1 Terminology: Segment Protection M Vinod Kumar Abhay Karandikar.

Slides:



Advertisements
Similar presentations
Intra-Carrier Solutions Enabled by the OIF NNI Erning Ye Nortel Networks.
Advertisements

Towards PAR for Segment Protection Switching
Requirements of PBB-TE Segment Protection for Consideration Ao Wei Wu
Network Protection and Restoration Session 5 - Optical/IP Network OAM & Protection and Restoration Presented by: Malcolm Betts Date:
Geneva, 28 May 2010 PBB-TE Infrastructure Protection Switching Operation Bob Sultan, Huawei Technologies Joint ITU-T/IEEE Workshop on The Future of Ethernet.
Slide 111 May 2008 Point-to-Multipoint in 802.1Qay Nurit Sprecher, Nokia Siemens Networks Hayim Porat, Ethos Networks.
1 Dr. Abhay Karandikar A Jishnu, M Vinod Kumar Protection Switching for Point to Multipoint TESI.
M Vinod Kumar Dr. Abhay Karandikar. Multiplex Entity CBP PIP Towards Core Towards Core All fault indications are available on one port All fault indications.
1 Distributed Network Protection (DNP) architecture study Maarten Vissers v4 v2: includes a few slides at the end illustrating segment protection.
Ethernet Automatic Protection Switching (EAPS)
IEEE Interim, Seoul, Sept 08 Case for Segment Protection or Local Repair M Vinod Kumar Tejas Networks.
M Vinod Kumar Tejas Networks Ltd.  Example  Requirements  Possible solutions.
1 Distributed Network Protection (DNP) architecture study Maarten Vissers v3 v2: includes a few slides at the end illustrating segment protection.
Segment Protection Scaling Bob Sultan Deng Zhusheng.
SPANNING TREE PROTOCOL (STP) VARIANTS Rapid Spanning Tree Protocol (RSTP) -The reason behind the word «rapid» Multiple Spanning Tree Protocol (MSTP)
Ethernet and switches selected topics 1. Agenda Scaling ethernet infrastructure VLANs 2.
Sept 28, 2004CS573: Network Protocols and Standards D – Selective Multicast Network Protocols and Standards Autumn
802.1D – Selective Multicast
Dec 6, 2007CS573: Network Protocols and Standards1 Transparent Bridging Network Protocols and Standards Winter
Jan 01, 2008CS573: Network Protocols and Standards D – Selective Multicast Network Protocols and Standards Winter
Path Protection in MPLS Networks Using Segment Based Approach.
Bridges. Figure 6.79 Bridges Operate at the data link layer Also use backward learning in recording source address on transmissions Unlike repeaters,
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—3-1 Implementing Spanning Tree Describing STP Stability Mechanisms.
Introduction to Computer Networks 09/23 Presenter: Fatemah Panahi.
Layer-3 Routing Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
1 Multipoint Ethernet Connection Protection
Routing ROUTING. Router A router is a device that determines the next network point to which a packet should be forwarded toward its destination Allow.
DataLink Layer1 Ethernet Technologies: 10Base2 10: 10Mbps; 2: 200 meters (actual is 185m) max distance between any two nodes without repeaters thin coaxial.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-1 Configuring Catalyst Switch Operations Introducing Spanning Tree Protocol.
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
1 Terminology: Segment Protection M Vinod Kumar Abhay Karandikar.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Lecture 12: LAN Redundancy Switched Networks Assistant Professor Pongpisit.
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
Example STP runs on bridges and switches that are 802.1D-compliant. There are different flavors of STP, but 802.1D is the most popular and widely implemented.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 LAN Switching and Wireless Implement Spanning Tree Protocols (STP) Chapter.
1 Transparent Bridging Advanced Computer Networks.
Chapter 8: Virtual LAN (VLAN)
Routing ROUTING Presented by Aditya Kumar Gupta Lecturer, Department of Computer Application SMS Varanasi.
1 Forwarding Ambiguity M Vinod Kumar Dr. Abhay Karandikar.
PRESENTATION ON:- INTER NETWORK Guided by: Presented by:- Prof. Ekta Agrwal Dhananjay Mishra Prafull Jain Vinod Kumawat.
Tejas Networks Ltd 2010 Shortcuts 1.AgendaAgenda 2.Indian ScenarioIndian Scenario 3.P2P PBB-TEP2P PBB-TE 4.P2MP PBB-TEP2MP PBB-TE 5.Critical LinkCritical.
NET 324 D Networks and Communication Department Lec1 : Network Devices.
Star Topology Star Networks are one of the most common network topologies. consists of one central switch, hub or computer, which acts as a conduit to.
McGraw-Hill©The McGraw-Hill Companies, Inc., Chapter 16 Connecting LANs, Backbone Networks, and Virtual LANs.
1 Version 3.0 Module 7 Spanning Tree Protocol. 2 Version 3.0 Redundancy Redundancy in a network is needed in case there is loss of connectivity in one.
Local-Area Networks. Topology Defines the Structure of the Network – Physical topology – actual layout of the wire (media) – Logical topology – defines.
NETWORK DEVICES RONALD SHERGA OCTOBER 13, 2015 LTEC 4550.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 VLANs LAN Switching and Wireless – Chapter 3.
NETWORK DEVICES Department of CE/IT.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implement Spanning Tree Protocols (STP) LAN Switching and Wireless – Chapter.
M Vinod Kumar Tejas Networks Ltd.  Example  Requirements  Possible solutions.
Chapter-5 STP. Introduction Examine a redundant design In a hierarchical design, redundancy is achieved at the distribution and core layers through additional.
1 Distributed Network Protection (DNP) architecture study Maarten Vissers v1.
Draft-mpls-tp-OAM-maintnance-points-00
LAN Switching and Wireless – Chapter 3
Virtual Local Area Networks or VLANs
Lab 2 – Hub/Switch Data Link Layer
Lab 2 – Hub/Switch Data Link Layer
Virtual LANs.
Connecting LANs, Backbone Networks, and Virtual LANs
Connecting LANs, Backbone Networks, and Virtual LANs
LAN Switching and Wireless – Chapter 3
RNI Requirements Imposed by PBB-TE
Connecting LANs, Backbone Networks,
Segment Protection Models
COMMON LAYER 2 DEVICES AND FUNCTIONALITIES.
LAN Switching and Wireless – Chapter 3
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
LAN Switching and Wireless – Chapter 3
Co-ordination Between Segment Protection and Global Protection
Presentation transcript:

1 Terminology: Segment Protection M Vinod Kumar Abhay Karandikar

Topology This port has FDB entry such that the two ESPs to DA=5 egress from the same port These two ports though have shared forwarding towards DA=5, do not have shared forwarding for traffic from SA= 5

Topology This port has FDB entry such that the two ESPs egress from the same port These two ports though have shared forwarding towards node 4, do not have shared forwarding for traffic from node 4 to DA=5 (or 6) and vice-versa on port 4  3 6

Infrastructure Traffic over this Link/LAN can be protected using backup resources comprising of: LAN 3-6, LAN 6-4 and node 6 6 Backup resources

Infrastructure Segment Primary Infrastructure Segment (resources shown in violet colour) 6 Protection Domain Backup Infrastructure Segment (resources shown in cream colour)

Infrastructure Segment Protection Primary Infrastructure Segment (P-IS) has its own fault monitoring mechanism 6 Infrastructure Segment Protection Domain Backup Infrastructure Segment (B-IS) has its own fault monitoring mechanism

ISP OAM The P-IS fault monitoring is independent of TESI fault-monitoring/OAM 6 The B-IS fault monitoring is independent of TESI fault-monitoring/OAM Infrastructure Segment Protection Domain

P-IS Fault and Protection Fault here will forward the traffic over backup infrastructure segment 6 Infrastructure Segment Protection Domain TESIs are pre-provisioned along the Backup Infrastructure Segment for sub-50ms protection switching

Data Path Fault If TESI is misconfigured on node 3 or 4 such that it does not flow over link 3-4, it is data-path fault; it is out-side the scope 6 TESI or Data-path mis- configuration is outside the scope of ISP Infrastructure Segment Protection (ISP) Domain

Example of Data-path Segments Examples of Data path (DP) segment- It is configuration that enables flow of TESI 6 Infrastructure Segment Protection (ISP) Domain Many Data paths can flow over the same Infrastructure Segment IS fault implies DP fault DP fault does not imply IS fault Many Data paths can flow over the same Infrastructure Segment IS fault implies DP fault DP fault does not imply IS fault

Types of Segments There are two types of Segments 1.Infrastructure Segment – LANs and intervening bridge – Has its own Segment OAM 2.Data Path Segment – Forwarding information configured on the bridges – Has its own E2E OAM

Types of Segment Protection Therefore we have two types of segment protection Infrastructure Segment Protection (ISP) – Protection of traffic from failure of LANs and intervening bridges Data-path Segment Protection (DSP) – Protection from misconfiguration of TESI or Data- path

Example of Unprotected IS Example of Infrastructure Segment that cannot protect the TESIs 6

Example of Adjacent ISP Domain Allow maintenance activities to be performed independently in different infrastructure segment protection domain. Allow maintenance activities to be performed in one segment of a network without disabling protection in another inf. segment. Localize changes in traffic distribution due to failure or maintenance actions. Allow maintenance activities to be performed independently in different infrastructure segment protection domain. Allow maintenance activities to be performed in one segment of a network without disabling protection in another inf. segment. Localize changes in traffic distribution due to failure or maintenance actions.

Example of Adjacent ISP Domain Allow maintenance activities to be performed independently in different infrastructure segment protection domain. Allow maintenance activities to be performed in one segment of a network without disabling protection in another inf. segment. Localize changes in traffic distribution due to failure or maintenance actions. Allow maintenance activities to be performed independently in different infrastructure segment protection domain. Allow maintenance activities to be performed in one segment of a network without disabling protection in another inf. segment. Localize changes in traffic distribution due to failure or maintenance actions.

78 Example of Adjacent ISP Domain Allow maintenance activities to be performed independently in different infrastructure segment protection domain. Allow maintenance activities to be performed in one segment of a network without disabling protection in another inf. segment. Localize changes in traffic distribution due to failure or maintenance actions. Allow maintenance activities to be performed independently in different infrastructure segment protection domain. Allow maintenance activities to be performed in one segment of a network without disabling protection in another inf. segment. Localize changes in traffic distribution due to failure or maintenance actions.

Terminology

Some Points to be Noted Segment Protection is not a replacement for e2e TESI protection Primary reason- infrastructure failure in certain parts of the network – Some links/nodes/LANs are more prone to failure – SPS will be enabled for only these links/nodes/LANs

Questions?