Submission doc.: IEEE 11-13/0253-00ak-r0 March 2013 Norman Finn, Cisco SystemsSlide 1 Changes to 802.1Q required by 802.1Qbz Date: 2013-03-05 Authors:

Slides:



Advertisements
Similar presentations
Overview of the SDE Protocol Presented by Ken Alonge Chair,
Advertisements

802.1H Kevin Nolish Michael Wright H Project The reason for the update of 802.1H is, primarily, mandated reaffirmation of the standard. As part.
802.1H Revision Project Kevin Nolish Michael Wright.
Doc.: IEEE /1191r5 Submission November 2004 Mike Moreton, STMicroelectronicsSlide 1 AP Architecture Thoughts Mike Moreton, STMicroelectronics.
Submission doc.: IEEE 11-13/ ak July 2013 Finn and Hart, Cisco SystemsSlide 1 P802.1Qbz + P802.11ak Proposed Division of Work Date:
Cisco Confidential 1 bz-nfinn-soln-station-subset-0113-v02.pdf Solutions for P802.1Qbz / P802.11ak: Station subset issue Norman Finn January, 2013 Version.
Doc.: IEEE /1123r0 Submission September 2010 Zhu/Kim et al 1 Date: Authors: [TXOP Sharing for DL MU-MIMO Support]
1 Internet Protocol Version 6 (IPv6) What the caterpillar calls the end of the world, nature calls a butterfly. - Anonymous.
Submission doc.: IEEE 11-13/0938r1 August 2013 Norman Finn, Cisco SystemsSlide 1 Service mapping between the ISS and Date: Authors:
Bridging. Bridge Functions To extend size of LANs either geographically or in terms number of users. − Protocols that include collisions can be performed.
OSI Model.
Jan 10, 2008CS573: Network Protocols and Standards1 Virtual LANs Network Protocols and Standards Winter
Submission doc.: IEEE 11-12/ ak December 2012 Norman Finn, Cisco SystemsSlide 1 Problem list for P802.1Qbz / P802.11ak point-to-point model Date:
Submission doc.: IEEE 11/ ak Jan 2013 Norman Finn, Cisco SystemsSlide Qbz–802.11ak Solutions: Station Subsetting Issue Date:
Layer 2 Switch  Layer 2 Switching is hardware based.  Uses the host's Media Access Control (MAC) address.  Uses Application Specific Integrated Circuits.
Submission doc.: IEEE 11-10/0745r2 May 2010 Matthew Fischer, BroadcomSlide 1 MFQ MMPDU MAC Sequence Numbering Date: Authors:
Doc.: IEEE 11-14/0562r4 November 2014 SubmissionSlide 1Norman Finn, Cisco Systems, Mark Hamilton, Spectralink ak and 802.1AC Convergence Function.
Submission doc.: IEEE 11-13/ ak May 2013 Norman Finn, Cisco SystemsSlide 1 P802.1Qbz + P802.11ak Proposed Division of Work Date: Authors:
Month Year doc.: IEEE yy/0221r2 Mar 2013
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
Section 4 : The OSI Network Layer CSIS 479R Fall 1999 “Network +” George D. Hickman, CNI, CNE.
Doc.: IEEE /0981r1 TGs Reference Architecture Considerations September 6, 2004 Tricci So & W. Steven Conner.Slide 1 TGs ESS Mesh System Reference.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 16.
10/8/2015CST Computer Networks1 IP Routing CST 415.
Lecture 3 Overview. Protocol An agreed upon convention for communication both endpoints need to understand the protocol. Protocols must be formally defined.
Submission doc.: IEEE 11-13/ ak May 2013 Norman Finn, Cisco SystemsSlide 1 P802.1Qbz + P802.11ak Proposed Division of Work Date: Authors:
Doc.: mes Submission 7 May 2004 Tricci SoSlide 1 Need Clarification on The Definition of ESS Mesh Prepared by Tricci So.
Submission doc.: IEEE 11/ ak Jan 2013 Norman Finn, Cisco SystemsSlide Qbz–802.11ak Solutions: Architecture Issue Date: Authors:
Cisco 3 - Switching Perrine. J Page 16/4/2016 Chapter 4 Switches The performance of shared-medium Ethernet is affected by several factors: data frame broadcast.
Submission doc.: IEEE 11/ ak Jan 2013 Norman Finn, Cisco SystemsSlide Qbz–802.11ak Solutions: Tagging Date: Authors:
Submission doc.: IEEE 11-13/1453r0 November 2014 Norman Finn, Cisco SystemsSlide 1 Tag Stacking in existing links Date: Authors:
Submission doc.: IEEE 11-13/ ak May 2013 Finn and Hart, Cisco SystemsSlide 1 P802.1Qbz + P802.11ak Proposed Division of Work Date:
Doc.: IEEE /0981r0 TGs Reference Architecture Considerations August 30, 2004 Tricci So.Slide 1 TGs ESS Mesh System Reference Architecture Considerations.
Submission doc.: IEEE /0890r0 July 2012 Fei Tong, CSRSlide ah Multi-User Aggregation PDU Date: 2012-July-16 Authors:
Submission doc.: IEEE 11-13/0221r1 Mar 2013 BroadcomSlide QoS Queue Architecture and Possible 802.1bz Bridge Model Date: Authors:
Submission doc.: IEEE 11-13/ ak-r1 July 2013 Norman Finn, Cisco SystemsSlide 1 Comparison of Receiver Subset Techniques Date: Authors:
Submission doc.: IEEE 11-12/ ak January 2013 Norman Finn, Cisco SystemsSlide 1 Problem list for P802.1Qbz / P802.11ak point-to-point model Date:
Submission doc.: IEEE 11-13/0526r1 May 2013 Donald Eastlake, HuaweiSlide 1 Sub-Setting Date: Authors:
Computer Network Architecture Lecture 3: Network Connectivity Devices.
Submission doc.: IEEE 11/ ak Jan 2013 Norman Finn, Cisco SystemsSlide Qbz–802.11ak Solutions: Station Subsetting Issue Date:
Submission doc.: IEEE 11-13/ ak May 2013 Norman Finn, Cisco SystemsSlide 1 P802.1Qbz + P802.11ak Proposed Division of Work Date: Authors:
Doc.: IEEE 11-14/0562r0 May 2014 SubmissionSlide 1Norman Finn, Cisco Systems, Mark Hamilton, Spectralink ak and 802.1AC Convergence Function Date:
Submission doc.: IEEE 11-12/1162r0 September 2012 Norman Finn, Cisco SystemsSlide Q Bridge Baggy Pants Explanation Date: Authors:
Doc.: IEEE 11-14/0562r7 November 2015 SubmissionSlide 1Norman Finn, Cisco Systems, Mark Hamilton, Spectralink ak and 802.1AC Convergence Function.
The OSI Model. History of OSI Model ISO began developing the OSI model in It is widely accepted as a model for understanding network communication.
Submission doc.: IEEE 11-13/0221r0 Feb 2013 BroadcomSlide QoS Queue Architecture and Possible 802.1bz Bridge Model Date: Authors:
Doc.: IEEE /0615r0 Submission May 2008 Naveen K. Kakani, Nokia IncSlide 1 Multicast Transmission in WLAN Date: Authors:
Doc.: IEEE 11-14/0562r6 March 2015 SubmissionSlide 1Norman Finn, Cisco Systems, Mark Hamilton, Spectralink ak and 802.1AC Convergence Function Date:
OSI Model OSI MODEL. Communication Architecture Strategy for connecting host computers and other communicating equipment. Defines necessary elements for.
Introduction to Networks v6.0
Portal and 802.1AC Convergence Function
Network Architecture Layered Architectures Network Protocols
Instructor Materials Chapter 5: Ethernet
doc.: IEEE <doc#>
Sept 2004 doc.: IEEE a Nov 2004 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title:
doc.: IEEE /xxxr0 Mike Moreton
Ethernet : Framing and Addressing
Sept 2004 doc.: IEEE a Nov 2004 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title:
Resolutions to orphan comments
CID: 4551, LB84, Section 6.1.5, Figure 18 Authors: May 2006
AP Architecture Thoughts
Portal and 802.1AC Convergence Function
<January 2002> doc.: IEEE <02/139r0> March, 2008
May 2004 doc.: IEEE /629r1 May 2004 The Nature of an ESS
Section 6.1.5, Figure 18 Authors: May 2006 Date: Month Year
Submission Title: LB Resolutions from kivinen
FILS Frame Content Date: Authors: February 2008
Sept 2004 doc.: IEEE a Nov 2004 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title:
Multi-Link Architecture and Requirement Discussion
Multi-Link Architecture and Requirement Discussion
Presentation transcript:

Submission doc.: IEEE 11-13/ ak-r0 March 2013 Norman Finn, Cisco SystemsSlide 1 Changes to 802.1Q required by 802.1Qbz Date: Authors:

Submission doc.: IEEE 11-13/ ak-r0 March 2013 Norman Finn, Cisco SystemsSlide 2 Abstract This presentation lists the changes required to be made by 802.1Qbz to 802.1Q, explains some of the contents required of a new Clause 44 in 802.1Q, and elicits answers for a few questions about that effort.

Submission doc.: IEEE 11-13/ ak-r0March 2013 Significant changes

Submission doc.: IEEE 11-13/ ak-r0 (We will not list minor changes, such as adding “Access Point” to the definitions clause.) New conformance clause : Combined Access Point and VLAN Bridge. Uses 802.1AC mapping of Bridge Port to Security Association, not Portal. Reference Clause 44, it that is included in 802.1Q Frame Lifetime End stations sleep, so frame lifetime can be exceeded. Bridges are not allowed to sleep 6.7 Support of the ISS by specific MAC procedures This clause has been moved to 802.1AC. Replace with placeholder /6.9.2 Support of the EISS: See “Tagging format” slides

Submission doc.: IEEE 11-13/ ak-r0 7.5 Locating end stations non-AP stations are discovered when they attach to the AP Egress Just add a note mentioning that port ≠ Queue Set Queuing frames: see “Queue Sets” slides Queue management An station (AP or not) can retry the transmission of a frame. 9.4 Tag Protocol Identifier (TPID) formats Mention that 6.9.1/6.9.2 can alter the MSDU when adding/removing tags Deriving actual bandwidth … Mention that one frame can be replicated several times in a queue if a single Queue Set serves multiple Ports.

Submission doc.: IEEE 11-13/ ak-r0 Globally, but especially in 37 Enhanced Transmission Selection Distinguish between “Queue Set” and “Port,” and use the right term ETS algorithm Add new Clause 44: see “Clause 44” slides Annex A: PICS Update PICS with new requirements New clause G.3 Old and new LLC tag formats Discuss reason for changing the way tags are done in LLC media, and discuss the compatibility issues

Submission doc.: IEEE 11-13/ ak-r0March 2013 Tagging format

Submission doc.: IEEE 11-13/ ak-r0 At present, adding/removing a tag changes nothing about what follows the tag. That means that, on an LLC medium, a SNAP- encoded IP packet can be preceded by a SNAP-encoded VLAN tag and a SNAP-encoded CN-tag and a SNAP-encoded MACsec tag. This is silly, especially for wireless media, where bandwidth is at a premium. Suggested remedy: Change the way tags are inserted and removed on LLC media. When inserting a tag into an LLC PDU, convert PDU to Type/Length and then add LLC tag. When removing an LLC tag, convert enclosed (Type/Length) MSDU to LLC. This requires an “LLC follows” Ethertype for LLC frames > 1536 bytes. Have a special managed parameter that says, “Do the old thing on this port”, but default is “do the new thing”.

Submission doc.: IEEE 11-13/ ak-r0March 2013 Queue Sets

Submission doc.: IEEE 11-13/ ak-r0 At present, Egress says to use the vector of output ports that has been accompanying the frame to select one or more ports for output, and queue the frame in those ports’ queues. When using Link Aggregation, one may have one set of queues per Bridge Port (as the standard suggests) or one may have one set of queues per physical port (more typical). There are weasel words in 802.1Q, but queues-per-physical-port is not what 8.6 says. In an Access Point, you have one set of queues per BSS. Since one BSS can serve many stations, and there is one Bridge Port per station, an AP has many Bridge Ports per set of queues. So, we introduce the idea of Queue Sets to solve both problems.

Submission doc.: IEEE 11-13/ ak-r0 A Queue Set is a group of: One Queuing frames entities One to eight Queue management entities (and their queues) One Transmission selection entity You may have multiple Queue Sets per Bridge Port, e.g. in the case of Link Aggregation. In this case: There is something of an issue with Support of the EISS; you have to replicate this function several times, once for each Queue Set. You may have multiple Bridge Ports per Queue Set, e.g. in the case of an Access Point. In this case: The vector of output ports stays with the frame in the queue, and is used on output to select the port(s) on which the frame is transmitted. There is something of an issue with Support of the EISS; see next slide.

Submission doc.: IEEE 11-13/ ak-r0 In the case of multiple Bridge Ports per Queue Set, there is a problem with 6.9 Support of the EISS: This sublayer can generate a different VLAN tag on each port. Therefore, a single frame in an output queue can have to be transmitted multiple times, once for each VLAN tag value. A reasonable way to handle this is to say that knowledge of the differing requirements for tagging in 6.9 can result in multiple copies of a frame being placed in a queue, each with a subset of the port vector, so that all of the ports specified in a queue vector will be given the same tag. This could all be put in Clause 44, but I think that this is a common trait of Coordinated Shared Networks

Submission doc.: IEEE 11-13/ ak-r0March 2013 Clause 44

Submission doc.: IEEE 11-13/ ak-r0 The primary purpose of this clause is to reconcile the architectural model with the model. That is: For the most part, they say the same thing in two different ways. The differences are mapped to ak constructs. It is possible that this clause will not be needed, and that all we need is a reference to ak in Clause 5. It is also possible that Clause 44 shows how to make look like and ak shows how to map into The remainder of this section shows the  mapping.

Submission doc.: IEEE 11-13/ ak-r0

Submission doc.: IEEE 11-13/ ak-r0

Submission doc.: IEEE 11-13/ ak-r0 If a station can be a bridge, requires one Bridge Port per station attached to the Access Point. There is one leg of the baggy pants for each attached station, and an extra ISS for the SecY uncontrolled port. In the model, there is exactly one “port” per BSS, with its receive and transmit sides shown separately in the diagram. The selection of which Security Association to use, and thus which “bridge port” (or the broadcast SA) is based on the destination/receiver address in the frame. There is also a parameter specifying whether the frame is to be (or was) encrypted. The resolution is not difficult – we define a new kind of port, the Security Association Port.

Submission doc.: IEEE 11-13/ ak-r0 Two legs simply become one “physical” port. “Physical port” has one M- SAP. (MAC Service Access Point). Note that this M-SAP is below the “Portal” that is offered the Bridge, today. TX MSDU Rate Limiting A-MSDU Aggregation PS Defer Queuing Sequence Number Assignment MSDU Integrity and Protection Fragmentation MPDU Encryption and Integrity MPTU Header + CRC A-MPDU Aggregation RX MSDU Rate Limiting A-MSDU De-aggregation Replay Detection MSDU Integrity and Protection Defragmentation Block Ack Recording MPDU Decryption and Integrity Duplicate Removal Address 1 Address Filtering MPDU Header + CRC Validation A-MPDU De-aggregation M-SAP to “physical port”

Submission doc.: IEEE 11-13/ ak-r0 In , in the transmit direction, the BSS selection and destination address are mapped to a receiver address and security association. In the receive direction, the transmitter address selects the security association used for decryption. What is required in is that each security association with an individual station is a separate Bridge Port. On input, this means that the transmitter address ultimately determines on which Bridge Port the frame was received. This means that either the transmitter address or some other kind of security association identifier must accompany the frame up the stack to the MAC-Dependent Convergence Function, which can then use that parameter to split into multiple SAPs, one per Bridge Port

Submission doc.: IEEE 11-13/ ak-r0 Bridge port demux uses transmitter address (or equivalent security association ID) to select a Bridge Port on which to present the frame. The transmitter address or SAID must travel up the stack; this may be a new requirement for stuff MPDU Decryption and Integrity Bridge Port Demux Port 1Port 2Port n … stuff M-SAP to security association

Submission doc.: IEEE 11-13/ ak-r0 On output, there is likely a two step process. First, the vector of output ports that accompany a frame through the bridge forwarding process select a BSS and receiver address. If only one port is in the vector, that port’s unicast receiver address is used. If multiple ports are selected, the appropriate multicast or broadcast receiver address is used. The BSS and receiver address, in turn select the security association when the frame is delivered to the MAC. If the receiver address is a unicast, a unicast SA is used. If the receiver address is a multicast, the broadcast SA for the BSS is used. NOTE: This deck leaves the question of how exactly the receiver address maps to the selection of receiving stations (e.g., a multicast receiver address of some sort) to P802.11ak.

Submission doc.: IEEE 11-13/ ak-r0 A frame with a vector of ports is equivalent (to an observer outside the system) to an array of SAPs. The selection of ports determines the receiver address. MPDU Encryption uses the receiver address to determine the security association. (Is this a change, or how it is, now?) Receiver Address Selection Port 1Port 2Port n … stuff MPDU Encryption and Integrity stuff M-SAP to security association

Submission doc.: IEEE 11-13/ ak-r0 Each BSS has its own set of queues This merely means that we group together the Bridge Ports that are associated with a single BSS together with a single Queue Set.

Submission doc.: IEEE 11-13/ ak-r0 It remains ambiguous, in 802.1Q, whether the queues are really above the physical port or down in the guts of the MAC. This question has not been resolved in 802.1Q, because different implementations are reasonable. The number of Queue Sets is more important, especially now that we have more complex dequeing algorithms. This deck proposes that we can and should settle that. If wishes to specify a specific place for the queues, that is allowable within the architecture, and ak will harm nothing by making that decision.

Submission doc.: IEEE 11-13/ ak-r0 In 802.1, encryption and decryption are above the 802.n MAC. In , encryption and decryption have to be below the MAC presented to the Bridge, because frames can be fragmented and reassembled, and each fragment is protected individually. Upper Interface includes a parameter for “controlled/uncontrolled port” Controlled/uncontrolled distinction is made in crypto block Lower interface has no “controlled/uncontrolled” parameter stuff encryption / decryption stuff } M-SAP to sec. asociation

Submission doc.: IEEE 11-13/ ak-r0 Pseudo-MACsec layer splits controlled/uncontrolled ports using the parameter. To 802.1, everything looks normal. Rest of stack remains the same. stuff encryption / decryption stuff } Pseudo-MACsec Controlled MAC Uncontrolled MAC M-SAP to sec. asociation

Submission doc.: IEEE 11-13/ ak-r Egress Queue Set Bridge Port Support of EISS 802.1AC Media Access Method Dependent Convergence Functions 6.7, including receiver address selection (on transmit) and transmitter address demultiplexing (on receive) Pseudo- SecY “physical port” including selection of security association by receiver address (on transmit) This assumes one “physical port” covers all BSSs. MAC indep. functions

Submission doc.: IEEE 11-13/ ak-r Egress 802.1AC Media Access Method Dependent Convergence Functions 6.7, including receiver address selection (on transmit) and transmitter address demultiplexing (on receive) “physical port” including selection of security association by receiver address (on transmit) This separates the “physical port” by BSS 802.1AC Media Access Method Dependent Convergence Functions 6.7, including receiver address selection (on transmit) and transmitter address demultiplexing (on receive) “physical port” including selection of security association by receiver address (on transmit) BSS A BSS B Queue Set Bridge Port Support of EISS Pseudo- SecY MAC indep. functions

Submission doc.: IEEE 11-13/ ak-r0March 2013 Non-Access Point stations

Submission doc.: IEEE 11-13/ ak-r0 A non-AP station must present one instance of the MAC service to the Bridge (for use as a Bridge Port) for each security association that the station has with another station, whether that station is an AP or not. This Service Access Point must not reflect frames back to the transmitter. This could be called a “Portal,” a “Security Association Port,” or some third kind of object. If a third object, 802.1AC must include that, also.

Submission doc.: IEEE 11-13/ ak-r0March 2013 Open questions

Submission doc.: IEEE 11-13/ ak-r0 Do we include Clause 44? How to handle basic LLC/Length-Type conversion when bridging between wired and wireless Bridge Ports? This editor’s opinion: Add LLC/Length-type parameter to EISS, and have “Support of EISS” translate to local format on output, if necessary. Is Congestion Notification allowed for media? This editor’s opinion: Say nothing. It’s an option, anyway. Is Priority-based Flow Control allowed for media? This editor’s opinion: Say nothing. It’s an option, anyway. How to handle re-transmission of frames in ? Since queue position is ambiguous, we can leave this to Is there a problem with out-of-order delivery that needs to be mentioned?