Shortest Path Bridging IEEE 802.1aq
|
|
|
- Jessie Wright
- 10 years ago
- Views:
Transcription
1 Shortest Path Bridging IEEE 802.1aq NANOG49 June 13-16/2010 Peter Ashwood-Smith Fellow
2 Abstract 802.1aq Shortest Path Bridging is being standardized by the IEEE as an evolution of the various spanning tree protocols aq allows for true shortest path routing, multiple equal cost paths, much larger layer 2 topologies, faster convergence, vastly improved use of the mesh topology, single point provisioning for logical membership (E-LINE/E-LAN/E-TREE etc), abstraction of attached device MAC addresses from the transit devices, head end and/or transit multicast replication, all while supporting the full suit of OA&M. 2
3 Outline Challenges What is 802.1aq/SPB Applications How does it work Example (won t cover but included here) 3
4 Challenges L2 networks that scale to ~1000 bridges. Use of arbitrary mesh topologies. Use of (multiple) shortest paths. Efficient broadcast/multicast routing and replication points. Avoid address learning by tandem devices. Get recovery times into 100 s of millisecond range for larger topologies. Good scaling without loops. Allow creation of very many logical L2 topologies (subnets) of arbitrary span. Maintain all L2 properties within the logical L2 topologies (transparency, ordering, symmetry, congruence, shortest path etc). Reuse all existing Ethernet OA&M 802.1ag/Y
5 Example STP 36 nodes 1- Can t use these links SOURCE ROOT A1.. A100 DEST 2 - LEARN A1..A100 5
6 Outline Challenges What is 802.1aq/SPB Applications How does it work 6
7 What is 802.1aq/SPB IEEE protocol builds on standards A new control plane for Q-in-Q and M-in-M Leverage existing inexpensive ASICs Q-in-Q mode called SPBV M-in-M mode called SPBM Backward compatible to ag, Y.1731, Data Center Bridging suite Multiple loop free shortest paths routing Excellent use of mesh connectivity Currently 16, path to 1000 s including hashed per hop. Optimum multicast head end or tandem replication 7
8 What is 802.1aq/SPB (cont d) Light weight form of traffic engineering Head end assignment of traffic to 16 shortest paths. Deterministic routing - offline tools predict exact routes. Scales to ~1000 or so devices Uses IS-IS already proven well beyond Huge improvement over the STP scales. Good convergence with minimal fuss sub second (modern processor, well designed) below 100ms (use of hardware multicast for updates) Includes multicast flow when replication point dies. Pre-standard seeing 300ms ~50 nodes. IS-IS Operate as independent IS-IS instance, or within IS-IS/ IP, supports Multi Topology to allow multiple instances efficiently. 8
9 What is 802.1aq/SPB (cont d) Membership advertised in same protocol as topology. Minimizes complexity, near plug-and-play Support E-LINE/E-LAN/E-TREE All just variations on membership attributes. Address learning restricted to edge (M-in-M) FDB is computed and populated just like a router. Unicast and Multicast handled at same time. Nodal or Card/Port addressing for dual homing. Computations guarantee ucast/mcast Symmetry (same in both directions) Congruence (unicast/multicast follow same route) Tune-ability (currently 16 equal costs paths opaque allows more) 9
10 End result - Visually All links usable Multiple Shortest Path routing + Ethernet OA&M 10
11 Outline Challenges What is 802.1aq/SPB Applications How does it work 11
12 Application (M R)STP replacement Regions for scale Small # of trees R R Unused links Large number of source specific trees (computed). All links usable No regions needed Scoped exactly to C-VLAN or S-VLAN members Many more nodes without regions Low effort to get good routing Fast convergence link state v.s. distance vec Address isolation m-in-m. 12
13 Application Data Center Multiple shortest path routing (inter server traffic) Deterministic traffic flows. Flexible subnet expand/shrink anywhere. Virtualization operates in subnet. Fully compatible with all Data Center Bridging protocols & OA&M. Address isolation through m-in-m Fast recovery No loops AA22 AA24 AA25 AA26 BB39 BB40 BB41 BB42 CC * * CC26 CC27 CC28 DD77 DD78 DD79 DD80 13
14 Application Data Center (cont d) Totally compatible with Vmware server functions: OA&M, motion, backup etc. Apps that sit on Vmware just work. Totally compatible with Microsoft load balancing (multicast over the L2) VRRP transparent. It just makes the L2 part of the DC larger and better utilized. Compatible with emerging Inter DC overlay work. 14
15 Application Metro/L2VPN Very light weight L2VPNs (2^24 data path) of: E-LAN, E-LINE, E-TREE flavors (a very cheap VPLS) Can do VPLS style head end replication Can do p2mp style transit replication (just one tx flag). Can support receive only membership (E-TREE) UNI NNI UNI - E-LINE = 2 tx/rx members - E-LAN > 2 tx/rx members - E-TREE n rx members 1 tx member. 15
16 Outline Challenges What is 802.1aq/SPB Applications How does it work 16
17 How does it work? From Operators Perspective - Plug NNI s together - Group ports/c-vlan/s-vlan at UNIs that you want to bridge (2 24 groups= services m-in-m mode.) - Assign an I-SID to each group.. Internally - IS-IS reads box MAC, forms NNI adjacencies - IS-IS advertises box MACs (so no config). - IS-IS reads UNI port services and advertises. - Computations produce FIBs that bridge service members. 17
18 Data Path (M-in-M mode) C-vlan/S-vlan or untagged traffic arrives at UNI Its encapsulated with B-SA of bridge Its encapsulated with I-SID configured for group Its encapsulated with B-VID chosen for route C-DA is looked up, if found B-DA is set C-DA not found, B-DA is multicast that says: Multicast to all other members of this I-SID group from me. Or can head-end replicate over unicast. C addresses to B address association learned at UNI only. 18
19 FDB (unicast M-in-M mode) A unique shortest path from node to all others is computed. BMAC of other nodes installed in FIB pointing to appropriate out interface. Above is repeated for 16+ shortest paths each causes a different B-VID to be used. Symmetry is assured through special tie-breaking logic. 16+ different tie-breaking algorithms permit 16+ different shortest paths. 19
20 FDB visually: ucast m-in-m mode : MAC BVID IF :4 1 9 :4 2 9 : : :2 :3 :6 :5 3 6 :4 MAC BVID IF :1 1 3 :1 2 6 :1 3 3 :
21 FDB (mcast M-in-M mode) If no services require tandem replication there is no tandem FDB: Very VPLS like.. Pretty boring.head replication over unicast paths.. Yawn.. Else (mp2mp like but without signaling) If my node is on a unique shortest path between node A, which transmits for a group I, and node B which receives on group I, then: merge into the FDB an entry for traffic from { A/Group I } to the interface towards B. 21
22 How does it work transit multicast format (n/a for head replication) Example: { SOURCE: 0A-BC-DE / ISID: fe-dc-ba } MMAC-DA: A3-BC-DE-FE-DC-BA
23 FDB visually: mcast m-in-m mode I=255 : :2 :3 :6 :5 6 I=255 5 :4 I=255 MMAC BVID IF {:1/255} 4 10 MMAC BVID IF {:1/255} 4 5,6 23
24 ANIMATION FOR E-LAN 100 WITH 7 MEMBERS Highlighted is the routing from each member to all others. Note the symmetry. Unicast and multicast Follows exactly these Routes. Multicast can be replicated at fork points or head end replicated to the uni-cast paths by configuration at edge. 24
25 The Control Plane (m-in-m mode) Industry standard IS-IS Link State Protocol is basis for 802.1aq. Does not require any IP to operate. Does not preclude IPV4 or IPV6 being present in same IS-IS instance. SYSID carries B-MAC address Introduces no new PDU s to IS-IS. Hello TLVs augmented to pass Equal Cost Algorithm / Vid information and new NLPID. Update TLV s augmented to advertise SPB specific link costs. Update TLVs augmented to advertise ISID information. Update TLVs augmented to advertise nodal short form name SPSOURCEID (transit mcast only). 25
26 802.1aq ISIS LSP extensions at a glance LSPID Seq Num Checksum x a 0xc01f.. SOURCE (1) HOST NAME Instance_1 NLPID SPB (0xC1) (2) 255 AREA ADDR (3) NBR ID COST: 10 NBR ID COST: SPSOURCEID SPB ECT-ALGORITHM 1 ECT-VID 101 (4) SPB ECT-ALGORITHM 0 ECT-VID 100 SPB BMAC ECT-VID 100 SPB ISID 255T&R SPB BMAC ECT-VID 101 SPB ISID 256T&R (5) : :4 :3 LSP fragment for node :1 with 2 peers :4 and :3 and two services 255,
27 Loop Suppression & Avoidance Suppression done on the data path using an SA check. prevents 99.99% loops if FDB s create one. no impact on convergence rates. exploits symmetric/congruence properties of routing. uses reverse learning options of most h/w to discard. Avoidance done by the control path ensures no loops are ever configured in FDBs. hellos augmented with topology digests mismatched digests => some forwarding entries unsafe. blocks only unsafe entries. works for ALL forwarding modes current and planned. 27
28 802.1aq OA&M (inherited by design) Service/Network Layer 802.1ag Connectivity Fault mgmt Hierarchy (honors maintenance levels/abstraction) Continuity Check L2 traceroute L2 ping Link Layer 802.3ah Link Monitoring (logical/physical) Remote Failure Indication Remote Loopback Service Layer - Y.1731 Multicast Loopback depends on congruency/symmetry Performance Measurements (Loss/Delay etc.) One way/two way delays symmetry important 28
29 Recovery ISIS augmented with multicast LSP flood to all 802.1aq nodes. Every 802.1aq node joins default service ISID 0xffffff. This E-LAN is just for control plane. LSPs can be advertised over this E-LAN Very fast distribution protocol (h/w multicast). On failure each end of link advertises over this default E-LAN (in addition to normal updates). Reaches all 802.1aq participants at h/w multicast speed with no CPU involvement transit. Conceptually like having a shared LAN joining all nodes with a physical port but no DR election etc. is done, only used as unreliable very fast distribution mechanism backed up by normal IS-IS hop by hop LSPs. 29
30 Outline Challenges What is 802.1aq/SPB Applications How does it work Example (included in this deck - enjoy) Q&A 30
31 Outline Challenges What is 802.1aq/SPB Applications How does it work Example (backup slides) Q&A (avail anytime) AQ 31
32 References IEEE 802.1aq : IEEE 802.1aq Shortest Path Bridging Efficient Control of Larger Ethernet Networks : upcomming IEEE Communications Magazine Oct 2010 Provider Link State Bridging : IEEE Communications Magazine V46/N9 Sept ieeecommunicationsmagazinevol46no9sep2008-carrierscaleethernet.pdf See also the worked example in backup slides in this deck Thank-You 32
33 EXAMPLE 33
34 EXAMPLE NETWORK : node network 8 member E-LAN ISID=255 Full Transit Replication 34
35 EXAMPLE ISIS PEERS AT NODE :3 <ottawa >d spb The current global spb information is : Device HMAC is Spsid is Ect vlan amount is 2 Ect vlan sequence number [1] is: vlan 100! Ect vlan sequence number [2] is: vlan 101! <ottawa > <ottawa >d isis peer Peer information for ISIS(1) System Id Interface Circuit Id State HoldTime Type Vlanif Up 26s L Vlanif Up 23s L Vlanif Up 27s L Vlanif Up 27s L Vlanif Up 25s L1 Total Peer(s): 5 <ottawa > Logging on to node :3 We can see the basic SPB info and the ISIS peers. 35
36 EXAMPLE LSDB at node :3 Database information for ISIS(1) Level-1 Link State Database LSPID Seq Num Checksum Holdtime Length ATT/P/OL x00000fd2 0x1cea /0/ * 0x x3d /0/ x00000ff8 0xd1d /0/ x00000b3b 0x9ba /0/ x00000b3b 0xbc /0/ x00000b3b 0xce /0/ x00000b3e 0xebe /0/ x00000b3b 0x8b /0/ a x00000b3b 0x57a /0/ b x00000b3a 0x /0/ c x00000b3a 0x /0/ d x00000b3a 0x89fd /0/ e x00000b39 0x /0/ f x00000b3a 0xdabe /0/ x00000b3b 0x810e /0/ x00000b3a 0x1b /0/ x00000b39 0x1b3e /0/ x00000b3a 0x943a /0/ x00000b3b 0xdff /0/ x00000b41 0xdade /0/ x00000b3e 0xa /0/ x00000b40 0x /0/ x00000b3a 0xadee /0/ x00000b3a 0xcff /0/ a x00000b3b 0xb /0/ b x00000b3b 0x /0/ c x00000b3b 0x /0/ d x00000b3b 0xa /0/ e x00000b3a 0xf5c /0/ f x00000b3b 0x8a /0/ x00000b3a 0x960a /0/ x00000b3b 0x5b /0/ x00000b3a 0x /0/ x00000b3b 0x /0/ x00000b39 0xc8ec /0/0 *(In TLV)-Leaking Route, *(By LSPID)-Self LSP, +-Self LSP(Extended), ATT-Attached, P-Partition, OL-Overload 36
37 EXAMPLE LSP VERBOSE OF NODE :1 at NODE :3 <ottawa >d isis lsdb verbose Database information for ISIS(1) Level-1 Link State Database LSPID Seq Num Checksum Holdtime x00000fd3 0x1aeb 1194 SOURCE NLPID SPB(0xC1) AREA ADDR NBR ID COST: 10 +NBR ID COST: 10 SPB ECT-ALGORITHM 0 ECT-VID 100 SPB ECT-ALGORITHM 1 ECT-VID 101 SPB ECT-ALGORITHM 2 ECT-VID 0. SPB ECT-ALGORITHM 15 ECT-VID 0 SPSID SPB BMAC ECT-VID 100 SPB ISID 255T&R <ottawa > 37
38 EXAMPLE NODE :3 ROUTE TO :10 (first equal cost path) <ottawa >d spb umac BMAC BVLAN IF NAME GE2/0/ GE2/0/ GE2/0/ GE2/0/ GE2/0/ GE2/0/ GE2/0/ GE2/0/ GE2/0/ GE2/0/ GE2/0/ GE2/0/ GE2/0/ GE2/0/ a 100 GE2/0/ a 101 GE2/0/ b 100 GE2/0/ b 101 GE2/0/ c 100 GE2/0/ c 101 GE2/0/ d 100 GE2/0/ d 101 GE2/0/ e 100 GE2/0/ e 101 GE2/0/ f 100 GE2/0/ f 101 GE2/0/ GE2/0/ GE2/0/ GE2/0/ GE2/0/18 Total unicast fib entries is 68 <ottawa > 38
39 EXAMPLE NODE :3 ROUTE TO :10 (second equal cost path) <ottawa >d spb umac BMAC BVLAN IF NAME GE2/0/ GE2/0/ GE2/0/ GE2/0/ GE2/0/ GE2/0/ GE2/0/ GE2/0/ GE2/0/ GE2/0/ GE2/0/ GE2/0/ GE2/0/ GE2/0/ a 100 GE2/0/ a 101 GE2/0/ b 100 GE2/0/ b 101 GE2/0/ c 100 GE2/0/ c 101 GE2/0/ d 100 GE2/0/ d 101 GE2/0/ e 100 GE2/0/ e 101 GE2/0/ f 100 GE2/0/ f 101 GE2/0/ GE2/0/ GE2/0/ GE2/0/ GE2/0/18 Total unicast fib entries is 68 <ottawa > 39
40 EXAMPLE: E-LAN MCAST ROUTES FROM :1 (left) and :26 (right) SRC SRC Here are the multicast routes from node 1 for service 255 and also from node 26 for service 255. Note the symmetry in the route between the two multicast trees. The unicast route between :1 and :26 is also along that same path for the chosen B-VID. Since we ve asked for transit replication for all members of the E-LAN we install MCAST 40
41 EXAMPLE: E-LAN MCAST ROUTES FROM :1 (left) and :26 (right) FLG IN/IF DESTINATION ADDR BVID OUT/IF(s) if/ ff 0100 {if/5,if/6 }. SRC 11 <ottawa >d spb mmac IN_PORT VID BMAC OUT_PORT GE2/0/ ff GE2/0/16, GE2/0/10... Total multicast num is 7 <ottawa > MULTICAST ADDRESS IS: [ SOURCE = ISID=00-00-ff ] We only get this state if we configure transmit membership in the E-LAN. Transmit still possible without multicast state but uses serial replication at head end. Operator chooses trade-off between state/bandwidth usage. 41
42 FLG IN/IF DESTINATION ADDR BVID OUT/IF(s) if/ ff 0100 {if/5,if/6 } if/ ff 0100 {if/5,if/6 } if/ a00-00ff 0100 {if/5,if/6 } if/ d00-00ff 0100 {if/1,if/3,if/6 } if/ e00-00ff 0100 {if/1,if/3,if/5 } if/ ff 0100 {if/5,if/6 } Here are all mfibs on nodes :3 and :13 related to this E-LAN. <ottawa >d spb mmac IN_PORT VID BMAC OUT_PORT GE2/0/ ff GE2/0/10, GE2/0/11 GE2/0/ ff GE2/0/10, GE2/0/11 GE2/0/ a00-00ff GE2/0/10, GE2/0/11 GE2/0/ d00-00ff GE2/0/10, GE2/0/11 GE2/0/ e00-00ff GE2/0/10, GE2/0/11 GE2/0/ ff GE2/0/16, GE2/0/10 GE2/0/ ff GE2/0/16, GE2/0/11 Total multicast num is 7 <ottawa > 42
Shortest Path Bridging IEEE 802.1aq Overview & Applications
Shortest Path Bridging IEEE 802.1aq Overview & Applications UKNOF Edinburgh Sept 7th 2010 Peter Ashwood-Smith Fellow [email protected] Abstract 802.1aq Shortest Path Bridging is being standardized
Shortest Path Bridging IEEE 802.1aq Tutorial and Demo
Shortest Path Bridging IEEE 802.1aq Tutorial and Demo NANOG 50 Oct 2010 Peter Ashwood-Smith Fellow [email protected] Abstract 802.1aq Shortest Path Bridging is being standardized by the IEEE
Shortest Path Bridging IEEE 802.1aq Overview
Shortest Path Bridging IEEE 802.1aq Overview Don Fedyk IEEE Editor 802.1aq Alcatel-Lucent IPD Product Manager Monday, 12 July 2010 Abstract 802.1aq Shortest Path Bridging is being standardized by the IEEE
How To Make A Network Cable Reliable And Secure
ETHERNET KEPT Provider Link State Bridging Gerard Jacobs Senior Solutions Architect Agenda > Network Visions > Carrier Ethernet > Provider Link State Bridging (PLSB) > Summary Network Visions HYBRID L1
TRILL for Data Center Networks
24.05.13 TRILL for Data Center Networks www.huawei.com enterprise.huawei.com Davis Wu Deputy Director of Switzerland Enterprise Group E-mail: [email protected] Tel: 0041-798658759 Agenda 1 TRILL Overview
Resiliency in Ethernet Based Transport Networks
Resiliency in Ethernet Based Transport Networks Kari Seppänen [email protected] Outline Introduction What is switched Ethernet? Legacy Ethernet Security and Reliability issues Rapid spanning tree protocol
APPLICATION NOTE 210 PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW
PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW By Thierno Diallo, Product Specialist Originally designed as a local-area network (LAN) communication protocol,
SECURE AVAYA FABRIC CONNECT SOLUTIONS WITH SENETAS ETHERNET ENCRYPTORS
SECURE AVAYA FABRIC CONNECT SOLUTIONS WITH SENETAS ETHERNET ENCRYPTORS AUDIENCE Data networks consultants, Network architects, designers and administrators/ managers, Systems Integrators (SI) and networks
802.1Qbv: Dynamic Configuration of Scheduling Windows
802.1Qbv: Dynamic Configuration of Scheduling Windows Rodney Cummings National Instruments Franz-Josef Goetz Siemens AG Agenda Need for dynamic configuration of 802.1Qbv Which existing protocol? Technical
Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops
ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Implement Spanning Tree Protocols LAN Switching and Wireless Chapter 5 Explain the role of redundancy in a converged
VXLAN: Scaling Data Center Capacity. White Paper
VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where
Avaya VENA Fabric Connect
Avaya VENA Fabric Connect Executive Summary The Avaya VENA Fabric Connect solution is based on the IEEE 802.1aq Shortest Path Bridging (SPB) protocol in conjunction with Avaya extensions that add Layer
Abstract. MEP; Reviewed: GAK 10/17/2005. Solution & Interoperability Test Lab Application Notes 2005 Avaya Inc. All Rights Reserved.
Configuring Single Instance Rapid Spanning Tree Protocol (RSTP) between an Avaya C360 Converged Switch and HP ProCurve Networking Switches to support Avaya IP Telephony Issue 1.0 Abstract These Application
TRILL for Service Provider Data Center and IXP. Francois Tallet, Cisco Systems
for Service Provider Data Center and IXP Francois Tallet, Cisco Systems 1 : Transparent Interconnection of Lots of Links overview How works designs Conclusion 2 IETF standard for Layer 2 multipathing Driven
CHAPTER 10 LAN REDUNDANCY. Scaling Networks
CHAPTER 10 LAN REDUNDANCY Scaling Networks CHAPTER 10 10.0 Introduction 10.1 Spanning Tree Concepts 10.2 Varieties of Spanning Tree Protocols 10.3 Spanning Tree Configuration 10.4 First-Hop Redundancy
Software Defined Networking Supported by IEEE 802.1Q
Software Defined Networking Supported by IEEE 802.1Q János Farkas, Stephen Haddock, Panagiotis Saltsidis [email protected], [email protected], [email protected] Abstract
Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)
Cisco Certified Network Associate Exam Exam Number 200-120 CCNA Associated Certifications CCNA Routing and Switching Operation of IP Data Networks Operation of IP Data Networks Recognize the purpose and
Provider Backbone Transport
Provider Backbone Transport David Allan Paul Bottorff Dinesh Mohan Alan McGuire [email protected] [email protected] [email protected] [email protected] Agenda > Motivation > Problem statement > What
Carrier Ethernet A Wave is Building. Provider Backbone Bridges with Traffic Engineering (PBB-TE)
Carrier Ethernet A Wave is Building Provider Backbone Bridges with Traffic Engineering (PBB-TE) D. Kent Stevens Western Region Optical Architect [email protected] 714-803-1050 Next Generation Packet
Backbone Provider Bridging Networks A Highly Scalable VLAN (Multicast) Architecture
Backbone Provider Bridging Networks A Highly Scalable VLAN (Multicast) Architecture Paul Bottorff Version 1.0 July 12, 2004 Page 1 A Provider Bridge Scaling Solution Backbone Provider Bridging 802.1ad
EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE
EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EXECUTIVE SUMMARY Enterprise network managers are being forced to do more with less. Their networks are growing in size and complexity. They need
Cisco Networking Academy CCNP Multilayer Switching
CCNP3 v5 - Chapter 5 Cisco Networking Academy CCNP Multilayer Switching Implementing High Availability in a Campus Environment Routing issues Hosts rely on a router to find the best path Issues with established
TRILL Large Layer 2 Network Solution
TRILL Large Layer 2 Network Solution Contents 1 Network Architecture Requirements of Data Centers in the Cloud Computing Era... 3 2 TRILL Characteristics... 5 3 Huawei TRILL-based Large Layer 2 Network
Network Virtualization
Network Virtualization Using Shortest Path Bridging and IP/SPB Table of Contents Section 1: Introduction...1 Section 2: Benefits of Shortest Path Bridging...3 2.1 Network Service Enablement...3 2.2 Time
Chapter 3. Enterprise Campus Network Design
Chapter 3 Enterprise Campus Network Design 1 Overview The network foundation hosting these technologies for an emerging enterprise should be efficient, highly available, scalable, and manageable. This
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea ([email protected]) Senior Solutions Architect, Brocade Communications Inc. Jim Allen ([email protected]) Senior Architect, Limelight
Introduction to ISIS. ISP/IXP Workshops
Introduction to ISIS ISP/IXP Workshops 1 IS-IS Standards History ISO 10589 specifies OSI IS-IS routing protocol for CLNS traffic A Link State protocol with a 2 level hierarchical architecture Type/Length/Value
BFD. (Bidirectional Forwarding Detection) Does it work and is it worth it? Tom Scholl, AT&T Labs NANOG 45
BFD (Bidirectional Forwarding Detection) Does it work and is it worth it? Tom Scholl, AT&T Labs NANOG 45 What is BFD? BFD provides a method to validate the operation of the forwarding plane between two
The Complete IS-IS Routing Protocol
Hannes Gredler and Walter Goralski The Complete IS-IS Routing Protocol 4y Springer Contents Foreword Credits and Thanks vii ix 1 Introduction, Motivation and Historical Background 1 1.1 Motivation 1 1.2
ETHERNET VPN (EVPN) NEXT-GENERATION VPN FOR ETHERNET SERVICES
ETHERNET VPN (EVPN) NEXT-GENERATION VPN FOR ETHERNET SERVICES Alastair JOHNSON (AJ) February 2014 [email protected] AGENDA 1. EVPN Background and Motivation 2. EVPN Operations 3. EVPN
Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.
Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of
Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.
Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described
Virtual LANs. http://www.cis.ohio-state.edu/~jain/cis788-97/ or http://www.netlab.ohio-state.edu/~jain/cis788-97/ Raj Jain
Virtual LANs Professor of Computer and Information Sciences Please download and print the handouts from: http://www.cis.ohio-state.edu/~jain/cis788-97/ or http://www.netlab.ohio-state.edu/~jain/cis788-97/
RESILIENT NETWORK DESIGN
Matěj Grégr RESILIENT NETWORK DESIGN 1/36 2011 Brno University of Technology, Faculty of Information Technology, Matěj Grégr, [email protected] Campus Best Practices - Resilient network design Campus
Provider Backbone Bridging Traffic Engineering of Carrier Ethernet Services
Provider Backbone Bridging Traffic Engineering of Carrier Ethernet Services Introduction Recently, a number of technologies have emerged for transporting Carrier Ethernet services. One such technology,
Using & Offering Wholesale Ethernet Network and Operational Considerations
White Paper Using and Offering Wholesale Ethernet Using & Offering Wholesale Ethernet Network and Operational Considerations Introduction Business services customers are continuing to migrate to Carrier
June 2006. Bridge & Switch. Pietro Nicoletti Piero[at]studioreti.it. Bridge-Switch-Engl - 1 P. Nicoletti: see note pag. 2
Bridge & Switch Pietro Nicoletti Piero[at]studioreti.it Bridge-Switch-Engl - P. Nicoletti: see note pag. Copyright note These slides are protected by copyright and international treaties. The title and
The ABCs of Spanning Tree Protocol
The ABCs of Spanning Tree Protocol INTRODUCTION In an industrial automation application that relies heavily on the health of the Ethernet network that attaches all the controllers and computers together,
Switching in an Enterprise Network
Switching in an Enterprise Network Introducing Routing and Switching in the Enterprise Chapter 3 Version 4.0 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Compare the types of
Chapter 10 Link-State Routing Protocols
Chapter 10 Link-State Routing Protocols CCNA2-1 Chapter 10 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario. Thanks
Multi-site Datacenter Network Infrastructures
Multi-site Datacenter Network Infrastructures Petr Grygárek rek 1 Why Multisite Datacenters? Resiliency against large-scale site failures (geodiversity) Disaster recovery Easier handling of planned outages
STATE OF THE ART OF DATA CENTRE NETWORK TECHNOLOGIES CASE: COMPARISON BETWEEN ETHERNET FABRIC SOLUTIONS
STATE OF THE ART OF DATA CENTRE NETWORK TECHNOLOGIES CASE: COMPARISON BETWEEN ETHERNET FABRIC SOLUTIONS Supervisor: Prof. Jukka Manner Instructor: Lic.Sc. (Tech) Markus Peuhkuri Francesco Maestrelli 17
CCT vs. CCENT Skill Set Comparison
Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification
ETHERNET VPN (EVPN) OVERLAY NETWORKS FOR ETHERNET SERVICES
ETHERNET VPN (EVPN) OVERLAY NETWORKS FOR ETHERNET SERVICES Greg Hankins RIPE 68 RIPE 68 2014/05/12 AGENDA 1. EVPN Background and Motivation 2. EVPN Operations 3. EVPN
VPLS Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-10-30
Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of
Juniper Networks EX Series/ Cisco Catalyst Interoperability Test Results. May 1, 2009
Juniper Networks EX Series/ Cisco Catalyst Interoperability Test Results May 1, 2009 Executive Summary Juniper Networks commissioned Network Test to assess interoperability between its EX4200 and EX8208
CORPORATE NETWORKING
CORPORATE NETWORKING C. Pham Université de Pau et des Pays de l Adour Département Informatique http://www.univ-pau.fr/~cpham [email protected] Typical example of Ethernet local networks Mostly based
Layer 3 Routing User s Manual
User s Manual Second Edition, July 2011 www.moxa.com/product 2011 Moxa Inc. All rights reserved. User s Manual The software described in this manual is furnished under a license agreement and may be used
IxNetwork TM MPLS-TP Emulation
IxNetwork TM MPLS-TP Emulation Test the Functionality, Performance, and Scalability of an MPLS-TP Ingress, Egress, or Transit Node MPLS has come a long way since its original goal to allow core routers
Objectives. Explain the Role of Redundancy in a Converged Switched Network. Explain the Role of Redundancy in a Converged Switched Network
Implement Spanning Tree Protocols LAN Switching and Wireless Chapter 5 Objectives Explain the role of redundancy in a converged network Summarize how STP works to eliminate Layer 2 loops in a converged
IP Multicasting. Applications with multiple receivers
IP Multicasting Relates to Lab 10. It covers IP multicasting, including multicast addressing, IGMP, and multicast routing. 1 Applications with multiple receivers Many applications transmit the same data
CCNP SWITCH: Implementing High Availability and Redundancy in a Campus Network
CCNP SWITCH: Implementing High Availability and Redundancy in a Campus Network Olga Torstensson SWITCHv6 1 Components of High Availability Redundancy Technology (including hardware and software features)
Exam 1 Review Questions
CSE 473 Introduction to Computer Networks Exam 1 Review Questions Jon Turner 10/2013 1. A user in St. Louis, connected to the internet via a 20 Mb/s (b=bits) connection retrieves a 250 KB (B=bytes) web
16-PORT POWER OVER ETHERNET WEB SMART SWITCH
16-PORT POWER OVER ETHERNET WEB SMART SWITCH User s Manual (DN-95312) - 0 - Content Web Smart Switch Configure login ---------------------------------- 2 Administrator Authentication Configuration ---------------------------------------------
Riverstone Networks. Carrier Ethernet Standards Progress. Igor Giangrossi Sr. Systems Engineer, CALA
Riverstone Networks Carrier Ethernet Standards Progress Igor Giangrossi Sr. Systems Engineer, CALA Agenda History Metro Ethernet Forum work IETF work IEEE work Conclusion 2 Ethernet Evolution What do we
Pre$SDN era: network trends in data centre networking
Pre$SDN era: network trends in data centre networking Zaheer Chothia 27.02.2015 Software Defined Networking: The Data Centre Perspective Outline Challenges and New Requirements History of Programmable
Understanding PBB-TE for Carrier Ethernet
Understanding PBB-TE for Carrier Ethernet Introduction Ethernet is evolving from an enterprise LAN technology to a much more robust, carrier-grade transport technology for metropolitan service networks.
Route Discovery Protocols
Route Discovery Protocols Columbus, OH 43210 [email protected] http://www.cse.ohio-state.edu/~jain/ 1 Overview Building Routing Tables Routing Information Protocol Version 1 (RIP V1) RIP V2 OSPF
Redundancy and load balancing at L3 in Local Area Networks. Fulvio Risso Politecnico di Torino
Redundancy and load balancing at L3 in Local Area Networks Fulvio Risso Politecnico di Torino 1 Default gateway redundancy (1) H1 DG: R1 H2 DG: R1 H3 DG: R1 R1 R2 ISP1 ISP2 Internet 3 Default gateway redundancy
TechBrief Introduction
TechBrief Introduction Leveraging Redundancy to Build Fault-Tolerant Networks The high demands of e-commerce and Internet applications have required networks to exhibit the same reliability as the public
CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE
CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE EXECUTIVE SUMMARY This application note proposes Virtual Extensible LAN (VXLAN) as a solution technology to deliver departmental segmentation, business
VXLAN Bridging & Routing
VXLAN Bridging & Routing Darrin Machay [email protected] CHI-NOG 05 May 2015 1 VXLAN VM-1 10.10.10.1/24 Subnet A ESX host Subnet B ESX host VM-2 VM-3 VM-4 20.20.20.1/24 10.10.10.2/24 20.20.20.2/24 Load
Redundancy and load balancing at L3 in Local Area Networks. Fulvio Risso Politecnico di Torino
Redundancy and load balancing at L3 in Local Area Networks Fulvio Risso Politecnico di Torino 1 Problem: the router is a single point of failure H1 H2 H3 VLAN4 H4 VLAN4 Corporate LAN Corporate LAN R1 R2
Routed VPLS using BGP draft-sajassi-l2vpn-rvpls-bgp-00.txt
Routed VPLS using BGP draft-sajassi-l2vpn-rvpls-bgp-00.txt IETF 77, Anaheim, CA March 2010 Authors: Ali Sajassi, Samer Salam, Keyur Patel Requirements 1. Load balancing on L2/L3/L4 flows 2. Flow-based
How To Switch In Sonicos Enhanced 5.7.7 (Sonicwall) On A 2400Mmi 2400Mm2 (Solarwall Nametra) (Soulwall 2400Mm1) (Network) (
You can read the recommendations in the user, the technical or the installation for SONICWALL SWITCHING NSA 2400MX IN SONICOS ENHANCED 5.7. You'll find the answers to all your questions on the SONICWALL
Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)
QUESTION NO: 8 David, your TestKing trainee, asks you about basic characteristics of switches and hubs for network connectivity. What should you tell him? A. Switches take less time to process frames than
OSPF Routing Protocol
OSPF Routing Protocol Contents Introduction Network Architecture Campus Design Architecture Building Block Design Server Farm Design Core Block Design WAN Design Architecture Protocol Design Campus Design
Cloud Networking: Framework and VPN Applicability. draft-bitar-datacenter-vpn-applicability-01.txt
Cloud Networking: Framework and Applicability Nabil Bitar (Verizon) Florin Balus, Marc Lasserre, and Wim Henderickx (Alcatel-Lucent) Ali Sajassi and Luyuan Fang (Cisco) Yuichi Ikejiri (NTT Communications)
Link Layer Discovery Protocol
12 Link Layer Discovery Protocol Contents Overview..................................................... 12-2 LLDP..................................................... 12-2 LLDP Messages............................................
Brocade to Cisco Comparisons
1 2 3 Console cables - The console cables are not interchangeable between Brocade and Cisco. Each vendor provides their console cable with each manageable unit it sells. Passwords - Neither Cisco or Brocade
Improving the Security and Efficiency of Network Clients Using OpenFlow
Improving the Security and Efficiency of Network Clients Using OpenFlow Adam Coxhead This report is submitted in partial fulfillment of the requirements for the degree of Bachelor of Computing and Mathematical
Provider Backbone Bridging Networks A Highly Scalable VLAN (Multicast) Architecture
Provider Backbone Bridging Networks A Highly Scalable VLAN (Multicast) Architecture Paul Bottorff, Mark Holness, Norival Figueira, Michael Chen, Dinesh Mohan, Glenn Parsons Version 2.0 Page 1 A Provider
INTRODUCTION TO L2VPNS
INTRODUCTION TO L2VPNS 4 Introduction to Layer 2 and Layer 3 VPN Services CE Layer 3 VPN Link Comprised of IP Traffic Passed Over IP Backbone LEGEND Layer 3 VPN Layer 2 VPN CE CE PE IP Backbone PE CE Layer
Data Center Networking Designing Today s Data Center
Data Center Networking Designing Today s Data Center There is nothing more important than our customers. Data Center Networking Designing Today s Data Center Executive Summary Demand for application availability
> ADDING SCALE, QoS AND OPERATIONAL SIMPLICITY TO ETHERNET
> ADDING SCALE, QoS AND OPERATIONAL SIMPLICITY TO ETHERNET White Paper Provider Backbone Transport Market overview For many years, Ethernet has been the dominant networking protocol in the LAN. Its simplicity
OAM Operations Administration and Maintenance
OAM Operations Administration and Maintenance IERU Communications Ltd OAM Rev. A Page 1 of 9 Operations Administration and Maintenance 1. Overview This paper describes the Ethernet and Multi-Protocol Label
MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs
A Silicon Valley Insider MPLS VPN Services PW, VPLS and BGP MPLS/IP VPNs Technology White Paper Serge-Paul Carrasco Abstract Organizations have been demanding virtual private networks (VPNs) instead of
Introduction to IP v6
IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation
Chapter 4 Network Layer
Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete
College 5, Routing, Internet. Host A. Host B. The Network Layer: functions
CSN-s 5/1 College 5, Routing, Internet College stof 1 Inleiding: geschiedenis, OSI model, standaarden, ISOC/IETF/IRTF structuur Secties: 1.2, 1.3, 1.4, 1.5 2 Fysieke laag: Bandbreedte/bitrate Secties:
Ethernet Business Services
Ethernet Business Services Introduction Why market Ethernet Business solutions? This represents large revenue streams for Service Providers Commercial services market experiencing huge growth Most Service
AlliedWare Plus OS How To Configure interoperation between PVST+ and RSTP or MSTP
AlliedWare Plus OS How To Configure interoperation between PVST+ and RSTP or MSTP Introduction Spanning trees that protect networks from loops can provide better traffic load balancing if traffic in different
Leveraging Advanced Load Sharing for Scaling Capacity to 100 Gbps and Beyond
Leveraging Advanced Load Sharing for Scaling Capacity to 100 Gbps and Beyond Ananda Rajagopal Product Line Manager Service Provider Solutions Foundry Networks [email protected] Agenda 2 Why Load
L2 VPNs. Pseudowires. Virtual Private LAN Services. Metro/Carrier Ethernet.
L2 VPNs. Pseudowires. Virtual Private LAN Services. Metro/Carrier Ethernet. Petr Grygárek rek 1 Layer 2 VPNs 2 Usages of L2 VPNs Server farms/clusters and other L2- dependent applications redundancy and
Configuring Denial of Service Protection
24 CHAPTER This chapter contains information on how to protect your system against Denial of Service (DoS) attacks. The information covered in this chapter is unique to the Catalyst 6500 series switches,
Integrated IS-IS Design and Deployment Guide
Integrated IS-IS Design and Deployment Guide Authors: Stefano Previdi - isco Systems Paul Horrocks - isco Systems Integrated IS-IS Design and Deployment Guide 1 ontents: 1 Executive summary... 3 2. IS-IS
CS335 Sample Questions for Exam #2
CS335 Sample Questions for Exam #2.) Compare connection-oriented with connectionless protocols. What type of protocol is IP? How about TCP and UDP? Connection-oriented protocols Require a setup time to
Juniper Networks Certified Internet Specialist Fast Track
Juniper Networks Certified Internet Specialist Fast Track Varighet: 1.00 Days Kurskode: JNCIS-ENT Beskrivelse: Prepare to operate Juniper based networks and pass the JNCIA-Junos exam. Gain the foundation
Introduction about cisco company and its products (network devices) Tell about cisco offered courses and its salary benefits (ccna ccnp ccie )
CCNA Introduction about cisco company and its products (network devices) Tell about cisco offered courses and its salary benefits (ccna ccnp ccie ) Inform about ccna its basic course of networking Emergence
IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
CSE331: Introduction to Networks and Security. Lecture 8 Fall 2006
CSE331: Introduction to Networks and Security Lecture 8 Fall 2006 Announcements Reminders: Project I is due on Monday, Sept. 25th. Homework 1 is due on Friday, Sept. 29th. CSE331 Fall 2004 2 Internet Protocol
Lecture 17 - Network Security
Lecture 17 - Network Security CMPSC 443 - Spring 2012 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ Idea Why donʼt we just integrate some of these neat
Configuring the Transparent or Routed Firewall
5 CHAPTER This chapter describes how to set the firewall mode to routed or transparent, as well as how the firewall works in each firewall mode. This chapter also includes information about customizing
Ethernet (LAN switching)
Ethernet ( switching) 1 Outline Interconnection devices Bridges/ switches vs. Routers Bridges Learning Bridges Transparent bridges 2 1 Bridges/ switches Interconnect multiple, possibly with different type
Metro Ethernet Services
CHAPTER 6 Metro Ethernet Service Framework This chapter describes the typical available from service providers (SPs). For the most part, these services are derived from and map to the following Metro Ethernet
Shortest path forwarding using OpenFlow
Shortest path forwarding using OpenFlow Joris Soeurt Iwan Hoogendoorn University of Amsterdam February 13, 2012 Acknowledgement We would like to thank Ronald van der Pol (SARA) for his guidance and supervision
