reset, E would forward the packet to C and vice versa.

IETF 91 - Honolulu, Hawaii, November 9-14, C AB D F E F-BMNbr 0111B F-BMNbr 0011C 0100E F-BMNbr 0001D 0010F 0111 AND AND F-BMNbr 0011C B &0011&0111 &0100 AND Overlay session 0111

10

IETF 91 - Honolulu, Hawaii, November 9-14, To increase the scale we group the egress routers in Sets. Each Bit Position is unique in the context of a give Set The packet carries the Set ID. I A GB 1:0001 C D E F H 1:0010 1:0100 2:0001 2:0010 2:0100 Set 1 Set 2 1:0111 2:0111 SetF-BMNbr 10111I 2 I Note, Bit Positions 1,2,3 appear in both Sets, jet do not overlap due to Sets. Note, we create different forwarding entries for each Set J 1:0111 2:0111

IETF 91 - Honolulu, Hawaii, November 9-14, There is no topological restriction which set an egress belongs to But it may be more efficient if it follows the topology I A GB 1:0001 C D E F H 1:0010 2:0001 1:0100 2:0010 2:0100 Set 1 Set 2 1:0111 2:0111 Note, we create different forwarding entries for each Set J Set 2 Set 1 SetBMNbr 10111I 2 I 2:0001 1:0100 1:0011 2:0110

IETF 91 - Honolulu, Hawaii, November 9-14, If a multicast flow has multiple receivers in different Sets, the packet needs to be replicated multiple times by the ingress router, for each set once. The Set identifier is part of the packet. Can be implemented as MPLS label.

IETF 91 - Honolulu, Hawaii, November 9-14, A bit Mask only needs to be unique in its own area. ABR’s translate Bit Masks between area’s. Requires a IP lookup and state on the ABRs. B AABR F-BMNbr 0:10ABR {0:01}{0:10} {0:01} F-BMNbr 0:01A F-BMNbr 0:01B F-BMNbr 0:10ABR Area 1Area 2

15

IETF 91 - Honolulu, Hawaii, November 9-14, When a packet is received with a BitString, the F-BM needs to be matched against each Neighbor in the topology table to determine which neighbor to replicate the packet to. If the router has many neighbors, this may be a long walk for each packet. In order to prevent this walk, we have the following optimization. Bit Index Routing Table 54321Nbr 11A 1B 1C 1D

IETF 91 - Honolulu, Hawaii, November 9-14, We translate the Bit Index Routing Table in to a Bit Index Forwarding Table by sorting the table on Bit Position (and not by neighbor). We walk the BitString in the packet and index into the BIFT. Bit Index Routing Table 54321Nbr 1A 1B 1C 11D Bit Index Forwarding Table 54321Nbr D A B C D

IETF 91 - Honolulu, Hawaii, November 9-14, Bit Index Forwarding Table 54321Nbr D A B C D We walk the Bits in the packet, as soon as we hit a ‘1’, we copy the packet, index into the BIFT with the position of the Bit. The BitMask entry is reverse ‘&’ with the BitString in the packet. This resets the Bits that where processed Packet IN 1 Walk Bit Mask Packet OUT = & Copy &

IETF 91 - Honolulu, Hawaii, November 9-14, Bit Index Forwarding Table 54321Nbr D A B C D Packet IN Packet OUT 5432 Walk Bit Mask = Copy & = Packet OUT & Copy We walk the Bits in the packet, as soon as we hit a ‘1’, we copy the packet, index into the BIFT with the position of the Bit. The Bit Mask entry is reverse ‘&’ with the BitString in the packet. This resets the Bits that where processed & 11011

IETF 91 - Honolulu, Hawaii, November 9-14, Walking the bits in a BitString takes less clock cycles compared to walking a list of neighbors. For that reason its faster to walk the BitString and index into BIFR The table is a NxN bit matrix, where N is the maximum BitString length. Bits that where already processed are reset so we don’t processes them if they appears later in a Bit Mask. This way we avoid multiple copies being forwarded.

21

IETF 91 - Honolulu, Hawaii, November 9-14, A BFER is uniquely identified by a two tuple {Set ID, Bit Position} The Bit Position range is depending on the length of the support BitString in the network. To make the BFER identifier independent of the BitString length we defined the BFR-id as a number [1,65535] We map the BFR-id Number into a {SI, BP}, based on the BitStringLength N = 10 BitStringLen = 4 Bit Position=2SI= N = 10 BitStringLen = 5 Bit Position=5 SI=1 SI = (N-1)/BitStringLength BP = ((N-1) modulo BitStringLength)+1

IETF 91 - Honolulu, Hawaii, November 9-14, The architecture document is independent of the encapsulation that is used to store the BitString in the packet. Different encapsulations are possible. Before we start to engage in an other round of discussions regarding the encapsulation preference, lets analyze the use- cases and the requirements more. It is too early to debate a ‘generic’ encoding.

24

IETF 91 - Honolulu, Hawaii, November 9-14, Packets forwarded via BIER follow the unicast path towards the receiver, inheriting unicast features like FRR and LFA. There is no per multicast flow state in the network. Multicast convergence is as fast as unicast, there is no multicast state to re-converge, signal, etc. Nice plugin for SDN, its only the ingress and egress that need to exchange Sender and Receiver information. The core network provides many-2-many connectivity between all BIER routers by default, following the IGP. No Multicast control protocol in the network.

IETF 91 - Honolulu, Hawaii, November 9-14, The Bit String Length has an upper bound and may not cover all deployment scenarios. Using sets to increase the number of egress routers may cause the ingress to replicate the packet multiple times. Existing HW is not optimized for BIER forwarding

IETF 91 - Honolulu, Hawaii, November 9-14,