Connectivity Fault Management. Norman Finn



Similar documents
Ethernet OAM Overview: Making Ethernet Manageable

OAM Operations Administration and Maintenance

REMOTE MONITORING MATRIX

Ethernet Service OAM. Standards and Functionality. Connectivity Fault Management (CFM) Fault Detection. White Paper

CHAPTER 10 LAN REDUNDANCY. Scaling Networks

Network Management Model and Elements in Carrier Grade Ethernet

IxNetwork TM MPLS-TP Emulation

WHITE PAPER. A Technical Overview. Copyright 2010, Juniper Networks, Inc. 1

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops

MPLS Basics. For details about MPLS architecture, refer to RFC 3031 Multiprotocol Label Switching Architecture.

Carrier Grade Ethernet. Ethernet in service provider networks, MAN/WAN

White Paper. Ethernet OAM. By Yaakov (Jonathan) Stein, Chief Scientist RAD Data Communications. Innovative Access Solutions

How To Make A Network Cable Reliable And Secure

Resiliency in Ethernet Based Transport Networks

Monitoring Ethernet Links in the First Mile

Chapter 46 Link Layer Discovery Protocol (LLDP)

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

ZyXEL MGS-3712F V3.90(BBB.4)C0 Release Note/Manual Supplement

Link Layer Discovery Protocol

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Ethernet OAM enabled OpenFlow Controller

Using Link Layer Discovery Protocol in Multivendor Networks

Internet Control Protocols Reading: Chapter 3

Central Office Testing of Network Services

Technical Specification MEF 30. Service OAM Fault Management Implementation Agreement. January 2011

LLDP-MED and Cisco Discovery Protocol

Data Communication Networks and Converged Networks

Service Definition. Internet Service. Introduction. Product Overview. Service Specification

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version Rev.

Technical Specification MEF 6.1. Ethernet Services Definitions - Phase 2. April, 2008

IP Routing Features. Contents

Scalability Analysis of Metro Ethernet

HARTING Ha-VIS Management Software

TRILL for Data Center Networks

How To Configure Voice Vlan On An Ip Phone

Administrative Distance

Using IPM to Measure Network Performance

Computer Networks I Laboratory Exercise 1

G.8032 Ethernet Ring Protection Overview. March, 2008 ITU-T Q9 SG 15

Avaya ExpertNet Lite Assessment Tool

Monitorowanie parametrów SLA oraz SAT (Service ActivationTest) w oparciu o urządzenia CE2.0 Raisecom. Marcin Bała / Tomasz Wolanin

VXLAN: Scaling Data Center Capacity. White Paper

Building Secure Network Infrastructure For LANs

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

A Link Layer Discovery Protocol Fuzzer

How To Understand and Configure Your Network for IntraVUE

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)

Carrier Ethernet: New Game Plan for Media Converters

Configuration Management: Best Practices White Paper

Ethernet as a Carrier Grade Technology: Developments and Innovations

Chapter 4 Connecting to the Internet through an ISP

Multiprotocol Label Switching (MPLS)

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

Juniper Networks EX Series/ Cisco Catalyst Interoperability Test Results. May 1, 2009

L2 / L3 Switches. Link Layer Discovery Protocol (LLDP) Configuration Guide

Networking 4 Voice and Video over IP (VVoIP)

SSVVP SIP School VVoIP Professional Certification

RARP: Reverse Address Resolution Protocol

DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL

hp ProLiant network adapter teaming

ethernet alliance Provider Backbone Transport Overview Version 1.0 December 2007 Authors:

How To Switch In Sonicos Enhanced (Sonicwall) On A 2400Mmi 2400Mm2 (Solarwall Nametra) (Soulwall 2400Mm1) (Network) (

Connection-Oriented Ethernet On-Ramp Aggregation for Next-Generation Networks

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Riverstone Networks. Carrier Ethernet Standards Progress. Igor Giangrossi Sr. Systems Engineer, CALA

Transport Layer Protocols

Ethernet Business Services

H3C SR8800 RPR Technology White Paper

Network layer: Overview. Network layer functions IP Routing and forwarding

Ethernet Controller as Solution for Embedded Applications, New Developments and Innovations

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview

MPLS-TP. Future Ready. Today. Introduction. Connection Oriented Transport

Carrier Ethernet A Wave is Building. Provider Backbone Bridges with Traffic Engineering (PBB-TE)

Ethernet (LAN switching)

NETWORK LAYER/INTERNET PROTOCOLS

COMPUTER NETWORKS - LAN Interconnection

Using & Offering Wholesale Ethernet Network and Operational Considerations

Innovation in Access and Metropolitan Area Networks -

NetTESTER Embedded 'Always-On' Network Testing & In-Service Performance Assurance

ITU-T G.8032 Ethernet Ring Protection Switching

CE 2.0 Service Management Life Cycle White Paper

Configuring LLDP, LLDP-MED, and Location Service

CCNP SWITCH: Implementing High Availability and Redundancy in a Campus Network

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

IP - The Internet Protocol

Designing Reliable IP/MPLS Core Transport Networks

IP addressing and forwarding Network layer

What communication protocols are used to discover Tesira servers on a network?

B&B ELECTRONICS WHITE PAPER. Managed Ethernet Switches - Key Features for a Powerful Industrial Network

CMA5000 SPECIFICATIONS Gigabit Ethernet Module

Using Industrial Ethernet Networks for PROFInet

CCT vs. CCENT Skill Set Comparison

Shortest Path Bridging IEEE 802.1aq Overview

Internetworking. Problem: There is more than one network (heterogeneity & scale)

Troubleshooting an Enterprise Network

802.1X Authentication, Link Layer Discovery Protocol (LLDP), and Avaya IP Telephones

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Virtual PortChannels: Building Networks without Spanning Tree Protocol

Transcription:

Connectivity Fault Management Norman Finn 1

DISCLAIMER IEEE P802.1ag is a work in progress. Some of the information in this slide deck reflects consensus among IEEE 802.1 and ITU-T Q.3/13 participants. Some of the information in this slide deck reflects only the opinions of the author. Until P802.1ag and/or Y.17ethoam are approved, there is no reliable means for distinguishing opinion from consensus. 2

What is Metro Ethernet Connectivity Fault Management? Edge Bridge ATM Switch ATM Switch Bridge Bridge Router Router Router Bridge switch switch Edge Bridge Ethernet over SONET Ethernet over MPLS 10G Ethernet ATM RFC1483 CFM: Standard Ethernet frames, distinguished from ordinary data frames only by destination MAC address and/or EtherType, and seen, relayed, and/or terminated by Provider Bridges. L2 L1 3

IEEE 802.3ah OAM versus 802.1ag CFM = ITU-T Q.3/13 EthOAM IEEE 802.3ah OAM Operates on physical link only. Cannot pass through a bridge. Discovery, Variable request & response, Event notification, Information, Loopback mode. Single instantiation per physical link. Created by one committee. Standard approved by IEEE 802. Connectivity Fault Management May be per-service or per-wire. Passes end-to-end through bridges. Connectivity Verification, Traceroute, Ping, (Alarm Suppression?). Multiple instances operating at multiple levels simultaneously. Joint effort by IEEE 802.1, ITU-T. Drafting in progress. Both are TLV based, both will (likely) allow vendor-specific TLVs. 4

The OAM Environment Customer contracts with Provider for end-to-end service. Provider contracts with Operator(s) to provide equipment and networks. Provider and Operator(s) may or may not be the same company or same division. 5

The View From Above Provider Domain Customer Domain Operator 2 Domain Operator 1 Domain Bridges UNIs Links in use Unused Links Physical view of a network using CFM 6

The View From Above Provider Domain Customer Domain Customer s view from above Bridges MIPs MEPs Links in use 7

The View From Above Provider Domain Operator 2 Domain Bridges Operator 1 Domain MIPs MEPs Links in use Provider s view from above 8

The View From Above Operator 2 Domain Bridges Operator 1 Domain MIPs MEPs Links in use Unused Links Operators view from above 9

The View From Above Bridges MEPs Links Physical view from above 10

The View From Above Provider Domain Operator 2 Domain Bridges Operator 1 Domain MIPs MEPs Links in use Unused Links Let s take a slice along one path 11

Longitudinal View Customer Equipment Operator 1 Provider Bridges Operator 2 Provider Bridges Customer Equipment Two MEPs, two MIPs visible to the Customer Two MEPs, two MIPs visible to the Provider Each Operator sees only his own MEPs and MIPs Physical links are, presumably, controlled via 802.3ah OAM We can see the MIP/MEP relationships. 12

Longitudinal View Customer Equipment Operator 1 Provider Bridges Operator 2 Provider Bridges Customer Equipment Customer Level Provider Level Operator Level Physical Level Let s look at one port from an end view 13

Longitudinal View Provider Bridge Link to Customer From the end, we see the multiplexing. 14

CFM Packet Types 15

What s in a CFM Packet? In every CFM packet, there is a: Maintenance Level Customer level, Provider level, etc. Globally Unique Service Identifier Label Perhaps based on a DNS name. Transmitting MEP Identifier Unique only within the Service. Transaction Identifier A sequence number. 16

CFM Packet Types Continuity Check Traceroute Loopback (Ping) Alarm Indication? Other? 17

Continuity Check 18

Continuity Check How does a MEP know that the other MEPs, and thus the whole service, are working? It could ping each of the other MEPs. But, a point-to-point ping requires knowing the MAC addresses of the other MEPs, which requires either configuration (which makes hardware changes difficult) or discovery (which requires yet another protocol). Also, point-to-point pings are inefficient. 19

Continuity Check Provider Domain Each MEP transmits a periodic multicast Continuity Check Message inward towards the other MEPs. For each MEP, there is 1 transmission per time period and n receptions. 20

Continuity Check Customer Level Provider Level Operator Level Physical Level Each MEP sends CCs to announce itself to the others. Some ports have multiple MEPs at different levels, or facing in different directions. 21

Continuity Check What is in a Continuity Check Message? Destination MAC address is tied to the ME Level of the packet, to make it easier to confine CCs to a particular domain (Provider, Operator, etc.). ME Level, Service Identifier, MEP Identifier, Transaction Identifier. Lifetime. (Optional) Arbitrary data, software checksum. (Perhaps) Port state? Layer 3 management address? Transmission time? 22

Continuity Check What does the receiver do with a CC? It Verifies that the Service Identifier matches; Verifies that the MEP ID doesn t match; Catalogues the information by MEP ID; Refreshes the catalogued Lifetime; Checks the Transaction ID sequence; and (Optional) Processes optional info. 23

Continuity Check What can CC detect? Service cross-connect (Service ID mismatch). Duplicate MEP configurations (MEP ID match). Missing or unexpected MEPs (Optional check: unexpected MEPs may not be an error). Forwarding loops (duplicate Transaction IDs). Data loss (missing Transaction IDs or Lifetime expiration). Data corruption (bad optional data checksum). Bad frame size configuration (CC with optional data fails to reach other MEPs). Jitter (comparison of differences between transmission times and differences between reception times.) 24

Continuity Check What is the output from CC? Each MEP has a MIB that lists the configured list of other MEPs (if any) and the catalogue of active MEPs received from CCs. The catalogue also records the MAC addresses of the other MEPs in the service at this ME Level. Failures are normally reported to the network manager via SNMP traps. 25

Traceroute 26

Traceroute This is not IP Traceroute! Ethernet has no TTL (Time To Live) counter that is altered hop-by-hop in the data plane. CFM Traceroute determines the path from a MEP to a given MAC address. That given MAC address is normally another MEP s MAC address. That MAC address was learned from Continuity Check messages. 27

Traceroute MEP sends a Traceroute Message to a destination MAC address that will cause it to be stopped by any MEP or MIP at the ME Level of the Traceroute. This is easiest if Traceroute uses the same destination MAC address as the Continuity Checks of the next-lower level. Each receiving MEP or MIP sends a unicast Traceroute Reply to the original MEP. 28

Traceroute Target MEP 3 Provider Domain 1 Originating MEP 2 Each receiving MEP sends a Traceroute Reply directly to the Originating MEP, and regenerates the Traceroute Message. If a MIP is not sure where to send the Traceroute Message, the trail ends. 29

Traceroute Customer Equipment Operator 1 Provider Bridges Operator 2 Provider Bridges Customer Equipment Customer Level sees edges of Provider Service in Traceroute Provider Level sees edges of Operator networks in Traceroute Each Operator sees only his own MEPs and (hardware) MIPs Physical links have no MIPs MEPs at one ME Level are MIPs at some higher level. 30

Traceroute But, what if the traced MAC address has been forgotten? MIPs can take copies of Continuity Checks and catalogue them, perhaps in software by source MAC address only in a CC Database. This database allows Traceroute to follow forgotten links, and thus return useful information. 31

Traceroute What is in a Traceroute Message? Destination MAC address is tied to the ME Level of the packet, to make it easier to confine CCs to a particular domain (Provider, Operator, etc.). ME Level, Service Identifier, MEP Identifier, Transaction Identifier. TTL. (To prevent Traceroute from looping forever, even if data plane has a loop.) Target MAC address. Originating MEP s MAC address. 32

Traceroute What is in a Traceroute Reply? The Transaction ID and TTL from the Traceroute Message, so that the replies can be coordinated. Information about each MIP through which the Traceroute Message flowed. There may be 1 or 2 in a single bridge. Information includes the MIPs MAC addresses. The identity of the next hop (in P802.1ab LLDP terms). Information about the reason for forwarding or not forwarding the Traceroute Message (e.g. MAC address forgotten, destination reached). 33

Traceroute What is the output from Traceroute? The results of the Traceroute fill a MIB for inspection by the Network Administrator. These results provider the MEP with a list of the MIPs and their MAC addresses for use in Loopback Messages. 34

Loopback 35

Loopback What is in a Loopback Message? Unicast MAC address of target. ME Level, Service Identifier, MEP Identifier, Transaction Identifier. (Optional) Arbitrary data, software checksum. (Perhaps) Transmission time? Reply time? 36

Loopback Target MEP 3 Provider Domain 2 1 Originating MEP MEP can send a Loopback to any MEP or MIP in the service. MEPs are discovered by Continuity Check, MIPs are discovered by Traceroute. 37

Loopback What is Loopback Good for? Loopback follows the unicast data path, not the multicast path. Sending Loopback to successive MIPs can determine the location of a fault. Sending a high volume of Loopback Messages can test bandwidth, reliability, or jitter of a service. 38

Alarm Indication Signal 39

Alarm Indication Signal What is AIS? When a MEP discovers an error, presumably a Continuity Check failure, it transmits periodic AIS in the opposite direction from that in which it runs the CCs. The AIS includes a Lifetime TLV that causes it to expire after a certain time. AIS transmission ceases if the failure is repaired via Spanning Tree. 40

Alarm Indication Signal Failure causes MEP to generate AISs in opposite direction of Continuity Check. 41

Alarm Indication Signal MIPs receive AISs and promote them to their own ME Levels for propagation to MEPs. 42

Alarm Indication Signal MEP may propagate or terminate AIS. Propagation is shown. 43

Alarm Indication Signal What is AIS Good for? Receiving MEPs may catalogue AIS and wait to see whether their own CCs report a failure. If Spanning Tree repairs error, none need be generated. If not, Network Administrator has already been notified of the problem; error trap from MEP is suppressed in order to reduce unnecessary alarms. 44

Alarm Indication Signal What is AIS Good for? Receiving MEPs may delay the propagation of AISs. This gives Spanning Tree time to correct the problem before alarming higher levels. Receiving MEPs may take action to correct the failure reported by AIS. This assumes that there is no Spanning Tree to correct the problem. 45

Alarm Indication Signal Multiplexing There may be a one-to-many relationship between lower and upper MEPs/MIPs on a given interface. For example, one physical link may carry many service instances. One Provider service instance may carry many Customer VLANs. This causes a multiplication of AISs. 46

Alarm Indication Signal One Failed Link Many AISs Provider Bridge One physical failure, many AISs. 47

Other CFM Packet Types 48

Other CFM Packet Types? Discovery Continuity Check provides MEP discovery. Loopback to a multicast destination requires jitter timers to avoid implosions, and hence is no faster than Continuity Check. IEEE 802.2 defined multicast Test and XID functions, which are the primary reason that these functions are disabled by default on most interfaces. 49

Other CFM Packet Types? Discovery MIP discovery may be done with Traceroute, one MEP at a time. A Traceroute for a multicast MAC target might trace an entire network in one large operation. That is a heavy procedure. But, N Traceroutes for N MEPs would be even heavier. 50

Other CFM Packet Types? Remote Defect Indication Familiar (to some) from use in other technologies. Ethernet does not support unidirectional links. RDI is meaningful only when unidirectional links are possible. 51

Other CFM Packet Types? Performance Management It should be possible to piggyback additional TLVs on Continuity Check and Loopback in order to measure performance. An additional PM OpCode may be desired to mark packets that require hardware assistance (e.g. timestamps) to produce meaningful data. 52

Other CFM Packet Types? Intrusive Loopback Purpose is wire-speed bandwidth and forwarding verification. Similar to 802.3ah OAM Loopback, but loopback function would swap source and destination MAC addresses, and would operate on a per- Service, instead of a per-mac, basis. Requires hardware implementation to be useful. Is extremely dangerous in a shared medium service. 53

Summary 54

Summary Both IEEE 802.1 and ITU-T Study Group 13 Question 3, are cooperating. The extra meetings are enabling the rapid progression of the standard(s). It remains to be seen whether there will be problems caused by having two groups working on the same problem, but so far, there is great promise for the successful completion of the standards. 55