Spatial Reuse Ring Networks Chun-Hung Chen Department of Computer Science and Information Engineering National Taipei University of Technology 2003.10.24.

Slides:



Advertisements
Similar presentations
Igor Umansky Huub van Helvoort
Advertisements

CCNA3: Switching Basics and Intermediate Routing v3.0 CISCO NETWORKING ACADEMY PROGRAM Switching Concepts Introduction to Ethernet/802.3 LANs Introduction.
Jaringan Komputer Lanjut Packet Switching Network.
TELE202 Lecture 8 Congestion control 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »X.25 »Source: chapter 10 ¥This Lecture »Congestion control »Source:
The Network Layer Functions: Congestion Control
Review: Routing algorithms Distance Vector algorithm. –What information is maintained in each router? –How to distribute the global network information?
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
UNIT-IV Computer Network Network Layer. Network Layer Prepared by - ROHIT KOSHTA In the seven-layer OSI model of computer networking, the network layer.
Packet Optimized Optical Transport Solutions A Practical Design and Implementation Approach Marc Teichtahl
1 Presenter: Ching-Lung Tseng Adviser: Ho-Ting Wu Date: 2004/07/26 Department of Computer Science and Information Engineering, National Taipei University.
1 Fall 2005 Extending LANs Qutaibah Malluhi CSE Department Qatar University Repeaters, Hubs, Bridges, Fiber Modems, and Switches.
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
© nCode 2000 Title of Presentation goes here - go to Master Slide to edit - Slide 1 Reliable Communication for Highly Mobile Agents ECE 7995: Term Paper.
SRP Algorithm Simulation By:Andrey Klinger Michael Gustus Evgeny Muzikantov Supervisor: Itai Dabran.
CSCI 4550/8556 Computer Networks Comer, Chapter 11: Extending LANs: Fiber Modems, Repeaters, Bridges and Switches.
The Laboratory of Computer Communication and Networking SRP Simulation Over Ethernet.
Updated 1/20021 SMDS Nirmala Shenoy Information technology Department Rochester Institute of Technology.
The Laboratory of Computer Communication and Networking Resilient Packet Ring (RPR)
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Transport Protocols Slide 1 Transport Protocols.
Tesseract A 4D Network Control Plane
draft-kompella-mpls-rmr Kireeti Kompella IETF 91
Hubs & Switches Ethernet Basics -10. There is only so much available bandwidth, in some instances it can be dynamic An overabundance of data on the network,
1 25\10\2010 Unit-V Connecting LANs Unit – 5 Connecting DevicesConnecting Devices Backbone NetworksBackbone Networks Virtual LANsVirtual LANs.
1 LAN switching and Bridges Relates to Lab 6. Covers interconnection devices (at different layers) and the difference between LAN switching (bridging)
Lecture 1, 1Spring 2003, COM1337/3501Computer Communication Networks Rajmohan Rajaraman COM1337/3501 Textbook: Computer Networks: A Systems Approach, L.
WELCOME.
Introduction to IT and Communications Technology Justin Champion C208 – 3292 Ethernet Switching CE
ICMP (Internet Control Message Protocol) Computer Networks By: Saeedeh Zahmatkesh spring.
1 Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
LECTURE 9 CT1303 LAN. LAN DEVICES Network: Nodes: Service units: PC Interface processing Modules: it doesn’t generate data, but just it process it and.
Brierley 1 Module 4 Module 4 Introduction to LAN Switching.
“Intra-Network Routing Scheme using Mobile Agents” by Ajay L. Thakur.
Example STP runs on bridges and switches that are 802.1D-compliant. There are different flavors of STP, but 802.1D is the most popular and widely implemented.
Ad hoc On-demand Distance Vector (AODV) Routing Protocol ECE 695 Spring 2006.
The Computer Communication Lab (236340) Winter Resilient Packet Ring GUI Simulator Developed By: Anton Spirkov Slava
© 2002, Cisco Systems, Inc. All rights reserved..
 Network Segments  NICs  Repeaters  Hubs  Bridges  Switches  Routers and Brouters  Gateways 2.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
SONET Survivability Mechanisms CSC/ECE 772: Survivable Networks Spring, 2009, Rudra Dutta.
Module 8: Ethernet Switching
1 Lecture 14 High-speed TCP connections Wraparound Keeping the pipeline full Estimating RTT Fairness of TCP congestion control Internet resource allocation.
Intro to Network Design
Computer Networks with Internet Technology William Stallings
Version 4.0 Ethernet Network Fundamentals – Chapter 9 Sandra Coleman, CCNA, CCAI.
Communication Paradigm for Sensor Networks Sensor Networks Sensor Networks Directed Diffusion Directed Diffusion SPIN SPIN Ishan Banerjee
Cisco 3 - Switching Perrine. J Page 16/4/2016 Chapter 4 Switches The performance of shared-medium Ethernet is affected by several factors: data frame broadcast.
PRoPHET+: An Adaptive PRoPHET- Based Routing Protocol for Opportunistic Network Ting-Kai Huang, Chia-Keng Lee and Ling-Jyh Chen.
IEEE (Token Ring) LAN Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
Lecture Topics: 11/27 Networks Layered Model Ethernet IP.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
Kireeti Kompella draft-kompella-mpls-rmr-01
(Slide set by Norvald Stol/Steinar Bjørnstad
Rehab AlFallaj.  Network:  Nodes: Service units: PC Interface processing Modules: it doesn’t generate data, but just it process it and do specific task.
CS440 Computer Networks 1 Packet Switching Neil Tang 10/6/2008.
1 IEX8175 RF Electronics Avo Ots telekommunikatsiooni õppetool, TTÜ raadio- ja sidetehnika inst.
CCNA3 Module 4 Brierley Module 4. CCNA3 Module 4 Brierley Topics LAN congestion and its effect on network performance Advantages of LAN segmentation in.
1 Protection in SONET Path layer protection scheme: operate on individual connections Line layer protection scheme: operate on the entire set of connections.
1 LAN switching and Bridges Relates to Lab Outline Interconnection devices Bridges/LAN switches vs. Routers Bridges Learning Bridges Transparent.
Chapter Objectives After completing this chapter you will be able to: Describe in detail the following Local Area Network (LAN) technologies: Ethernet.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:
RESILIENT PACKET RING NETWORK(RPR).  The nature of the public network has changed. Demand for Internet Protocol(IP)data is growing at a compound annual.
IEEE (Token Ring) LAN Dr. Sanjay P. Ahuja, Ph.D.
Topics discussed in this section:
Lei Chen and Wendi B. Heinzelman , University of Rochester
Network Survivability
Module 8: Ethernet Switching
PRESENTATION COMPUTER NETWORKS
RESILIENT PACKET RING NETWORK(RPR)
Congestion Control (from Chapter 05)
Virtual LAN (VLAN).
Presentation transcript:

Spatial Reuse Ring Networks Chun-Hung Chen Department of Computer Science and Information Engineering National Taipei University of Technology

Outlines  Ring Networks  Spatial Reuse  Spatial Reuse Protocol  Resilient Packet Ring

Ring Networks  All nodes chained in a loop is called a ring  Data flow in one direction  Suitable for Backbone Connection  Bandwidth is increased with more rings  Two types of ring  Token ring  Slotted ring

Token Ring

Slotted Ring Sense

Spatial Reuse  Destination Stripping Mechanism  Node B has the right to transmit data  Node B transmits data to Node D  Node D receives data and strip data  If Node D has data to send out, Node D sends it immediately or Node D will leave it free for other nodes to send data, ex: Node E-> Node A-> …  While multicast, packets are source stripped  Problems  Fairness issue  Starvation

Fairness Issue  If Node C is the hot switch in the networks and Node A, D both have lots of packets to Node C 1. Node A sends a packet to Node C 2. Node C strips a packet and has no packet to send 3. Node D has a packet for Node C, and once Node D senses free media, it sends it out immediately 4. Node C strips a packet and has no packet to send 5. Node D has no packet to send at the time 6. Node A has a packet for Node C, and once Node A senses free media, it sends it out immediately

Spatial Reuse Protocol (SRP)  Developed by Cisco  SRP is the underlying technology used in Cisco Dynamic Packet Transport (DPT) which is optimized for packet-based optical transport

SRP Background  Bidirectional Dual Counter-rotation ring  “Inner” and “Outer” Rings  Both rings are utilized for transporting data and SRP control packets  SRP control packets:  Topology Discovery  Protection Switching  Bandwidth Control

Spatial Reuse Node C has full bandwidth access to Node D, while Node B to Node A and Node C to Node A are sharing the bandwidth

Receive-Side Packet Handling  Stripped  Received and Stripped  Received and Forwarded  Forwarded (data packets)  Wrapped  Pass Through (control packets)

SRP Fairness Algorithm (SRP-fa)  Global Fairness  Each node controls the rate of forwarding packets for upstream or downstream nodes in relations to packets sourced by itself  Local Optimization  Maximally leverage spatial reuse properties to utilize more than their fair share  Scalability  Rapidly adapt to changing traffic conditions

 For each node, there are three types of packet:  High-Priority Packets  Put in High-Priority Transit Buffer  Low-Priority Packets  Put in Low-Priority Transit Buffer (LPTB)  Self-Generated Packets  Put in High (Low)-Priority Transmit Queue  Packet Priority in Nodes  High-Priority Transit Buffer  High-Priority Transmit Queue  Low-Priority Transit Buffer  Low-Priority Transmit Queue

 Packet delivery order  High-Priority Forwarded Packets are sent first  High-Priority Generated Packets are sent if the LPTB is not full  Low-Priority Forwarded Packets are sent with Forward Rate  Low-Priority Generated Packets are sent if LPTB is not crossed the low-priority threshold and SRP-fa rules allow it  my_usage < allow_usage

Updated every clock cycle  my_usage (bytes) is increased as the generated low- priority packet inserted in the ring  fwd_rate (bytes) is increased as the forwarded low- priority packet inserted in the ring  my_usage should be smaller than allow_usage & MAX_USAGE and fwd_rate is larger than my_usage or LPTB is empty, the host is permitted to send its packets

Calculated every DECAY_INTERVAL  DECAY_INTERVAL = 8000 bytes for OC-12s/STM-4; bytes for OC-48s/STM-16  AGECOEFF = 4  LP_MY_USAGE = 512  LP_FWD_RATE = 64  LP_ALLOW = 64  MAX_LINE_RATE = AGECOEFF * DECAY_INTERVAL If LPTB is larger than ½ THRESHOLD, then it is congested If receiving not NULL usage packet, allow_usage is set to usage packet, otherwise, allow_usage is increased 8000 bytes * 8 = bits = 6.4 Mb OC-12 = 51.84*12 = (Mbps) => (6.4) / (622.08) = (sec) bytes * 8 = bits = 25.6 Mb OC-48 = 51.84*48 = (Mbps) => (25.6) / ( ) = (sec)

When congested  If lp_my_usage > received_usage (smaller is set to advertise usage packet)  advertise usage packet is set to received_usage

If not congested  If received_usage is not NULL  Advertise usage packet is set to received_usage  Otherwise  Advertise usage packet is NULL

SRP-fa Procedure  Extract usage information from incoming packets  Periodically update the allow_usage threshold based on the received fairness value as well as parameter aging  Calculate the SRP-fa signaling information to send in the usage field by using the values of the allow_usage, fwd_rate and my_usage parameter.  Send fairness message to upstream neighbor

SRP-fa Simulation  Node 4 starts to send packets to Node 1 via outer ring at 1 second  Node 3 starts to send packets to Node 1 via outer ring at 2 second  Node 2 starts to send packets to Node 1 via outer ring at 3 second

SRP-fa Simulation  Node 4 sends traffic at full speed during 1~2 seconds  Node 3 wants to send traffic at 2 second, then Node 3 sends a fairness (usage) packet to Node 4  Node 4 slows down its transmitting rate  Node 3 starts to send traffic and the bandwidth is shared by Node 3 and Node 4  Node 2 wants to send traffic at 3 second, then Node 2 sends a fairness (usage) packet to Node 3 and Node 4  Node 3 and Node 4 slow down its transmitting rate  Node 2 starts to send traffic and the bandwidth is shared by Node 2, Node 3 and Node 4

Intelligent Protection Switching (IPS)  IPS provides SRP rings with powerful self-healing capabilities that allow them to automatically recover from fiber facility or node failure by wrapping the traffic on the failed span  Proactive fault and performance monitoring, and event detection and reporting  Signal processing and propagation to communicate information on detected faults and fault clearances  Topological knowledge independence  Network operator may add or remover nodes from the rings  Ring wrapping to by-pass failed fiber facility or nodes while delivering packets to the intended destination  Protection switching is transparent to Layer 3  Protection switching event hierarchy  Handling of concurrent multiple events  Procedures which minimize IPS-related signaling traffic under normal conditions

IPS Request Type  Automatic request  Signal Fail (SF) 2  Signal Degrade (SD) 3  Wait-to-Restore (WTR) 5  Manual request  Forced Switch (FS) 1  Manual Switch (MS) 4  Path Indicator  Short Path IPS Messages: one-hop away  Long Path IPS Messages: sent around the ring

Thank you