Operations and Maintenance Next Generation Requirements draft-amante-oam-ng-requirements-01 Shane Amante Alia Atlas Andrew Lange Danny McPherson March.

Slides:



Advertisements
Similar presentations
1 Routing Protocols I. 2 Routing Recall: There are two parts to routing IP packets: 1. How to pass a packet from an input interface to the output interface.
Advertisements

OLD DOG CONSULTING Challenges and Solutions for OAM in Point-to-Multipoint MPLS Adrian Farrel, Old Dog Consulting Ltd. Zafar Ali, Cisco Systems, Inc.
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
Internetworking II: MPLS, Security, and Traffic Engineering
TELE202 Lecture 8 Congestion control 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »X.25 »Source: chapter 10 ¥This Lecture »Congestion control »Source:
CCNA2 Module 4. Discovering and Connecting to Neighbors Enable and disable CDP Use the show cdp neighbors command Determine which neighboring devices.
1 Semester 2 Module 4 Learning about Other Devices Yuda college of business James Chen
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
December 20, 2004MPLS: TE and Restoration1 MPLS: Traffic Engineering and Restoration Routing Zartash Afzal Uzmi Computer Science and Engineering Lahore.
Announcement r Project 3 out, due 3/10 r Homework 3 out last week m Due next Mon. 3/1.
1 Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. Dynamic Routing Protocols II OSPF.
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
Network Layer Moving datagrams. How do it know? Tom-Tom.
1 Version 3.1 Module 4 Learning About Other Devices.
Network Redundancy Multiple paths may exist between systems. Redundancy is not a requirement of a packet switching network. Redundancy was part of the.
M.Menelaou CCNA2 ROUTING. M.Menelaou ROUTING Routing is the process that a router uses to forward packets toward the destination network. A router makes.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 6 Routing and Routing Protocols.
End-to-end resource management in DiffServ Networks –DiffServ focuses on singal domain –Users want end-to-end services –No consensus at this time –Two.
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
IP Forwarding.
10/8/2015CST Computer Networks1 IP Routing CST 415.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 9 Basic Router Troubleshooting.
1 Flow Identification Assume you want to guarantee some type of quality of service (minimum bandwidth, maximum end-to-end delay) to a user Before you do.
1 Network Layer Lecture 13 Imran Ahmed University of Management & Technology.
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 6: Static Routing Routing and Switching Essentials.
A Snapshot on MPLS Reliability Features Ping Pan March, 2002.
CSC 600 Internetworking with TCP/IP Unit 7: IPv6 (ch. 33) Dr. Cheer-Sun Yang Spring 2001.
U-Turn Alternates for IP/LDP Local Protection draft-atlas-ip-local-protect-uturn-00.txt Alia Atlas Gagan Choudhury
Network Layer4-1 The Internet Network layer forwarding table Host, router network layer functions: Routing protocols path selection RIP, OSPF, BGP IP protocol.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 06_a Routing Protocols: RIP, OSPF, BGP Instructor: Dr. Li-Chuan Chen Date: 10/06/2003 Based in part upon.
MPLS-TP INTER-OP: WHAT, WHY, AND HOW? General Objectives for MPLS-TP Inter-Op Test Program at UNH-IOL.
ICS 156: Networking Lab Magda El Zarki Professor, ICS UC, Irvine.
Internet Protocols. ICMP ICMP – Internet Control Message Protocol Each ICMP message is encapsulated in an IP packet – Treated like any other datagram,
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 6: Static Routing Routing and Switching Essentials.
© 2002, Cisco Systems, Inc. All rights reserved..
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 4 Learning About Other Devices.
1 IEX8175 RF Electronics Avo Ots telekommunikatsiooni õppetool, TTÜ raadio- ja sidetehnika inst.
Entropy Labels in MPLS Forwarding draft-kompella-mpls-entropy-label-01 Kireeti Kompella Juniper Networks Shane Amante Level 3 Communications.
Entropy Labels in MPLS Forwarding draft-kompella-mpls-entropy-label-02
An Introduction to Mobile IPv4
A Snapshot on MPLS Reliability Features Ping Pan March, 2002.
1 © 2004, Cisco Systems, Inc. All rights reserved. Routing and Routing Protocols: Routing Static.
KYUNG-HWA KIM HENNING SCHULZRINNE 12/09/2008 INTERNET REAL-TIME LAB, COLUMBIA UNIVERSITY DYSWIS.
1 Revision to DOE proposal Resource Optimization in Hybrid Core Networks with 100G Links Original submission: April 30, 2009 Date: May 4, 2009 PI: Malathi.
CHAPTER 6: STATIC ROUTING Static Routing 2 nd semester
MPLS WG Meeting IETF 58 Paris Detecting MPLS Data Plane Failures in Inter-AS and inter-provider Scenarios draft-nadeau-mpls-interas-lspping-00.txt Tom.
MPLS Introduction How MPLS Works ?? MPLS - The Motivation MPLS Application MPLS Advantages Conclusion.
Flow OAM Requirements Janardhanan Pathangi Balaji Venkat Venkataswami DELL Richard Groves – Microsoft Peter Hoose – Facebook
1 Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. Dynamic Routing Protocols II OSPF.
Advanced Computer Networks
Routing Jennifer Rexford.
Instructor Materials Chapter 6: VLANs
Inter domain signaling protocol
Routing and Routing Protocols: Routing Static
ICMP ICMP – Internet Control Message Protocol
IP Forwarding Covers the principles of end-to-end datagram delivery in IP networks.
Introduction to Networking
Chapter 2: Static Routing
CCNA 2 v3.1 Module 6 Routing and Routing Protocols
THE NETWORK LAYER.
IP Forwarding Relates to Lab 3.
Chapter 2: Static Routing
Routing and Switching Essentials v6.0
Routing and Routing Protocols: Routing Static
Static Routing 1st semester
Networking and Network Protocols (Part2)
IP Forwarding Relates to Lab 3.
Static Routing 2nd semester
Presentation transcript:

Operations and Maintenance Next Generation Requirements draft-amante-oam-ng-requirements-01 Shane Amante Alia Atlas Andrew Lange Danny McPherson March 10, 2008

Overview Why use LAG, ECMP? Background Use Cases Intra- vs. Inter-AS OAM Requirements Path Capabilities

Why use LAG, ECMP? LAG, ECMP and ECMP over LAG are used to increase virtual bandwidth between two, or more, [adjacent] nodes. Why not just use larger links (e.g.: 40G, 100G) and avoid these problems? –Because the problems discussed in this draft still exist with N x 40G, N x 100G, etc.

Background & Goals Inspired by: draft-atlas-icmp-unnumbered –This memo defines ICMP extensions through which an router or host can explicitly identify the interface upon which an undeliverable datagram arrived. The incoming interface can be identified by ifIndex, name, and/or address. The extensions defined herein are particularly useful when troubleshooting networks with unnumbered interfaces, parallel interfaces and/or asymmetric routing. Goal: Specify requirements to enhance IP & MPLS traceroute and ping to identify and exercise specific paths through links consisting of LAG, ECMP and ECMP over LAG. –i.e., update traceroute/ping for the 21st century. Prefer one solution, which addresses: –Intra-AS: Lots of information returned to originator –Inter-AS: Limited/Select information returned to originator

Scenario 1: Traceroute thru Routed Hops During traceroute from R1 to R3, need to know: –Actual component-links used on output and input for a particular user’s microflow. If no response from R3, want to know output component-link used by R2 to get to R3. If using “legacy” ping, from R1 to R3, it is not guaranteed to be hashed onto same LAG or ECMP component-links as end-user traffic. R1R2R3 A1 B1 C1 A2 B2 C2 D1 E1 D2 E2 LAG-1LAG-2 Intf-1: /30 Intf-2: /30Intf-4: /30 Intf-3: /30

Scenario 2: Traceroute thru 1 Switched Hop Mostly the same as Scenario 1, except puts more emphasis on the need to: –Have R1 return outgoing component-link ID, in cases where SW1 dies. –In addition, because SW1 makes an independent hashing decision on IP/MPLS packets need R2 to return incoming component-link ID. R1SW1R2 A1 B1 A2 B2 C1 E1 C2 E2 LAG-1LAG-2 Intf-1: /30 Intf-2: /30 D1D2

Scenario 3: Traceroute thru 2+ Switched Hops Scenario common in Enterprise or DataCenter environments. SW1 & SW2 commonly understand how to load- hash based on outer IP and/or MPLS payloads to make effective use of bandwidth between them. “Legacy” traceroute is ineffective because you will not know the identity of component-links between SW1 SW2. “Legacy” ping is ineffective because traffic is not guaranteed to use component-links as end-user traffic between SW1 SW2 R2. R1SW2R2 A1 B1 A2 B2 E1 G1 E2 G2 LAG-1LAG-3 Intf-1: /30 Intf-2: /30 F1F2 SW1 C1 D1 C2 D2 LAG-2

Other scenarios ECMP: TBD Proxy Traceroute/Ping: –Need for functionality similar to draft-ietf-mpls- remote-lsp-ping –PTR/PTP are important, in order to scale automated performance monitoring of larger networks. Performance Monitoring –Used for automatically & proactively detecting (soft) failures in the network. –Discuss differences between: Proactive Periodic Perf. Monitoring Proactive Perpetual Perf. Monitoring

Intra-AS OAM Reqmt’s Must work with IP and MPLS Traceroute Probe Requests: –Ability to specify input “keys” to hash/ECMP algorithm, (e.g.: 5-tuple for IP), in probe payload to exercise hash algorithm with ‘real’ customer traffic. Traceroute Probe Replies: –Incoming Interface Name (+ Descr) –Outgoing Interface Name (+ Descr) –# of component-links in a bundle –% BW Utilization on interface(s) –Remote Link-Layer neighbor name + Interface Name Required for automatically identifying Layer-2 switched hops Ping –Ability to input “keys” to hash/ECMP algorithm, (e.g.: 5-tuple for IP), in probe payload to exercise hash algorithm with ‘real’ customer traffic. –MUST follow data plane for forwarding within the network elements. Proxy Traceroute/Ping Support –Used by Network Monitoring systems to proactively exercise paths through network similar to MPLS LSR self-test. Need some form of (lightweight) authentication for Intra-AS OAM to only reveal detailed network knowledge to “trusted” entities. –Also, recommend that dropping OAM packets may be necessary to prevent starvation of resources within network elements.

Inter-AS OAM Reqmt’s Must work with IP and MPLS –For example: customer & peering links Traceroute Probe Requests: –Ability to specify input “keys” to hash/ECMP algorithm, (e.g.: 5-tuple for IP), in probe payload to exercise hash algorithm with ‘real’ customer traffic. Traceroute Probe Replies: –Incoming Interface Name –Outgoing Interface Name Ping –Ability to specify input “keys” to hash/ECMP algorithm, (e.g.: 5-tuple for IP), in probe payload to exercise hash algorithm with ‘real’ customer traffic.

Path Capabilities Probe before traceroute? Or, Designate special label/codepoint for “new” OAM protocol? Draft currently recommends latter approach to deterministically deal with cases of oscillating links and/or paths.

Comments? Questions?