Submission doc.: IEEE 11-12/0621r4 July 2012 Donald Eastlake 3rd, HuaweiSlide 1 Alternative Mesh Path Selection Date: 2012-07-19 Authors:

Slides:



Advertisements
Similar presentations
Extended Service Set (ESS) Mesh Network Daniela Maniezzo.
Advertisements

COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
Page 1 / 14 The Mesh Comparison PLANET’s Layer 3 MAP products v.s. 3 rd ’s Layer 2 Mesh.
CSCI 465 D ata Communications and Networks Lecture 20 Martin van Bommel CSCI 465 Data Communications & Networks 1.
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
Multicasting in Mobile Ad-Hoc Networks (MANET)
William Stallings Data and Computer Communications 7 th Edition (Selected slides used for lectures at Bina Nusantara University) Internetworking.
Chapter 10 Introduction to Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
August 18-19, 2002 UCSC Baskin School of Engineering1 UCSC PERC COMPONENT: Protocols for Wireless Internetworks J.J. Garcia-Luna-Aceves Computer Communication.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #5 Mobile Ad-Hoc Networks TBRPF.
1 25\10\2010 Unit-V Connecting LANs Unit – 5 Connecting DevicesConnecting Devices Backbone NetworksBackbone Networks Virtual LANsVirtual LANs.
ROUTING ON THE INTERNET COSC Aug-15. Routing Protocols  routers receive and forward packets  make decisions based on knowledge of topology.
NETWORK LAYER (2) T.Najah AlSubaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
TRILL Link Protocols Donald Eastlake Huawei Technologies July 20141Directory Assist.
TRILL over IP draft-ietf-trill-over-ip-01.txt IETF 91, Honolulu Margaret Wasserman Donald Eastlake, Dacheng Zhang.
ENHANCING AND EVALUATION OF AD-HOC ROUTING PROTOCOLS IN VANET.
TRILL OAM draft-eastlake-trill-rbridge-channel-00 draft-bond-trill-rbridge-oam-01 draft-manral-trill-bfd-encaps-01 Donald Eastlake 3 rd Huawei Technologies.
Network Redundancy Multiple paths may exist between systems. Redundancy is not a requirement of a packet switching network. Redundancy was part of the.
LAN Overview (part 2) CSE 3213 Fall April 2017.
Connecting LANs, Backbone Networks, and Virtual LANs
TRansparent Interconnection of Lots of Links (TRILL) March 11 th 2010 David Bond University of New Hampshire: InterOperability.
Bridges, Routers and Switches Part One Three things are certain: Death, taxes, and lost data. Guess which has occurred. Haiku error message.
1 Introducing Routing 1. Dynamic routing - information is learned from other routers, and routing protocols adjust routes automatically. 2. Static routing.
November 2011IETF TRILL WG1 TRILL Working Group TRansparent Interconnection of Lots of Links Mailing list: Tools site:
Submission doc.: IEEE 11-12/0621r2 May 2012 Donald Eastlake 3rd, HuaweiSlide 1 Alternative Mesh Path Selection Date: Authors:
Submission doc.: IEEE 11-12/0589r0 May 2012 Donald Eastlake 3rd, Huawei R&D USASlide 1 General Links Date: Authors:
Submission doc.: IEEE 11-12/0589r2 July 2012 Donald Eastlake 3rd, Huawei R&D USASlide 1 General Links Date: Authors:
CS3502: Data and Computer Networks Local Area Networks - 4 Bridges / LAN internetworks.
Multicast Routing in Mobile Ad Hoc Networks (MANETs)
Submission doc.: IEEE /1015r1 September 2015 Guido R. Hiertz et al., EricssonSlide 1 Proxy ARP in ax Date: Authors:
Base Protocol Spec Radia Perlman
July 2011IETF TRILL WG1 TRILL Working Group TRansparent Interconnection of Lots of Links Mailing list: Tools site:
Submission doc.: IEEE 11-12/0589r1 May 2012 Donald Eastlake 3rd, Huawei R&D USASlide 1 General Links Date: Authors:
Submission doc.: IEEE 11-14/0867r0 July 2014 Donald Eastlake, HuaweiSlide 1 A Subsetting and EPD Approach Date: Authors:
1 Kyung Hee University Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs.
Doc.: mes Submission 7 May 2004 Tricci SoSlide 1 Need Clarification on The Definition of ESS Mesh Prepared by Tricci So.
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
Computer Networks 15-1 Chapter 15. Connecting LANs, Backbone Networks, and Virtual LANs 15.1 Connecting devices 15.2 Backbone networks 15.3 Virtual LANs.
TRILL OAM & BFD draft-eastlake-trill-rbridge-bfd-00.txt Donald E. Eastlake 3 rd 155 Beaver Street Milford, MA USA November 20101TRILL OAM & BFD Vishwas.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
November 2010IETF TRILL WG1 TRILL Working Group TRansparent Interconnection of Lots of Links Mailing list: Tools site:
Transparent Interconnection of Lots of Links(TRILL) Speaker: Hui-Hsiung Chung Date:2011/12/28 1.
Doc.: IEEE /1047r0 Submission Month 2000August 2004 Avinash Joshi, Vann Hasty, Michael Bahr.Slide 1 Routing Protocols for MANET Avinash Joshi,
TRILL remaining issues Radia Perlman
Cisco Systems Networking Academy S2 C 11 Routing Basics.
NET 324 D Networks and Communication Department Lec1 : Network Devices.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
Doc.: IEEE 11-04/0319r0 Submission March 2004 W. Steven Conner, Intel Corporation Slide 1 Architectural Considerations and Requirements for ESS.
Routing protocols. Static Routing Routes to destinations are set up manually Route may be up or down but static routes will remain in the routing tables.
Doc.: IEEE /2491r00 Submission September 2007 D. Eastlake (Motorola), G. Hiertz (Philips)Slide 1 WLAN Segregated Data Services Date:
Doc.: IEEE /2161r1 Submission July 2007 Slide 1 July 2007 Donald Eastlake 3rd, MotorolaSlide 1 Segregated Data Services in Date:
Intro DSR AODV OLSR TRBPF Comp Concl 4/12/03 Jon KolstadAndreas Lundin CS Ad-Hoc Routing in Wireless Mobile Networks DSR AODV OLSR TBRPF.
Submission doc.: IEEE 11-13/0526r1 May 2013 Donald Eastlake, HuaweiSlide 1 Sub-Setting Date: Authors:
Submission doc.: IEEE 11-13/ ak May 2013 Norman Finn, Cisco SystemsSlide 1 P802.1Qbz + P802.11ak Proposed Division of Work Date: Authors:
March 2012IETF TRILL WG1 TRILL Working Group TRansparent Interconnection of Lots of Links Mailing list: Tools site:
Doc.: IEEE /0174r1 Submission Hang Liu, et al. March 2005 Slide 1 A Routing Protocol for WLAN Mesh Hang Liu, Jun Li, Saurabh Mathur {hang.liu,
March th IETF - Prague1 TRILL Working Group Changes from draft-trill-rbridge-protocol-02.txt to draft-trill-rbridge-protocol-03.txt Dinesh Dutt,
Submission doc.: IEEE 11-12/0621r6 November 2012 Donald Eastlake 3rd, HuaweiSlide 1 Alternative Mesh Path Selection Date: Authors:
Doc.: IEEE /2200r2 Submission July 2007 Sandesh Goel, Marvell et alSlide 1 Route Metric Proposal Date: Authors:
Routing Semester 2, Chapter 11. Routing Routing Basics Distance Vector Routing Link-State Routing Comparisons of Routing Protocols.
Prof. Alfred J Bird, Ph.D., NBCT Office – Science 3rd floor – S Office Hours – Monday and Thursday.
Doc: IEEE /0395r2 Submission March 2009 R. Roy, ConnexisSlide 1 WAVE ITS Station Technical Capabilities Summary Date: Authors:
Prof. Alfred J Bird, Ph.D., NBCT Office – McCormick 3rd floor 607 Office Hours – Monday 3:00 to 4:00 and.
Semester 3, Chapter 5 Allan Johnson
Connecting Network Components
Alternative Mesh Path Selection
IEEE 802 EC July Motions Date: Authors: Name
WLAN Segregated Data Services
Segregated Data Services in
Virtual LAN (VLAN).
Presentation transcript:

Submission doc.: IEEE 11-12/0621r4 July 2012 Donald Eastlake 3rd, HuaweiSlide 1 Alternative Mesh Path Selection Date: Authors:

Submission doc.: IEEE 11-12/0621r4 July 2012 Donald Eastlake 3rd, HuaweiSlide 2 Abstract The Mesh standard provides the hooks to support a variety of path selection protocols and link cost metrics. Different network environments and applications are best supported by different path selection protocols and link metrics. There is interest in the IETF TRILL WG in specifying an alternative path selection protocol for mesh.

Submission doc.: IEEE 11-12/0621r4 Contents 1.Why 2.Background 3.TRILL 4.Liaison Slide 3Donald Eastlake 3rd, Huawei July 2012

Submission doc.: IEEE 11-12/0621r4 Why Should Be Interested? mesh depends on a Path Selection and Link Metric protocol to determine how to forward frames. Different Path Selection protocols are best for different types of meshes. Meshes differ along various dimensions and questions, such as: Fraction of pairwise multi-hop paths that will actually be in use. Density, dimensionality, and dynamism of mesh station location. Computational and storage capabilities of mesh stations. Can mesh path selection be local to an mesh or should it be possible to optimize path selection on a wider scale possibly including multiple meshes and intervening nets? Should mesh stations have a global view of the mesh topology? Slide 4Donald Eastlake 3rd, Huawei July 2012

Submission doc.: IEEE 11-12/0621r4 Why Should Be Interested? There is only one path selection protocol specified in the mesh standard. But it was realized, when s was developed, that different path selection protocols would be suitable for different mesh conditions. Thus, mesh is designed so that other path selection protocols can be deployed and agreed to by mesh stations. There are successful mesh products, but they use propriety path selection protocols. Slide 5Donald Eastlake 3rd, Huawei July 2012

Submission doc.: IEEE 11-12/0621r4 Why IETF TRILL? 1.The IETF TRILL protocol would provide a new type of mesh path selection extending the utility of mesh. – In particular TRILL is a proactive link-state path selection protocol designed from the beginning to support multi-access links. 2.Donald Eastlake, Co-Chair of the IETF TRILL Working Group was formerly Chair of the Mesh Networking Task Group. 3.The TRILL WG has expressed interest in use of TRILL for path selection in IEEE s. – IETF Chair Liaison to IEEE 802.1, 10 May It would provide a worked example of building on an 802 protocol using external interfaces in support of the 802 JTC1 SC’s efforts. Slide 6Donald Eastlake 3rd, Huawei July 2012

Submission doc.: IEEE 11-12/0621r4 Contents 1.Why 2.Background 3.TRILL 4.Liaison Slide 7Donald Eastlake 3rd, Huawei July 2012

Submission doc.: IEEE 11-12/0621r Mesh Path Selection July 2012 Donald Eastlake 3rd, HuaweiSlide 8

Submission doc.: IEEE 11-12/0621r4July 2012 Donald Eastlake 3rd, HuaweiSlide Mesh Path Selection Mesh is designed to support multiple path selection protocols and multiple link metrics because different mesh environments and applications can benefit from different path selection protocols and link metrics. All Mesh STAs in an MBSS (Mesh BSS) must use the same path selection protocol and link metric. The default path selection protocol and the only one specified in the Standard is HWMP (Hybrid Wireless Mesh Protocol). The default link metric and the only one now specified in the Standard is the Airtime link metric which estimates the amount of airtime to transmit an 8192 data bit frame.

Submission doc.: IEEE 11-12/0621r4July 2012 Donald Eastlake 3rd, HuaweiSlide 10 HWMP Path Selection Protocol Hybrid Wireless Mesh Protocol: “Hybrid” because it uses two techniques: 1.Proactively building spanning trees rooted at portals or other configured roots. 2.Reactively finding paths to a specific destination when initiated by a source Mesh STA by processing flooded request frames and the reply from the destination. This part of HWMP is based on AODV (Ad-hoc On Demand Distance Vector). Both of the above are Distance Vector techniques (see later slides).

Submission doc.: IEEE 11-12/0621r4July 2012 Donald Eastlake 3rd, HuaweiSlide 11 Types of Path Selection Pros and Cons: These are very general characterizations! 1.Distance Vector Path selection is based on local view. Lower storage and computation cost at each node. Local cost calculation must be done before propagating changes. 2.Link State Path selection is based on a global view of the network permitting more intelligent decision making. Requires more storage and process at each node. Topology information update can be propagated after trivial check that is has not been previously received.

Submission doc.: IEEE 11-12/0621r4July 2012 Donald Eastlake 3rd, HuaweiSlide 12 Types of Path Selection Pros and Cons: These are very general characterizations! 1.Reactive: Paths determined when needed. Typically a start up delay for a pair of nodes to communicate. Less overhead if only a few pairs of nodes communicate. 2.Proactive: All paths determined and maintained. No delay for a pair of nodes to communicate Less overhead if many pairs of nodes communicate. Different mesh environments and/or applications are best served by different path selection protocols.

Submission doc.: IEEE 11-12/0621r4 Contents 1.Why 2.Background 3.TRILL 4.Liaison Slide 13Donald Eastlake 3rd, Huawei July 2012

Submission doc.: IEEE 11-12/0621r4July 2012 Donald Eastlake 3rd, HuaweiSlide 14 IETF TRILL WG TRILL is a Proactive Link State Protocol TRILL supports multi-access links – and wireless links are inherently multi-access.

Submission doc.: IEEE 11-12/0621r4July 2012 Donald Eastlake 3rd, HuaweiSlide 15 More on TRILL The IETF TRILL Protocol is built on the IS-IS link state protocol. Devices that implement TRILL are called TRILL Switches or RBridges (Routing Bridges). TRILL provides transparent routing. It delivers the same frame as sent. At least one mesh protocol stack implementing company is enthusiastic about implementing a TRILL based path selection protocol.

Submission doc.: IEEE 11-12/0621r4July 2012 Donald Eastlake 3rd, HuaweiSlide 16 Additional TRILL Features Pro-actively provides least-cost paths with zero configuration. Supports multi-pathing. Unicast forwarding tables at transit RBridges scale with the number of RBridges, not the number of end stations. Only edge RBridges need to learn end station (MAC) addresses. Supports frame priorities and VLANs. Has a poem (see last backup slide below)

Submission doc.: IEEE 11-12/0621r4July 2012 Donald Eastlake 3rd, HuaweiSlide 17 Peering Between/Thru Meshes If meshes using TRILL are connected by bridged LANs, those TRILL instances can peer with each other and form a unified campus, picking least cost paths, for example from A to B and from C to D below. C D MBSS AB LAN B1 B2

Submission doc.: IEEE 11-12/0621r4 TRILL for Mesh Use Cases 1.Cases involving communication between many different pairs of mesh stations in a mesh, such as between between people in an independent group or between top-of-rack switches. 2.Cases where a global least cost path is needed involving more than one mesh or optimization over both mesh path choices and wired TRILL campus path choices. 3.Cases where a global knowledge of the mesh topology is useful to mesh stations. Slide 18Donald Eastlake 3rd, Huawei July 2012

Submission doc.: IEEE 11-12/0621r4 Contents 1.Why 2.Background 3.TRILL 4.Liaison Slide 19Donald Eastlake 3rd, Huawei July 2012

Submission doc.: IEEE 11-12/0621r4July 2012 Donald Eastlake 3rd, HuaweiSlide 20 Draft Liaison Envelope To:Donald E. Eastlake 3 rd and Erik Nordmark, IETF TRILL WG Co-Chairs CC:Dorothy Stanley, IEEE Liaison to the IETF Ralph Droms and Brian Haberman, IETF Internet Area Co-Directors Dan Romascanu, IETF Liaison to IEEE SA Signed:Bruce Kramer, Chair WG

Submission doc.: IEEE 11-12/0621r4July 2012 Donald Eastlake 3rd, HuaweiSlide 21 Liaison Text The IEEE WG understands that there is interest within the IETF TRILL Working Group to specify a variation of the TRILL protocol for use as an IEEE mesh path selection protocol. While the IEEE WG has no view on whether such an activity is justified or not, the IEEE WG has no objection to IETF TRILL undertaking this work. Such work is possible because the IEEE standard was designed to enable the development of a variety of mesh path selection protocols to extend the range of conditions for which an IEEE mesh is suitable. It was intended that path selection protocols could be developed independently of IEEE If allocation of any IEEE code points is found to be beneficial for a TRILL based path selection protocol for mesh, such code points must be allocated through the IEEE ANA (Assigned Number Authority) mechanism to avoid conflict. Approval of such allocations will be considered by the IEEE WG upon request. The IEEE WG appreciates the interest of the TRILL WG in IEEE mesh. Should you undertake this work, please keep us appraised of your progress.

Submission doc.: IEEE 11-12/0621r4July 2012 Donald Eastlake 3rd, HuaweiSlide 22 Liaison Motion Motion: Request the IEEE WG chair transmit the liaison on slide 21 of “ alternative-path-selection-protocol.pptx” to the IETF TRILL WG and any additional persons he deems appropriate. Moved: Dorothy Stanley, Seconded: Andrew Myles Result: y-n-a

Submission doc.: IEEE 11-12/0621r4July 2012 Donald Eastlake 3rd, HuaweiSlide 23 References IEEE TGs Usage Models, s-usage-models- tgs.doc IEEE Std , “… Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications”, 6 February 2012 IETF RFC 3561, “Ad hoc On-Demand Distance Vector (AODV) Routing”, July 2003, IETF RFC 6325 (TRILL), “RBridges: Base Protocol Specification”, July 2011, IETF Liaison to IEEE 802.1, 10 May 2012,

Submission doc.: IEEE 11-12/0621r4 Back Up Slides July 2012 Donald Eastlake 3rd, HuaweiSlide 24

Submission doc.: IEEE 11-12/0621r4July 2012 Donald Eastlake 3rd, HuaweiSlide 25 Airtime Link Metric The Airtime Link Metric in IEEE is based on the estimated amount of channel resources used to transmit a 8192 bit frame over the specific link. O = frame overhead, depend on PHY B t = 8192 bits r = data rate in Mb/s e f = frame error rate for a 8192 bit frame

Submission doc.: IEEE 11-12/0621r Mesh Use Cases The use cases motivating the development of mesh were as follows: 1.Residential 2.Office 3.Campus/ Community/ Public Access Network 4.Public Safety 5.Military IEEE TGs Usage Models s-usage-models-tgs.doc Slide 26Donald Eastlake 3rd, Huawei July 2012

Submission doc.: IEEE 11-12/0621r4July 2012 Donald Eastlake 3rd, HuaweiSlide 27 Types of Path Selection Distance Vector versus Link State: These are very general, basic descriptions! 1.Distance Vector Each node locally announces that it is a zero cost route to itself. Each node trusts what its neighbors say about their cost to various destinations, picks the best for each destination, adds the cost to that neighbor, and believes the sum is its cost to that destination through that neighbor. 2.Link State Each node finds its neighbors and the one hop cost to each neighbor. This data is reliably flooded to all nodes in the network. From this network wide neighbor data, each node can calculate the global topology and things like the optimum next hop.

Submission doc.: IEEE 11-12/0621r4July 2012 Donald Eastlake 3rd, HuaweiSlide 28 TRILL Standardization Status Some standards track RFCs that have issued: 6325, “RBridges: TRILL Base Protocol Specification” 6326, “TRILL Use of IS-IS” 6327, “RBridges: Adjacency” 6361, “TRILL over PPP” Base Protocol Code Points Allocated Ethertypes: TRILL = 0x22F3, L2-IS-IS = 0x22F4 Multicast MACs: C to C F NLPID: 0xC0; IS-IS code points (see RFC 6326) TRILL has an open source software implementation for Solaris and one in progress for Linux.

Submission doc.: IEEE 11-12/0621r4July 2012 Donald Eastlake 3rd, HuaweiSlide 29 Peering and Layers TRILL operates at layer 2 ½. TRILL switches will peer with each other, both becoming part of a unified TRILL campus, through bridges but not through routers. Layer 3: TRILL Layer: Layer 2: Routers (plus servers and other end stations) TRILL Switches Bridges

Submission doc.: IEEE 11-12/0621r4 Peering and Layers July 2012 Donald Eastlake 3rd, HuaweiSlide 30 Router /End Station Bridge Peers Non-Peers Bridge Peers

Submission doc.: IEEE 11-12/0621r4July 2012 Donald Eastlake 3rd, HuaweiSlide 31 Peering and Layers Peers Router /End Station TRILL Switch Bridge(s) TRILL Switch Bridge(s) Non-Peers

Submission doc.: IEEE 11-12/0621r4July 2012 Donald Eastlake 3rd, HuaweiSlide 32 TRILL Open Source Status Oracle: TRILL for Solaris TRILL Port to Linux (in process): National University of Sciences and Technology (NUST), Dr. Ali Khayam Islamabad, Pakistan

Submission doc.: IEEE 11-12/0621r4 TRILL Work to Support Mesh It is likely that the following work on TRILL would be needed: 1.Optimization of link state flooding. Useful for any richly connected TRILL campus. 2.Encoding of TRILL frames in mesh. TRILL currently standardized over and PPP. Drafts exist for TRILL over IPv4/IPv6 and MPLS. 3.Optimization of multi-destination data distribution. 4.Mapping of Airtime Link Metric values to TRILL link metric. This is a simple numeric mapping. Perhaps ( c a * 25 * 10 4 ). Slide 33Donald Eastlake 3rd, Huawei July 2012

Submission doc.: IEEE 11-12/0621r4July 2012 Donald Eastlake 3rd, HuaweiSlide 34 Algorhyme V2 I hope that we shall one day see A graph more lovely than a tree. A graph to boost efficiency While still configuration-free. A network where RBridges can Route packets to their target LAN. The paths they find, to our elation, Are least cost paths to destination! With packet hop counts we now see, The network need not be loop-free! RBridges work transparently, Without a common spanning tree. - By Ray Perlner