By Alex Audu Forces-PL Design Criteria. NOKIA RESEARCH CENTER / BOSTON NE (Network Element) WITH STATE NE (Network Element) WITH STATE  Importance of.

Slides:



Advertisements
Similar presentations
Packet Switching COM1337/3501 Textbook: Computer Networks: A Systems Approach, L. Peterson, B. Davie, Morgan Kaufmann Chapter 3.
Advertisements

H. 323 Chapter 4.
By Ram Gopal, Alex Audu, Chaoping Wu, Hormuzd Khosravi Forwarding and Control Element Protocol (FACT)
OSI Model OSI MODEL.
Multi-Layer Switching Layers 1, 2, and 3. Cisco Hierarchical Model Access Layer –Workgroup –Access layer aggregation and L3/L4 services Distribution Layer.
UNIT-IV Computer Network Network Layer. Network Layer Prepared by - ROHIT KOSHTA In the seven-layer OSI model of computer networking, the network layer.
Network Layer and Transport Layer.
CCU EE&CTR1 Software Architecture Overview Nick Wang & Ting-Chao Hou National Chung Cheng University Control Plane-Platform Development Kit.
Network Management Overview IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Transport Protocols Slide 1 Transport Protocols.
1 25\10\2010 Unit-V Connecting LANs Unit – 5 Connecting DevicesConnecting Devices Backbone NetworksBackbone Networks Virtual LANsVirtual LANs.
Gursharan Singh Tatla Transport Layer 16-May
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
MESH Implementation With AP5131 version R.
What Can IP Do? Deliver datagrams to hosts – The IP address in a datagram header identify a host IP treats a computer as an endpoint of communication Best.
Weiming Wang Institute of Networks and Communication Engineering Zhejiang Gongshang University, P. R.
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
Protocols and the TCP/IP Suite
M3UA Patrick Sharp.
Jon Maloy, Ericsson Steven Blake, Ericsson Maarten Koning, WindRiver draft-maloy-tipc-00.txt Transparent Inter Process Communication TIPC.
Req1 - Separability Old: –An RO scheme MUST have the ability to be bypassed by traffic types that desire to use bidirectional tunnels through an HA. New:
ARMADA Middleware and Communication Services T. ABDELZAHER, M. BJORKLUND, S. DAWSON, W.-C. FENG, F. JAHANIAN, S. JOHNSON, P. MARRON, A. MEHRA, T. MITTON,
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
TELE202 Lecture 5 Packet switching in WAN 1 Lecturer Dr Z. Huang Overview ¥Last Lectures »C programming »Source: ¥This Lecture »Packet switching in Wide.
Data and Computer Communications Circuit Switching and Packet Switching.
ECE 4450:427/527 - Computer Networks Spring 2015 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 2: Overview of Computer Network.
G-Number 1 Forwarding and Control Element Separation (ForCES) Overview & Requirements Update Todd A. Anderson.
1 TCP/IP based TML for ForCES Protocol Hormuzd Khosravi Furquan Ansari Jon Maloy 61 st IETF Meeting, DC.
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
The InetAddress Class A class for storing and managing internet addresses (both as IP numbers and as names). The are no constructors but “class factory”
1 TCP/IP based TML (Transport Mapping Layer) for ForCES Protocol Hormuzd Khosravi Shuchi Chawla Furquan Ansari Jon Maloy 62 nd IETF Meeting, Minneapolis.
May 2003National Coastal Data Development Center Brief Introduction Two components Data Exchange Infrastructure (DEI) Spatial Data Model (SDM) Together,
Lecture 4 Overview. Ethernet Data Link Layer protocol Ethernet (IEEE 802.3) is widely used Supported by a variety of physical layer implementations Multi-access.
OSI Reference Model. Open Systems Interconnection (OSI) Model International standard organization (ISO) established a committee in 1977 to develop an.
ForCES protocol updates draft-ietf-forces-protocol-04.txt Robert Haas, Aug 1, 2005 IETF 63, Paris.
By Alex Audu, Jamal H. Salim, Avri Doria Forces-IPTML Design.
CCSDS SOIS Working Group Meeting – Berlin, Germany 14th of October 2008 Prototyping of CCSDS SOIS services on 1553 Bus Sev Gunes-Lasnet, Olivier Notebaert.
AMQP, Message Broker Babu Ram Dawadi. overview Why MOM architecture? Messaging broker like RabbitMQ in brief RabbitMQ AMQP – What is it ?
Jon Maloy, Ericsson Steven Blake, Modularnet Maarten Koning, WindRiver Jamal Hadi Salim,Znyx Hormuzd Khosravi,Intel draft-maloy-tipc-01.txt TIPC as TML.
E81 CSE 532S: Advanced Multi-Paradigm Software Development Venkita Subramonian, Christopher Gill, Ying Huang, Marc Sentany Department of Computer Science.
1 IEX8175 RF Electronics Avo Ots telekommunikatsiooni õppetool, TTÜ raadio- ja sidetehnika inst.
August 2, 2005 IETF 63 – Paris, France Media Independent Handover Services and Interoperability Ajay Rajkumar Chair, IEEE WG.
Enterprise Computing with Jini Technology Mark Stang and Stephen Whinston Jan / Feb 2001, IT Pro presented by Alex Kotchnev.
Company LOGO Network Management Architecture By Dr. Shadi Masadeh 1.
1 TIPC based TML for ForCES Protocol Jon Maloy Shuchi Chawla Hormuzd Khosravi Furquan Ansari Jamal Hadi Salim 63 rd IETF Meeting, Paris.
K. Salah1 Security Protocols in the Internet IPSec.
Mr. Sathish Kumar. M Department of Electronics and Communication Engineering I’ve learned that people will forget what you said, people will forget what.
Fabric: A Retrospective on Evolving SDN Presented by: Tarek Elgamal.
DOTS Requirements Andrew Mortensen November 2015 IETF 94 1.
Ch 3. Transport Layer Myungchul Kim
Computer Engineering and Networks, College of Engineering, Majmaah University Protocols OSI reference MODEL TCp /ip model Mohammed Saleem Bhat
Ethernet Packet Filtering - Part1 Øyvind Holmeide Jean-Frédéric Gauvin 05/06/2014 by.
OSI Model OSI MODEL. Communication Architecture Strategy for connecting host computers and other communicating equipment. Defines necessary elements for.
OSI Model OSI MODEL.
Multi Node Label Routing – A layer 2.5 routing protocol
Multi-layer software defined networking in GÉANT
UNIT-V Transport Layer protocols for Ad Hoc Wireless Networks
Cluster Communications
Lecturer, Department of Computer Application
100% REAL EXAM QUESTIONS ANSWERS
DEPARTMENT OF COMPUTER SCIENCE
Understand Networking Services
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
* Essential Network Security Book Slides.
ECE 4450:427/527 - Computer Networks Spring 2017
CS 4594 Broadband PNNI Signaling.
OSI Model OSI MODEL.
Chapter 2: Operating-System Structures
Chapter 2: Operating-System Structures
Presentation transcript:

by Alex Audu Forces-PL Design Criteria

NOKIA RESEARCH CENTER / BOSTON NE (Network Element) WITH STATE NE (Network Element) WITH STATE  Importance of NE State Attribute  Knowing the reliability and availability of the NE in a deterministic way depends on knowing the state.  Redundancy operation depends on accurate state knowledge. NE with STATE

NOKIA RESEARCH CENTER / BOSTON NE-STATES  NE STATES  OUT-OF-SERVICE (OOS)  IN-SERVICE (ISV) IN-SERVICE-STANDBY (IN-SERVICE-INACTIVE) IN-SERVICE-ACTIVE  STATE CHARACTERISTICS  OOS : 1. NE WON’T CARRY TRAFFIC 2. NE WILL NOT HONOR TRAFFIC RELATED REQUESTS 3. WILL HONOR MAINTANANCE RELATED REQUESTS ISV: 1. NE CAN CARRY TRAFFIC 2. NE WILL HONOR TRAFFIC RELATED REQUESTS 3. NE WILL HONOR MAINTANANCE REALTED REQUESTS

NOKIA RESEARCH CENTER / BOSTON NE STATE TRANSITIONS ACTIVE INACTIVE OOS Removal OR Failure Command Command or Failure Command

NOKIA RESEARCH CENTER / BOSTON Use of State Information  Proper operation of redundant NE peer in a network depends on knowledge of NE state.  Because you can have failure induced transitions, it is vital to account for the NE state since this will impact states of the elements in the NE. NE1 STDBY NE2 ACTIVE traffic

NOKIA RESEARCH CENTER / BOSTON STATES INSIDE THE NE  NE Consists of Control and Forwarding elements  ForCES has decoupled Control elements (CE) from Forwarding elements (FE) and interconnected by ForCES protocol. CE FE CE FE Forces Protocol

NOKIA RESEARCH CENTER / BOSTON Element States inside NE  CE has states:  OOS, ISV-STDBY, ISV-ACTIVE  FE has states:  OOS, ISV-STDBY, ISV-ACTIVE  How do these states determine NE state? CE State FE State NE State oos isv oos oos (policy) oos isv isv (policy) active isv activeactive (policy) active

NOKIA RESEARCH CENTER / BOSTON Forces-PL Element States ACTIVE INACTIVE DOWN CE/FE down CE-FE communication failure CE/FE inactive CE/FE active Alternate CE/FE active CE/FE down CE-FE communication failure CE/FE UP

NOKIA RESEARCH CENTER / BOSTON Protocol Overview  ForCES Protocol has to reflect FE states at the CE and CE states at the FE.  ForCES Protocol has to provide both reliable, and unreliable congestion aware links between CE and FE.  Protocol supports communication between CE and FE in a distributed fault-tolerant manner.  Master/Slave relationship between CE-FE.  Protocol messages separated into cohesive groups or messages classes.  Use of Message classes allows for effective management of messages  Use of Message classes allows for effective management of software maintenance/life-cycle management  Uses ACKs and Responses freely to guarantee message delivery and mutual agreement and understanding

NOKIA RESEARCH CENTER / BOSTON Messaging Design (1)  Three possibilities: Fully Coupled API, Fully Decouple API, and Decoupled Cohesive API.  Fully Coupled API (FCA): One generic message API with one Set() and one Get() functions, each with parameters to identify what data is being accessed.  Pros: Smallest code foot-print in memory.  Cons: Results in huge “case” or “if” statement May result in sluggish protocol performance since cycles are wasted navigating a long list of “if” or “case” statements Not good for code maintenance, since any code change makes testing every legacy functionality necessary during regression testing

NOKIA RESEARCH CENTER / BOSTON Messaging Design (2)  Fully Decoupled API (FDA): Every protocol function has its set() and get() method.  Pros: fastest and most agile protocol since no time is wasted trying to resolve message target Best for code maintenance since methods are fully decoupled and changing one or adding a new one doesn’t impact existing code integrity. Thus only need to test added or modified function or feature.  Cons: Results in lots of message APIs being defined and implemented Consumes most memory space

NOKIA RESEARCH CENTER / BOSTON Messaging Design (3)  Decoupled Cohesive API (DCA): Functions are decoupled into cohesive groups. This is best of both worlds. Forces-pl uses message classes to group cohesive functions.  Pros: Best of both worlds Results in fast protocol operation since “case” or “if” statements are short if they exist, and not many cycles are wasted in navigating them. Memory usage is optimal Code maintenance is manage-able: code change impacts are constrained to modified classes, and only features related to those classes need tested when doing regression testing.  Cons: Less processor cycle time efficient compared to FDA. Code maintenance is less efficient compared to FDA

NOKIA RESEARCH CENTER / BOSTON Messaging Design (4)  Forces-pl uses ACKs and responses when communicating between peers.  Misunderstanding about ACKs when transport is reliable  Reliable transport guarantees message gets delivered  Need ACKs or responses to ensure peers agree on what needs to be done

NOKIA RESEARCH CENTER / BOSTON Forces-PL Message Structure verseTypeprioreservedmsgClassmsgType Message length Source-TagDestination-Tag Sequence Number Message body ( Payload)

NOKIA RESEARCH CENTER / BOSTON Message Class and Messages (1)  Association Establishment  To establish logical connection between CE and FE  Join, Leave message etc (multicast and unicast)  Capabilities Exchange & Configuration  To exchange FE’s capabilities and to configure FE’s functions.  Capability request, Configure FE Blocks, Topology request etc  State Maintenance  To track element states and report state changes.  Heart-beat, PE UP, PE Down, PE Active and Inactive etc

NOKIA RESEARCH CENTER / BOSTON Message Class and Messages (2)  Traffic Maintenance  To control data and control traffic between CE and FE.  Packet Redirection, Control packet forwarding etc.  Event Notification  Asynchronous status change notification by FE to CE.  Event Register, Deregister, Notification message,etc..  Vendor and Application Specific  To extend the protocol beyond its current capabilities.  To exchange application data

NOKIA RESEARCH CENTER / BOSTON Layers and Interfaces CE ForcesPL TML ForcesPL Silicon API FE Internal Control External Control Data Wire

NOKIA RESEARCH CENTER / BOSTON Layers  TML  Adapts ForCES-PL to non-IP transports (i.e. IP other)  If transport is IP, we shouldn’t need TML.  Very thin layer (doesn’t do authentication or any such thing)  Makes connections with as much transparency as possible  Stateless, unless when providing reliability over un-reliable transport.  Silicon API in FE  Well defined interface for ForCES-PL to talk to FE silicon.  Needed to decouple protocol from details of FE silicon  Allows FE silicon and Forces-PL to evolve independently.

NOKIA RESEARCH CENTER / BOSTON DOS Protection  Separate Control Channels  One for internally generated control data  One for externally sourced control data (e.g. hellos,..)  Created by establishing two Associations, one for each data path.

NOKIA RESEARCH CENTER / BOSTON Questions

Backup

FECE Join Request Join Response Capability Request Capability Response Topology Request Topology Response PE UP PE UP ack PE (FE) ACTIVE PE ACTIVE ack Association Phase Validation of FE endpoint FE Block addressing, handles and relationship State Maintenance (Element State) Data Channel Estab 11

NOKIA RESEARCH CENTER / BOSTON FECE Heart beat request Heart beat response Query Request Query Response Port Event Notification Configure Logical Comps Req Normal Operation Control packet redirect Configure Logical Comps Ack