Title: Protection of UNIs and E-NNIs
1Protection of UNIs and E-NNIs
- Zehavit Alon
- Nurit Sprecher
- September 2009
2Recap
- The subject of Inter-network Ethernet Service
Protection was introduced during the meeting in
May in http//www.ieee802.org/1/files/public/docs
2009/new-alon-service-protection-in-interconnectne
d-areas-0509-v01.ppt - Two possible topologies were introduced and
compared
Mesh
Ring
3Recap (contd)
- The mesh topology has advantages and drawbacks
- Advantages
- Direct (single-hop) connectivity between the
attached networks ensuring a short path and low
latency during transmission between the attached
networks - Capability to enable efficient and simple
load-sharing across all the (direct) links with
optimum resource utilization - Drawback
- Any protection event (i.e. switchover or
revert) in the interconnected zone affects the
topology of at least one of the attached
networks.
4Drawback overcome
- Note A construct with 5 links is also supported.
The left side operates like the partial mesh
topology while the right side behaves like the
full mesh topology.
Partial Mesh
Full Mesh
5Drawback overcome (contd)
- The full mesh construct benefits from the
advantages of the mesh. It minimizes the effects
of protection events within the interconnected
zone on the topology of the related attached
networks, reducing them to the level of
inevitable effects - Each protected VLAN is transported over one of
the links traversing the interconnected zone. - Topology changes in the attached network are
minimized by (when possible) using the
connectivity between the node in the same network.
6Reminder and definitions
- The protection mechanism provides local
protection of Ethernet services (VLANs) between
network boundaries. - The nodes, ports, and links connecting the
adjacent networks are referred to as the
interconnected zone. - The node in each of the networks which at any
given moment conveys traffic from the network to
the interconnected zone, as well as from the
interconnected zone to the network, is referred
to as the traffic gateway (TG).
Example route
Interconnected Zone
Interconnected Zone
Interconnected Zone
Interconnected Zone
7Requirements
- Protect against any single failure or degradation
of a facility (link or node) in the
interconnected zone - Support all standard Ethernet frames 802.1D,
802.1Q, 802.1ad, 802.1ah - Support interconnection between different network
types (e.g. CN-PBN, PBN-PBN, PBN-PBBN,
PBBN-PBBN, etc.) - Provide 50ms protection switching
- Provide a clear indication of the protection
state - Maintain an agnostic approach regarding
- the Ethernet technology running on each of the
interconnected networks, and - the protection mechanism deployed by each of the
interconnected networks
8Requirements (contd.)
- Avoid modification of the protocols running
inside each of the interconnected networks - Ensure that multicast and broadcast frames are
delivered only once over the interconnected zone - Allow load-balancing between the interfaces that
connect the networks to ensure efficient
utilization of resources - Minimize the effects of protection events within
the interconnected zone on the topology of the
related attached networks, reducing them to the
level of unavoidable effects
9Solution PrinciplesFailure effects
- When a traffic gateway node fails, changes in the
attached network (to which the node belongs) are
inevitable. - A new node becomes the traffic gateway replacing
the failed traffic gateway.
10Solution PrinciplesFailure effects
- When a link between traffic gateway nodes fails,
a bypass route may (when possible) be established
between the nodes to prevent changes in the
attached network (replacing the failed link,
while keeping the traffic gateways).
11Solution PrinciplesNode roles
- For each protected VLAN, a node in one network is
connected to the nodes in the other network. This
node, referred to as the master, is responsible
for selecting the link over which the traffic
will be conveyed between the networks. - The master is connected to two nodes in the
adjacent network. These two nodes follow the
masters decisions and are referred to as slaves.
M
12Solution PrinciplesNode roles (contd)
- The master can be protected by a redundant node
which may replace the master as the
decision-making node. This node is referred to as
the deputy. The deputy is connected to the same
two slaves as the master. - The master and deputy are referred to as control
nodes.
M
S
D
D
S
S
D
M
S
M
S
S
13Solution PrinciplesPort configurations
- In the control nodes, one of the ports
connecting the networks is configured as working,
the other as protection. - The working port is the preferred port
(administratively enabled) for conveying traffic
in the absence of other considerations. (A
consideration that precedes port configuration is
the preservation of the traffic gateway.) - The slaves have no configurations on these ports.
Master
Slave1
W
P
W
P
Deputy
Slave2
14Solution Principles Additional (optional)
connectivity
- The nodes on the same network may also be
connected - Slave nodes - provide a means to bypass a failed
link without changing the traffic gateway. - Control nodes (master and deputy) provide direct
health monitoring between the control nodes.
Master
Slave1
Deputy
Slave2
15Solution PrinciplesAdditional port configuration
- The ports connecting the control nodes to each
other are configured as internal. This also
applies to the ports connecting the slave nodes
to each other. Internal ports are optional. - An internal port may be configured on all node
types (master, deputy, and slave). - The state absent is used when there is no
internal port. (This state distinguishes the
configuration from that in which an existing
internal link failed. In both cases, the port
does not receive a message form its peer.)
Master
Slave1
W
I
P
I
I
I
W
P
Deputy
Slave2
16Solution HighlightsMaster
- The master becomes a traffic gateway
- Always when it operates in revertive mode
- If the deputy is not already a traffic gateway in
non-revertive mode - The master chooses the port for conveying traffic
according to - Existence of a traffic gateway amongst the slaves
- Port configuration and link states (in the
absence of a traffic gateway)
Master
Slave1
W
I
P
I
I
I
W
P
Deputy
Slave2
17Solution PrinciplesSlaves
- A slave that receives a request to become a
traffic gateway from a control node will - become a traffic gateway
- when there is an internal link, and the other
slave is not a traffic gateway - when the internal link is absent
- become an intermediate node in a bypass that
redirects traffic to the other slave - when there is an internal link, and the other
slave is a traffic gateway
Master
Slave1
W
I
P
I
I
I
W
P
Deputy
Slave2
18Solution HighlightsDeputy
- The deputy becomes a traffic gateway
- immediately, when it looses connectivity with the
master (when the control nodes are connected) - when there is no traffic gateway amongst the
slaves for a predetermined period of time (which
indicates that there is no traffic gateway
amongst the control nodes) and the control nodes
are not connected - The deputy chooses the port to convey traffic
according to - the existence of a traffic gateway amongst the
slaves - port configuration and link states (in the
absence of a traffic gateway)
19Solution principles Revertive modes
- Revertive mode is supported by the control nodes
at 2 levels port level and node level
W
P1
S1
- Port-level revertive mode Traffic is restored to
the configured working port. - Node-level revertive mode Traffic is restored to
the master after it recovers from a failure.
P
P2
I
I
I
I
P1
S2
P2
W
P1
S1
P
P2
I
I
I
I
W
P1
S2
P2
20Transition table
D M Linkrecovers Link revertive mode Mrecovers Node revertive mode D-S1 M-S2 M-D D-S2 S1-S2 M-S1 S2 D S1 M Facility failure State
- D-S1 - - - - - - - M-S2-S1 - - M-S2 D-S1 M-S1
M-S1 - D-S1 M-S2 - - - D-S1-S2 - - D-S1 M-S2 - - D-S2
- D-S1 M-S1 - - M-S1-S2 - - - - M-S1 - - D-S2 M-S2
M-S1 - - M-S1 D-S2-S1 - - - - - - M-S1 D-S2 - D-S1
- D-S1 M-S1 - - M-S1 - - M-S1 - M-S1 - M-S2 D-S1 M-S2-S1
- D-S1 - - - - - - M-S2 M-S2 M-S1 - M-S2 D-S2 M-S1-S2
M-S1 - - M-S2 D-S2 - - - D-S2 - D-S1 M-S2 D-S2 - D-S1-S2
M-S1 - D-S1 M-S1 - - - D-S1 D-S1 - D-S1 M-S1 D-S2 - D-S2-S1
Note 1 A bypass to a failed link always goes
through a slave (never through a control
node). Note 2 The last two columns are for
constructs that only have five links. (The
control nodes are not connected.) Note 3 The
scenario in which there are only four links can
be reached, when applicable, by removing the S1
S2 connectivity.
21State machine
- Each node retains its own state (TG or not) and
the states (active/standby) of its ports (P1, P2,
and I) which are part of the interconnected zone. - The node is updated on the state of the peer
ports and the nodes connected to it via
information received over the links connected to
the other nodes. - Each node may change its own state and the state
of its ports according to the configuration, the
state of the node and the ports, and according to
the information received.
P1
P2
I
S S
22Selected Scenarios
23Start Up
The master changes its state to active, becomes a
traffic gateway, and chooses the working port to
convey traffic. It creates new messages and sends
them over the ports
The slave receives a request on P1 to become a
traffic gateway. It changes its state to active
to become a traffic gateway, and chooses the
port on which the request arrived (P1) for
conveying traffic. It creates new messages and
sends them over its ports.
The master receives an indication from the slave
that it became a traffic gateway using port P1.
It does not change its state or the messages it
sends over its ports.
Beginning The scenario start when all nodes are
started for the first time no traffic is
conveyed. The nodes start with all ports in
standby none acts as a traffic gateway.
Master
Slave 1
Entity Local Remote Remote
Current node port
Current Node Standby
Current P1 Standby A A
Current P2 Standby S S
Current I Standby S S
New Node Active
New P1 Active A A
New P2 Standby S S
New I Standby S S
Entity Local Remote Remote
Current node port
Current Node Standby
Current W Standby S S
Current P Standby S S
Current I Standby S S
New Node
New W
New P
New I
Entity Local Remote Remote
Current node port
Current Node Standby
Current W Standby S S
Current P Standby S S
Current I Standby S S
New Node Active
New W Active S S
New P Standby S S
New I Standby S S
Entity Local Remote Remote
Current node port
Current Node Standby
Current P1 Standby S S
Current P2 Standby S S
Current I Standby S S
New Node
New P1
New P2
New I
Entity Local Remote Remote
Current node port
Current Node Standby
Current W Standby S S
Current P Standby S S
Current I Standby S S
New Node Active
New W Active A A
New P Standby S S
New I Standby S S
W
P1
P
P2
I
I
EndThe mater and Slave 1 are traffic gateways
they use the link connecting the working port of
the master and P1 of Slave1. The deputy and
Slave 2 are aware of the situation. They do not
convey traffic.
Deputy
Slave 2
Entity Local Remote Remote
Current node port
Current Node Standby
Current P1 Standby S S
Current P2 Standby S S
Current I Standby S S
New Node
New P1
New P2
New I
Entity Local Remote Remote
Current node port
Current Node Standby
Current W Standby S S
Current P Standby S S
Current I Standby S S
New Node
New W
New P
New I
Entity Local Remote Remote
Current node port
Current Node Standby
Current W Standby A S
Current P Standby S S
Current I Standby S S
New Node
New W
New P
New I
Entity Local Remote Remote
Current node port
Current Node Standby
Current P1 Standby A S
Current P2 Standby S S
Current I Standby A S
New Node
New P1
New P2
New I
I
I
P1
W
S2
P
P2
The slave receives an indication from the master
that it is a traffic gateway but does not receive
a request to become a traffic gateway. It also
receives an indication from the other slave that
it too is a traffic gateway. The slave does not
change its state and the messages it sends over
its ports.
The deputy receives an indication from the master
that it is a traffic gateway plus an indication
from the slave on the working port that it is
also a traffic gateway. The deputy does not
change its state and the messages it sends over
its ports.
24Link fails
The link connecting the master and Slave 1 failed.
The master does not receive health messages from
Slave 1 and realizes that it lost connectivity
with it. It chooses the protection port to convey
traffic.
The slave that acts as a traffic gateway loses
connectivity with the master. After a short
while, it receives a request over the internal
port indicating that the other slave is using it
as a bypass. It activates the internal port.
BeginningThe scenario starts with traffic being
conveyed between the master and Slave 1 using the
working port of the master and P1 of the slave.
Master
Slave 1
Entity Local Remote Remote
Current node port
Current Node Active
Current W Active A A
Current P Standby S S
Current I Standby S S
New Node
New W
New P
New I
Entity Local Remote Remote
Current node port
Current Node Active
Current W Active
Current P Standby S S
Current I Standby S S
New Node Active
New W Standby
New P Active S S
New I Standby S S
Entity Local Remote Remote
Current node port
Current Node Active
Current P1 Active
Current P2 Standby S S
Current I Standby S A
New Node Active
New P1 Standby
New P2 Standby S S
New I Active S A
Entity Local Remote Remote
Current node port
Current Node Active
Current P1 Active A A
Current P2 Standby S S
Current I Standby S S
New Node
New P1
New P2
New I
W
P1
P
P2
I
I
EndThe master and Slave 1 are traffic gateways.
Slave 2 is used as an intermediate node in a
bypass created between the master and Slave 1.
Deputy
Slave 2
Entity Local Remote Remote
Current node Port
Current Node Standby
Current P1 Standby A S
Current P2 Standby S S
Current I Standby A S
New Node
New P1
New P2
New I
Entity Local Remote Remote
Current node port
Current Node Standby
Current P1 Standby A A
Current P2 Standby S S
Current I Standby A S
New Node Standby
New P1 Active A A
New P2 Standby S S
New I Active S S
Entity Local Remote Remote
Current node port
Current Node Standby
Current W Standby A S
Current P Standby S S
Current I Standby A S
New Node
New W
New P
New I
I
I
P1
W
S2
P
P2
The slave receives a request on P1 to become a
traffic gateway. It is aware of the fact that the
slave connected through the internal port is a
traffic gateway. It activates the internal port
but does not become a traffic gateway. It will
pass all packets received on P1 to the internal
port. Packets received from the attached network
will be dropped. It creates new messages and
sends them over its ports.
25Slave fails
The master does not receive health messages from
Slave 1 and realizes that it lost connectivity
with it. It chooses the protection port to convey
traffic.
The slave acting as the TG of this network fails.
The master receives an indication from the slave
that it became a traffic gateway using port P2.
It does not change its state or the messages it
sends over its ports.
BeginningThe scenario starts with traffic being
conveyed between the master and Slave 1 using the
working port of the master and P1 of the slave.
Master
Slave 1
Entity Local Remote Remote
Current node port
Current Node Active
Current W Active A A
Current P Standby S S
Current I Standby S S
New Node
New W
New P
New I
Entity Local Remote Remote
Current node port
Current Node Active
Current P1 Active A A
Current P2 Standby S S
Current I Standby S S
New Node
New P1
New P2
New I
Entity Local Remote Remote
Current node port
Current
Current
Current
Current
New
New
New
New
Entity Local Remote Remote
Current node port
Current Node Active
Current W Active
Current P Standby S S
Current I Standby S S
New Node Active
New W Standby
New P Active S S
New I Standby S S
W
P1
P
P2
I
I
EndThe master and Slave 2 act as traffic
gateways using the link connecting the protection
port of the master and P1 of Slave 2. The deputy
and Slave 2 are aware of the situation. They do
not convey traffic.
Deputy
Slave 2
Entity Local Remote Remote
Current node port
Current Node Standby
Current P1 Standby A S
Current P2 Standby S S
Current I Standby A S
New Node
New P1
New P2
New I
Entity Local Remote Remote
Current node port
Current Node Standby
Current W Standby A S
Current P Standby S S
Current I Standby A S
New Node
New W
New P
New I
Entity Local Remote Remote
Current node port
Current Node Standby
Current P1 Standby A A
Current P2 Standby S S
Current I Standby
New Node Active
New P1 Active A A
New P2 Standby S S
New I Standby S S
I
I
P1
W
S2
P
P2
The deputy receives an indication from the master
that it is a traffic gateway as well as an
indication from the slave on the protection port
that it too is a traffic gateway. The deputy is
aware that it is not connected to Slave 1. It
does not change its state and the messages it
sends over its ports.
The slave receives a request on P1 to become
traffic gateway. It does not have connectivity
with Slave 1, so it change its state to active to
become a traffic gateway, and chooses the port
on which the request arrived (P1) to convey
traffic. It creates new messages and sends them
over its ports.
26Master fails
Slave 1 senses that it lost connectivity with the
master and it receives a request to become a
traffic gateway on P2. Since it is already a
traffic gateway, it only needs to deactivate P1
and activate P2. It creates new messages and
sends them over its ports.
The master acting as the TG of this network fails.
BeginningThe scenario starts with traffic being
conveyed between the master and Slave 1 using the
working port of the master and P1 of Slave 1.
Master
Slave 1
Entity Local Remote Remote
Current node port
Current Node Active
Current W Active A A
Current P Standby S S
Current I Standby S S
New Node
New W
New P
New I
Entity Local Remote Remote
Current node port
Current Node Active
Current P1 Active A A
Current P2 Standby S S
Current I Standby S S
New Node
New P1
New P2
New I
Entity Local Remote Remote
Current node port
Current Node
Current W
Current P
Current I
New Node
New W
New P
New I
Entity Local Remote Remote
Current node port
Current Node Active
Current P1 Active
Current P2 Standby S S
Current I Standby S S
New Node Active
New P1 Standby
New P2 Standby A A
New I Standby A S
W
P1
P
P2
I
I
EndThe deputy is a traffic gateway and conveys
traffic using its working port. Slave 1 is a
traffic gateway of the attached network and it
conveys traffic using P2.
Deputy
Slave 2
Entity Local Remote Remote
Current node port
Current Node Standby
Current P1 Standby A S
Current P2 Standby S S
Current I Standby A S
New Node
New P1
New P2
New I
Entity Local Remote Remote
Current node port
Current Node Standby
Current W Standby A S
Current P Standby S S
Current I Standby A S
New Node
New W
New P
New I
Entity Local Remote Remote
Current node port
Current Node Standby
Current W Standby A S
Current P Standby S S
Current I Standby
New Node Active
New W Active A S
New P Standby S S
New I Standby
I
I
P1
W
S2
P
P2
The deputy senses that the master failed. It
becomes a traffic gateway and uses the port that
is connected to a slave which is a traffic
gateway (if there is such). It creates new
messages and send them over its ports.
27Proposal
- Start a new project in the IEEE 802.1 aimed at
defining a protection mechanism for Ethernet
services in UNI/E-NNI (interconnected networks). - Adopt the proposed topologies.
- The mechanism should comply with the requirements
introduced in this presentation.
28Thank you
- zehavit.alon_at_nsn.com
- nurit.sprecher_at_nsn.com
29Backup
30Flow Chart
M
S1
M failed
S1 failed
M-S2-S1
M
S1
S2
D
S2 failed
D failed
M-S2 failed S1-S2 failed S2 failed
D-S1-S2
D
S2
D-S1 failed S1-S2 failed S1 failed
M1-S1 failed
M
S1
D-S2 failed
M
M-S1
S1
S2
D
D-S2
D
S2
M failed
D failed
S2 failed LRM S1 recovered
S1 failed
NRM M recovered D failed
LRM M-S1 recovered S2 failed
M
M
S1
S1
S1 failed
M failed
D-S1
M-S2
S2
D
S2
D
M-S2 failed
D-S1 failed
M-S1 failed S1-S2 failed S1 failed
S1-S2 failed D-S2 failed S2 failed
M
M
S1
S1
S2 failed
S1 failed
D-S2-S1
M-S1-S2
D
S2
S2
D
D failed
M failed