Slide 1 Load sharing in PBB-TE Zehavit Alon IEEE Interim Meeting May 2008.

Slides:



Advertisements
Similar presentations
You have been given a mission and a code. Use the code to complete the mission and you will save the world from obliteration…
Advertisements

1 UNIT I (Contd..) High-Speed LANs. 2 Introduction Fast Ethernet and Gigabit Ethernet Fast Ethernet and Gigabit Ethernet Fibre Channel Fibre Channel High-speed.
Virtual Trunk Protocol
Greening Backbone Networks Shutting Off Cables in Bundled Links Will Fisher, Martin Suchara, and Jennifer Rexford Princeton University.
June 27, 2007 FIND Meeting, From Packet-Switching to Contract- Switching Aparna Gupta Shivkumar Kalyanaraman Rensselaer Polytechnic Institute Troy,
February 20, Spatio-Temporal Bandwidth Reuse: A Centralized Scheduling Mechanism for Wireless Mesh Networks Mahbub Alam Prof. Choong Seon Hong.
Service Oriented Architecture Reference Model
Page 1 Approximately Maximum Bandwidth Routing for Slotted Wireless Ad Hoc Networks Approximately Maximum Bandwidth Routing for Slotted Wireless Ad Hoc.
Doc.: IEEE /0165r1 SubmissionPäivi Ruuska, NokiaSlide 1 Implementation aspects of a coexistence system Notice: This document has been.
1 IEEE Media Independent Handoff Overview of services and scenarios for 3GPP2 Stefano M. Faccin Liaison officer to 3GPP2.
DRNI – Intra-DAS Link Version 01 Stephen Haddock July 20,
Doc.: IEEE xxx Submission May 10-14, 2004 Alan Carlton, Interdigital CommunicationsSlide 1 Defining Layer 2.5 Alan Carlton Interdigital Communications.
APNOMS03 1 A Resilient Path Management for BGP/MPLS VPN Jong T. Park School of Electrical Eng. And Computer Science Kyungpook National University
Igor Umansky Huub van Helvoort
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 MPLS –TP Fault OAM draft-ietf-mpls-tp-fault-01 George Swallow
Business Transaction Management Software for Application Coordination 1 Business Processes and Coordination.
1 Introducing the Specifications of the Metro Ethernet Forum.
1 Introducing the Specifications of the Metro Ethernet Forum MEF 19 Abstract Test Suite for UNI Type 1 February 2008.
Network Protection and Restoration Session 5 - Optical/IP Network OAM & Protection and Restoration Presented by: Malcolm Betts Date:
Satoshi NARIKAWA NTT (G.8032 Acting Co-editor)
ITU-T Workshop on Security Seoul (Korea), May 2002 Telecommunication network reliability Dr. Chidung LAC.
Geneva, 28 May 2010 PBB-TE Infrastructure Protection Switching Operation Bob Sultan, Huawei Technologies Joint ITU-T/IEEE Workshop on The Future of Ethernet.
Slide title minimum 48 pt Slide subtitle minimum 30 pt Service Resiliency - ITU-T SG15 Q9 Activities Ghani Abbas Ericsson 25 th.,June, 2012 Geneva Workshop.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
0 - 0.
Addition Facts
Chapter 1 Introduction Copyright © Operating Systems, by Dhananjay Dhamdhere Copyright © Introduction Abstract Views of an Operating System.
Slide 111 May 2008 Point-to-Multipoint in 802.1Qay Nurit Sprecher, Nokia Siemens Networks Hayim Porat, Ethos Networks.
Two-Market Inter-domain Bandwidth Contracting
Bus arbitration Processor and DMA controllers both need to initiate data transfers on the bus and access main memory. The device that is allowed to initiate.
Configuration management
Software change management
Effectively applying ISO9001:2000 clauses 6 and 7.
Chapter 1: Introduction to Scaling Networks
ABC Technology Project
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Distance Vector Routing Protocols Routing Protocols and Concepts –
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Subnetting IP Networks Network Fundamentals.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v MPLS VPN Technology Introducing MPLS VPN Architecture.
Finding the Critical Path
1 DRNI Examples and DAS position Maarten Vissers Version 01.
IONA Technologies Position Paper Constraints and Capabilities for Web Services
CREATING A PAYMENT REQUEST FOR A NEW VENDOR
Lets play bingo!!. Calculate: MEAN Calculate: MEDIAN
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 ETHERNET Derived From CCNA Network Fundamentals – Chapter 9 EN0129 PC AND NETWORK TECHNOLOGY.
Doc.: IEEE /0578r0 Submission 2008 May Jarkko Kneckt, NokiaSlide 1 Forwarding in mesh containing MPs in power save Date: Authors:
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 VLANs LAN Switching and Wireless – Chapter 3.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-1 Extending Switched Networks with Virtual LANs Introducing VLAN Operations.
Addition 1’s to 20.
Chapter 9: Subnetting IP Networks
25 seconds left…...
Test B, 100 Subtraction Facts
BY-LAWS COMMITTEE PRESENTATION MARCH 2007 PRESIDENTS CONFERENCE.
Week 1.
IDMP-based Fast Handoffs and Paging in IP-based Cellular Networks IEEE 3G Wireless Conference, 2001 李威廷 11/22/2001 Telcordia.
1 12/18/ :21 Chapter 12Bridges1 Rivier College CS575: Advanced LANs Chapter 12: Bridges.
MEF Reference Presentation November 2011
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 14: Protection.
January Structure of the book Section 1 (Ch 1 – 10) Basic concepts and techniques Section 2 (Ch 11 – 15): Inference for quantitative outcomes Section.
© ABB University - 1 Revision C E x t e n d e d A u t o m a t i o n S y s t e m x A Chapter 20 Import and Export Course T314.
Introduction into Simulation Basic Simulation Modeling.
802.1Qay PBB-TE Protection Switching Overview
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—8-1 MPLS TE Overview Introducing the TE Concept.
Load Sharing with 1:1 Protection Switching Alan McGuire IEEE Eilat.
SMUCSE 8344 Constraint-Based Routing in MPLS. SMUCSE 8344 Constraint Based Routing (CBR) What is CBR –Each link a collection of attributes (performance,
SMUCSE 8344 Protection & Restoration of Optical Networks.
Slide 1 MPLS-TP Linear Protection / Author / RTP IE Fixed CET I insert classification level © Nokia Siemens Networks MPLS-TP Linear Protection.
Static Routing CCNA Routing and Switching Semester 2 Chapter 6
Network Survivability
CHAPTER 8 Network Management
Presentation transcript:

Slide 1 Load sharing in PBB-TE Zehavit Alon IEEE Interim Meeting May 2008

Slide 2 Definitions BSI - Backbone service instance (identified by I-SID) TESI – TE service instance (identified by TE-SID which corresponds to a series of 3-tuples TEPG – TE Protection Group Preferred TESI - A configuration option that specifies the preferred path for a BSI Alternate TESI - A configuration option that specifies the alternate path for a BSI in the event of a failure of its preferred TESI Protection switching - Quote from the introduction of G Protection switching is a fully allocated survivability mechanism. It is fully allocated in the sense that the route and bandwidth of the protection entity is reserved for a selected working entity. It provides a fast and simple survivability mechanism.

Slide 3 Protection Switching Models Each BSI in a TESI is protected against a single failure by the other TESI that belongs to the TEPG. 1:1 w/o load sharingN×(M:1) with load sharing Each BSI in a TESI is protected against a single failure by one of the other N-1 TESIs that belong to the TEPG. One of the N TESIs in a TEPG can serve as the preferred TESI for a BSI and one of the remaining (N-1) TESIs can serve as the alternate TESI for that BSI. All the BSIs in the TEPG are carried by one of the TESIs in the TEPG. BSIs are carried by different TESIs that belong to the TEPG. The TEPG is composed of 2 TESIs. The TEPG is composed of N TESIs. (N > 1, M < N-1) One TESI in the TEPG is defined as the working TESI and the other is defined as the protection TESI. When the working TESI fails, all the BSIs that are carried by it are switched to the protecting TESI. When a TESI fails, each BSI that is carried by it is switched to one of the remaining TESIs (its alternate TESI).

Slide 4 1:1 without load sharing I-LAN 4 TESIs2 TEPG12 BSI Each BSI is mapped to the TEPG

Slide 5 N×(M:1) with load sharing I-LAN 4 TESIs1 TEPG12 BSIs Each BSI is mapped to the TEPG and is configuredwith the preferred and alternate TESIs Each BSIs from the failed TESI ismoved to a different TESI

Slide 6 Comparison between the 2 models Functionality 1:1 w/o load sharingN×(M:1) with load sharing Protection per TESI When a TESI fails, all the traffic carried by it (all the BSIs) is switched to the second TESI. To activate protection switching, the node only needs to determine the protection entity in the TEPG. Protection per BSI When a TESI fails, each BSI is switched to its alternate TESI To activate protection switching, the alternate TESI of each BSI must be determined by the node. Revertive functionality is performed per TESI None or complicated revertive functionality, Per TESI? Per BSI? LoP is determinedNone or complicated LoP. Per TESI? Per BSI?

Slide 7 Comparison between the 2 models Management and Operation 1:1 w/o load sharingN×(M:1) with load sharing Manual and Force switch to protection/working Supports the requirements defined by Josef in ay-roese-APS-protocol-1107-v01[1].pdf in November 2007 Support Manual and Force switch to TESI. A Manual switch per TESI The BSIs are switched to several TESIs. No straightforward support of the requirements defined by Josef in ay-roese-APS-protocol-1107-v01[1].pdf in November 2007 I-LAN Manual Switch of TESI Manual Switch back of BSI I-LAN Manual Switch to protection Manual Switch to working

Slide 8 Comparison between the 2 models Management and Operation 1:1 w/o load sharingN×(M:1) with load sharing Configuration of: TESIs Protection Groups BSI mapping to Protection Group Configuration of: TESIs Protection Groups BSIs mapping to Protection Group BSI preferred and alternate TESI Coordination of: TESIs configuration (revertive, protection and working) Protection Groups configuration BSI mapping to Protection Group Coordination of: Protection Groups configuration BSIs mapping to Protection Group BSI configuration to preferred and alternate TESIs

Slide 9 Comparison between the 2 models Management and Operation (contd) 1:1 w/o load sharingN×(M:1) with load sharing In transport networks, TESIs and TEPGs constitute the infrastructure that is pre-provisioned before services are mapped to it. It is straight forward to map BSIs to the infrastructure. It is difficult to efficiently determine which TESI should protect each BSI and to calculate the amount of BW that should be reserved per TESI when provisioning the infrastructure. The TEPG structure and state indicate the exact paths where traffic traverses. The TEPGs structure and state are insufficient for indicating traffic paths. The TESIs state is also insufficient, since the failure status of a TESI does not indicate the other TESIs over which its BSIs are carried. The state of each BSI should be determined.

Slide 10 Comparison between the 2 models Resource utilization 1:1 w/o load sharing N×(M:1) with load sharing The BW required to protect all the BSIs in the TEPG is 2 x ΣBW(BSI). The BW of the protection TESI and the working TESI must be identical to ensure that each BSI is protected against a single failure of the TESI. The BW of each TESI is Σ(BW(BSI). CAC can be performed easily when BSIs are assigned to a PG. This prevents assignment of BSI to the TEPG when the TESI is fully booked. The BW needed to protect all the BSI is the TEPG 2 x ΣBW(BSI) The BW of each TESI in the protection group must be the sum of the BW of all the BSIs mapped to it (preferred and alternate) This ensures that each BSI is protected against a single failure. The BW of each TESI is Σ(BW(BSI-preferred)+Σ(BW(BSI-alternate). Configuration of the preferred and alternate TESIs is a complex procedure. I-LAN 70%100% No Available BW in the alternate TESI

Slide 11 Comparison between the 2 models Signaling (future functionality) 1:1 w/o load sharing N×(M:1) with load sharing Future signaling option for coordination of configuration and operator requests will be available per TESI Depending on the information, signaling option for coordination will be per TESI or BSI. For example the following need to be signaled per BSI: mismatch, switch back, lockout of protection. If APS signaling, as defined in G.8031, is adopted, it will run on the protection entity. APS signaling will not be an option, since there is no protection entity. Can support the signaling requirements defined by Hiroshi in ay-ohta-ps-requirements v02[1].pdf in March 2008 It will be very difficult to support the requirements defined by Hiroshi in ay-ohta-ps-requirements v02[1].pdf in March 2008

Slide 12 Comparison between the 2 models General 1:1 w/o load sharing N×(M:1) with load sharing 1:1 path protection switching capable of load sharing is in the scope of the PAR NOT defined in the scope of the PAR 50G

Slide 13 Comparison between the 2 models General (contd) 1:1 w/o load sharingN×(M:1) with load sharing Bridge implementation: State machine per TEPG Bridge implementation: State machine per TESI – Different from the 1:1 state machine State machine per BSI – MANY state machines…

Slide 14 Motivation for load sharing BW saving BUT To provide protection switching, each BSI must have a pre-provisioned backup path. To provide protection for X BW, prior allocation of 2X BW is required as in 1:1 protection switching. Good utilization of network resources BUT The assignment of BSIs to TESIs is static rather than dynamic and is configured in the same way as for 1:1 protection switching. Better utilization of network resources and links BUT The same functionality can be achieved in both modes. Define 4 TESIs of 50G BW consisting of 2 TEPGs, instead of 1 TEPG with 2 TESIs of 100G each Distribute traffic between links (instead of LAG) by sharing the TEPGs among the links instead of distributing the TESIs of a single TEPG

Slide 15 Conclusions The N×(M:1) path protection with load sharing model – Does not add any useful functionality that cannot be easily achieved using the 1:1 model – Adds complexity to management and operation – Adds complexity to calculate the resources needed for each TESI in a TEPG to guarantee protection – Will be difficult to synchronize between the edges – Adds complexity in the bridges internal implementation – Not in the scope of PAR The draft covers 2 solutions with completely different mechanisms, different state machines, different capabilities, and different methods of operation for the 1:1 and N×(M:1) models. Therefore, it does not comply with the PAR that states: 1:1 path protection switching capable of load sharing.

Slide 16 Recommendation Comply with the scope of the PAR by including 1:1 path protection switching only, providing the load sharing capability by means of the 1:1 path protection mechanism Remove support for the N×(M:1) load sharing model from the current project

Slide 17 Thank You

Slide 18 Backup slides

Slide 19 Protection Switching Protection switching is defined as guarantied if the resources needed to carry traffic of failed resource are pre-alocated. I.e. each TESI must have enough BW to carry all the BSI that are mapped to it (preferred and alternate) – The assumption that N×(M:1) load sharing will save bandwidth is incorrect since all the traffic of a failed TESI must have a protection path. Similarly, the assumption that only a single TESI of a protection group may fail is incorrect. N×(M:1) load sharing can be achieved by defining several 1:1 TESIs with load sharing. Operating such a system is straightforward. Since assigning a BSI to a TESI is static rather than dynamic, traffic characteristics at a given moment (heavy or moderate) do not influence this operation.

Slide 20 Manual switch Force switch, as defined in : A Boolean flag associated with a particular TESI indicating the presence of an administrative command to make this TE service instance available while all the other TE service instances in the protection group ( ) unavailable. Its value is controlled by an administrator action ( :e6) – In this case, each TESI must be able to carry all traffic from all the other TESIs, i.e NX, in contrary to what is explained in annex M that claims that Using conventional 1:1 protection the bandwidth reserved for protection is 100% of the working bandwidth. Using 1:1 protection with load sharing the bandwidth reserved for protection can be significantly reduced On the other hand, if the command is as defined in sharing-protection-0308.pdf i.e remove traffic from a selected entity. In order to switch back to the original mapping it is necessary to locate all the switched BSIs and switch each of them back. This cannot be done per TESI since the TESI does not recognize the preferred TESI of each of the BSIs that are in the alternate TESI. sharing-protection-0308.pdf

Slide 21 Configuration and Management The configuration and management of N×(M:1) is much more complicated than 1:1 and includes additional configuration commands. Assuming we have 12 BSIs and we want to use 4 different paths, we need to configure: – N×(M:1) model 4 TESIs 1 protection group 12 BSI attachments to the protection group 24 (12 * 2) preferred and alternate TESI selection per BSI 40 commands – 1:1 model 8 TESIs 4 protection groups 12 BSI attachments to the protection groups 24 commands The configuration complexity increases the likelihood of inconsistency between the TESI edges.