Deterministic Ethernet and the Intrinsic Value of Synchronization



Similar documents
Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

Computer Networking. Definitions. Introduction

SSVP SIP School VoIP Professional Certification

Resiliency in Ethernet Based Transport Networks

Computer Networks CS321

DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL

SSVVP SIP School VVoIP Professional Certification

Networking 4 Voice and Video over IP (VVoIP)

VXLAN: Scaling Data Center Capacity. White Paper

What is VLAN Routing?

Virtualization, SDN and NFV

WIRELESS IN THE METRO PACKET MICROWAVE EXPLAINED

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs

Data Communication Networks and Converged Networks

NComputing L-Series LAN Deployment

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)

Multi Protocol Label Switching (MPLS) is a core networking technology that

TRILL for Data Center Networks

TRILL for Service Provider Data Center and IXP. Francois Tallet, Cisco Systems

SBSCET, Firozpur (Punjab), India

Contents. Connection Guide. What is Dante? Connections Network Set Up System Examples Copyright 2015 ROLAND CORPORATION

ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2

SDN and Data Center Networks

Preparing Your IP network for High Definition Video Conferencing

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS

Virtual PortChannels: Building Networks without Spanning Tree Protocol

Using 2 nd router as Wireless Access Point (AP)

Agilent N2X Layer 2 MPLS VPN Emulation Software

MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring Mike Freedman

Wave Relay System and General Project Details

Network Virtualization Network Admission Control Deployment Guide

Network Management for Common Topologies How best to use LiveAction for managing WAN and campus networks

Network Simulation Traffic, Paths and Impairment

Designing Reliable IP/MPLS Core Transport Networks

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops

How To Understand and Configure Your Network for IntraVUE

AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0

CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE

Monitoring Service Delivery in an MPLS Environment

Expert Reference Series of White Papers. An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire

Joint ITU-T/IEEE Workshop on Next Generation Optical Access Systems. DBA & QoS on the PON - Commonalities with Switching & Routing

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Networking Topology For Your System

Stretched Active- Active Application Centric Infrastructure (ACI) Fabric

Implementation of Virtual Local Area Network using network simulator

EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE

- Multiprotocol Label Switching -

VoIP over MPLS & Voice Services over MPLS. Jim McEachern jmce@nortelnetworks.com

STATE OF THE ART OF DATA CENTRE NETWORK TECHNOLOGIES CASE: COMPARISON BETWEEN ETHERNET FABRIC SOLUTIONS

DATA CENTER. Best Practices for High Availability Deployment for the Brocade ADX Switch

UPPER LAYER SWITCHING

Introduction to MPLS-based VPNs

Quality of Service in Industrial Ethernet Networks

CORPORATE NETWORKING

IP and Ethernet Communication Technologies and Topologies for IED networks

Analysis of Network Segmentation Techniques in Cloud Data Centers

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Advanced Internetworking

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

John Ragan Director of Product Management. Billy Wise Communications Specialist

WHITE PAPER. Network Virtualization: A Data Plane Perspective

From Fieldbus to toreal Time Ethernet

Software Defined Networking (SDN) - Open Flow

ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED

Local Area Networks (LANs) Blueprint (May 2012 Release)

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

Computer Networking: A Survey

WHITEPAPER. VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter

A New Approach to Developing High-Availability Server

WISE-4000 Series. WISE IoT Wireless I/O Modules

White Paper. Requirements of Network Virtualization

Data Center Network Virtualisation Standards. Matthew Bocci, Director of Technology & Standards, IP Division IETF NVO3 Co-chair

CSE 3461 / 5461: Computer Networking & Internet Technologies

Telephone Company Lease Line Elimination. Dewey Day Principal Operational Technology Architect Pacific Gas & Electric

Chapter 2 - The TCP/IP and OSI Networking Models

CSIS CSIS 3230 Spring Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture

Availability Digest. Redundant Load Balancing for High Availability July 2013

Application Note. Onsight TeamLink And Firewall Detect v6.3

This course has been retired. View the schedule of current <a href=

Overview of Routing between Virtual LANs

Precision Time Protocol (PTP/IEEE-1588)

Based on Computer Networking, 4 th Edition by Kurose and Ross

Applications that Benefit from IPv6

GregSowell.com. Mikrotik Basics

Whitepaper. 10 Metrics to Monitor in the LTE Network. blog.sevone.com

Configuring a Load-Balancing Scheme

Fibre Channel over Ethernet: Enabling Server I/O Consolidation

10 Gigabit Ethernet: Scaling across LAN, MAN, WAN

MPLS and IPSec A Misunderstood Relationship

Region 10 Videoconference Network (R10VN)

VLANs. Application Note

Preparing Your IP Network for High Definition Video Conferencing

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

Transcription:

Deterministic Ethernet and the Intrinsic Value of Synchronization Norman Finn Cisco Fellow WSTS June 2014 NIST-ATIS WSTS San Jose CA June 2014 1

NIST-ATIS WSTS San Jose CA June 2014 2

IEEE 1588 technology could conquer the world. (Of time.) Growing acceptance, both in use and in experimentation, for: Service provider radio mobile base station Real-time process and machine control Interference reduction in unlicensed radio applications Wireless location services Audio / video production, editing, and presentation Cryptographic security applications Delivering zero-congestion-loss and fixed-latency packet networking Packetizing and generalizing the dedicated digital signal NIST-ATIS WSTS San Jose CA June 2014 3

Let us take a moment to mention that the sync / followup technique of IEEE Std 1588 is brilliant. It gives the choice of two ways to preserve proper layering in the protocol stack: Predict when the packet will emerge on the wire (insertion of transparent clock forwarding delay); or Retrieve the exit time stamp and send a followup message. NIST-ATIS WSTS San Jose CA June 2014 4

We have L2 network nodes (bridges = switches) and L3 network nodes (routers). We add time-awareness to these devices. Time-aware bridges and routers pass PTP PDUs through the network just like data, but with time information. (This is especially true in the various forms of the transparent clock.) Before: After: NIST-ATIS WSTS San Jose CA June 2014 5

The present approach does not violate the sacred principles of ISO Layering. But, neither does it take advantage of them. We are adding a feature to every bridge and router. But, when you look at some of the questions this raises, you realize that there is another approach that will prove much less difficult to specify and to implement. NIST-ATIS WSTS San Jose CA June 2014 6

A time-aware bridge from IEEE Std. 802.1AS-2005. We have noticed, in P802.1ASbt, that the MAC relay in this picture is not actually used by 802.1AS. This makes one suspect that we using a suboptimal layering architecture. NIST-ATIS WSTS San Jose CA June 2014 7

NIST-ATIS WSTS San Jose CA June 2014 8

In 1992, you could look at a box and say, That box is a bridge, or, That box is a router. In 1992 it made more sense to define a time-aware bridge and a timeaware router. But, my network has: NAT engines, firewalls, load balancing appliances, multi-homed hosts, Link Aggregation, TRILL Rbridges, MAC-in-MAC bridges, ITU-T Ethernet protection switches, MPLS label switches, VPNs, bridge-route-bridge switches, etc. VXLANs (virtual networks of virtual bridges and routers connecting virtual hosts) Virtual switches (two boxes claiming to the world to be a single switch) Software Defined Networking that (some use to) blur L2/L3 boundaries. Equal-Cost Multi Pathing at both L2 and L3 Soft switches in server blades and/or virtual computers. Proprietary extensions in Ethernet preambles and/or interframe gaps. NIST-ATIS WSTS San Jose CA June 2014 9

Complex virtual data center networks Physical network Spine Distribution NIST-ATIS WSTS San Jose CA June 2014 10

Complex virtual data center networks Physical network creates multiple virtual network topologies. It simulates Virtual Network A (blue) NIST-ATIS WSTS San Jose CA June 2014 11

Complex virtual data center networks Physical network creates multiple virtual network topologies. It simulates Virtual Network A (blue), B (green) NIST-ATIS WSTS San Jose CA June 2014 12

Complex virtual data center networks Physical network creates multiple virtual network topologies. It simulates Virtual Network A (blue), B (green), and C (purple). NIST-ATIS WSTS San Jose CA June 2014 13

Complex virtual data center networks Physical network creates multiple virtual network topologies. It simulates Virtual Network A (blue), B (green), and C (purple). Complex encapsulations (e.g. VXLAN) divorce physical & logical. NIST-ATIS WSTS San Jose CA June 2014 14

Complex virtual data center networks Physical network creates multiple virtual network topologies. It simulates Virtual Network A (blue), B (green), and C (purple). Complex encapsulations (e.g. VXLAN) divorce physical & logical. Which topology does time follow?* Which standard? * Add another topology is not an answer the hosts need time! NIST-ATIS WSTS San Jose CA June 2014 15

Typical enterprise networks Three layers Core (routers), Distribution (routers), and Aggregation (switches = bridges or bridge + router). Thousands of Aggregation switches. C C Don t imagine that there is only one layer of Aggregation switch / Wi-Fi Access Point. Why would I want thousands of L2 1588 regions, one per Aggregation switch? D D A A NIST-ATIS WSTS San Jose CA June 2014 16

Virtual switches Pairs of boxes each pretend (via proprietary protocols) to appear to the world to be a single box. Topology is then a tree no bridging protocols needed! But, how does this work for a timeaware bridge? (Each box has to be visible as a separate entity for time purposes.) C D C D A A NIST-ATIS WSTS San Jose CA June 2014 17

NIST-ATIS WSTS San Jose CA June 2014 18

The PTP Relay (PTPR) PTP is a user of the network(s), not integrated inside the networking functions. Each PTPR has multiple ports. PTP Relay NIST-ATIS WSTS San Jose CA June 2014 19

The PTP Relay (PTPR) PTP is a user of the network(s), not integrated inside the networking functions. Each PTPR port has an independent protocol stack. PTP over IP over ATM PTP over Ethernet PTP Relay PTP over HTML over RTP over IP over Ethernet over Pseudowire over SONET NIST-ATIS WSTS San Jose CA June 2014 20

The PTP Relay (PTPR) PTP is a user of the network(s), not integrated inside the networking functions. The PTPRs are peers over their links, but each link is totally independent, just as bridges and routers connect different media. PTP Relay PTP Relay Ethernet PTP over HTML over RTP over IP over Ethernet over Pseudowire over SONET Complex network PTP over HTML over RTP over IP over Ethernet over Pseudowire over SONET IP over Ethernet NIST-ATIS WSTS San Jose CA June 2014 21

The PTP Relay (PTPR) It doesn t matter what else is in the box. A router + PTP Relay can use PTP over Ethernet! A bridge + PTP Relay can use PTP over IP! Not understanding this is why the transparent clock causes so much confusion and controversy. PTP Relay PTP Relay PTP over IP (Bridge relay) PTP over Ethernet PTP over IP (Some complex virtual route /bridge function) PTP over Ethernet MAC MAC MAC MAC PHY PHY PHY PHY NIST-ATIS WSTS San Jose CA June 2014 22

The PTP Relay (PTPR) PTP is a user of the network(s), not integrated inside the networking functions. IEEE 1588, or even a 1588 profile, is concerned only with a network of PTPRs. PTP Relay PTP Relay PTP Relay PTP Relay NIST-ATIS WSTS San Jose CA June 2014 23

The PTPR operates on Protocol Data Units (PDUs), not packets or frames! It eats PDUs on one port and spews PDUs on another port (or ports). The PTPR does not depend on a co-resident router or bridge to forward its transparent clock PDUs. It has its own rules. The box holding the PTP Relay can be a multi-port PC host without any bridging or routing, it can be a bridge, a router, an FCOE switch, a complex virtual combination, or anything else. No standard cares! A time aware TRILL brouter is not undefined. It s not punted by 1588 to some other standard. The PTP Relay is simply independent of whatever else is in the box. (It s called, Layering.) PTP is its own network! (I d call it over the top, except that the PTP network is closer to the hardware than the underlying net!) NIST-ATIS WSTS San Jose CA June 2014 24

Four jobs Link discovery. The PTP Relays must find out, through configuration, management, and/or discovery protocols, about their neighboring PTP Relays, and for each one, select which addresses and protocols to use to reach that neighbor. Boundary management. Almost all the computers in the world are connected somehow. The PTP Relays must limit the link discovery process to appropriate bounds. Are the boundaries permeable or not? Time routing. The PTP Relays must elect various grades of master and slave clocks, provide or not provide for losses or errors, and compute one or more distribution paths for the time sync messages, through some combination of configuration, management, and/or routing protocols independently of any L2/L3 network routing protocols. Time. Almost forgot. All that cool syntonization and millihertz bandwidth stuff. :) NIST-ATIS WSTS San Jose CA June 2014 25

I m sure that I m the first to think of this. 1588 has already started down this path, by specifying that the source MAC address changes at each hop. The existing PTP translation device is perhaps another way of looking at what I m talking about. Look carefully; I hope that this layering model requires no changes to the the packet formats. You can still integrate the transparent clock into a router in your implementation. There is little or no change to the existing protocols. (Although more are needed!) But, unless we adopt proper layering, we will continue to argue over the wrong problems, and leave the right problems unsolved. Worst case, a better-layered solution will supersede 1588. NIST-ATIS WSTS San Jose CA June 2014 26

Virtual X is a very bad thing, when it comes to PTP, for all values of X. Trying to piggyback on the L2 and L3 networks produces far more questions than answers, and generates far more work than it saves. Instead of having 1588 and/or profiles define a time-aware X for every X under the sun: We let PTP Relays do their job on time. We let networks do their job connecting real and virtual devices, among which are PTP Relays. They do that really, really well, already. We get on with defining the protocols we need to do the time synchronization job. Yes, some of them look similar to routing protocols. That gives us a boost. NIST-ATIS WSTS San Jose CA June 2014 27

That standard will be adopted when pigs can fly. Of course, anyone who works in the standards world knows that, given enough thrust, pigs certainly can fly. NIST-ATIS WSTS San Jose CA June 2014 28

We have been trying to make the pig fly by genetically engineering a pig-bird (by defining time-aware bridges, routers, Rbridges, etc.). At best, the result will be non-kosher chicken soup. At worst, we ll have feathers in our bacon. NIST-ATIS WSTS San Jose CA June 2014 29

Behold! The ISO-layered flying pig. You can strap a rocket to his back and light it. You can crate the pig in a box and ship him in a 747. You can tranquilize him, put him in a Cessna, and hope he stays asleep until the pilot can land the plane. NIST-ATIS WSTS San Jose CA June 2014 30

Thank you.