Protection of UNIs and E-NNIs Zehavit Alon Nurit Sprecher September 2009 Slide 1 Recap • • The subject of Inter-network Ethernet Service Protection was introduced during the meeting in May in: http://www.ieee802.org/1/files/public/docs2009/new-alonservice-protection-in-interconnectned-areas-0509-v01.ppt Two possible topologies were introduced and compared Mesh Ring The comparison indicted that mesh is superior to ring. Slide 2 May, 2008 Recap (cont’d) • The mesh topology has advantages and drawbacks: – Advantages ▪ ▪ Direct (single-hop) connectivity between the attached networks ensuring a short path and low latency during transmission between the attached networks Capability to enable efficient and simple load-sharing across all the (direct) links with optimum resource utilization – Drawback Any protection event (i.e. switchover or revert) in the interconnected zone affects the topology of at least one of the attached networks. Slide 3 May, 2008 Drawback overcome Full Mesh Partial Mesh • Note: A construct with 5 links is also supported. The left side operates like the partial mesh topology while the right side behaves like the full mesh topology. Slide 4 May, 2008 Drawback overcome (cont’d) The full mesh construct benefits from the advantages of the mesh. It minimizes the effects of protection events within the interconnected zone on the topology of the related attached networks, reducing them to the level of inevitable effects: – Each protected VLAN is transported over one of the links traversing the interconnected zone. – Topology changes in the attached network are minimized by (when possible) using the connectivity between the node in the same network. Slide 5 May, 2008 Reminder and definitions • The protection mechanism provides local protection of Ethernet services (VLANs) between network boundaries. TG TG TG Interconnected Zone TG Interconnected Zone TG TG Interconnected Zone Interconnected Zone TG TG Example route • The nodes, ports, and links connecting the adjacent networks are referred to as the interconnected zone. • The node in each of the networks which at any given moment conveys traffic from the network to the interconnected zone, as well as from the interconnected zone to the network, is referred to as the traffic gateway (TG). Slide 6 May, 2008 Requirements • Protect against any single failure or degradation of a facility (link or node) in the interconnected zone • Support all standard Ethernet frames: 802.1D, 802.1Q, 802.1ad, 802.1ah • Support interconnection between different network types (e.g. CN-PBN, PBN-PBN, PBN-PBBN, PBBN-PBBN, etc.) • Provide 50ms protection switching • Provide a clear indication of the protection state • Maintain an agnostic approach regarding – the Ethernet technology running on each of the interconnected networks, and – the protection mechanism deployed by each of the interconnected networks Slide 7 May, 2008 Requirements (cont’d.) • Avoid modification of the protocols running inside each of the interconnected networks • Ensure that multicast and broadcast frames are delivered only once over the interconnected zone • Allow load-balancing between the interfaces that connect the networks to ensure efficient utilization of resources • Minimize the effects of protection events within the interconnected zone on the topology of the related attached networks, reducing them to the level of unavoidable effects Slide 8 May, 2008 Solution Principles Failure effects • When a traffic gateway node fails, changes in the attached network (to which the node belongs) are inevitable. • A new node becomes the traffic gateway replacing the failed traffic gateway. Slide 9 May, 2008 Solution Principles Failure effects • When a link between traffic gateway nodes fails, a bypass route may (when possible) be established between the nodes to prevent changes in the attached network (replacing the failed link, while keeping the traffic gateways). Slide 10 May, 2008 Solution Principles Node roles • For each protected VLAN, a node in one network is connected to the nodes in the other network. This node, referred to as the master, is responsible for selecting the link over which the traffic will be conveyed between the networks. • The master is connected to two nodes in the adjacent network. These two nodes follow the master’s decisions and are referred to as slaves. M S S Slide 11 May, 2008 Solution Principles Node roles (cont’d) • The master can be protected by a redundant node which may replace the master as the decision-making node. This node is referred to as the deputy. The deputy is connected to the same two slaves as the master. SD M S SD SM D S SM The role of each node (master, deputy, and slave) is set for each VLAN by administrative configuration. The same node may function as a master node for some VLANs (blue), as a deputy node for other VLANs (red), and as a slave for other VLANs (green), thus enabling load-sharing between the nodes. • The master and deputy are referred to as control nodes. Slide 12 May, 2008 Solution Principles Port configurations In the control nodes, one of the ports connecting the networks is configured as working, the other as protection. • The working port is the preferred port (administratively enabled) for conveying traffic in the absence of other considerations. (A consideration that precedes port configuration is the preservation of the traffic gateway.) • The slaves have no configurations on these ports. Master Slave1 W P W P Deputy Slide 13 May, 2008 Slave2 Solution Principles Additional (optional) connectivity The nodes on the same network may also be connected: • Slave nodes - provide a means to bypass a failed link without changing the traffic gateway. • Control nodes (master and deputy) provide direct health monitoring between the control nodes. Slide 14 May, 2008 Master Slave1 Deputy Slave2 Solution Principles Additional port configuration The ports connecting the control nodes to each other are configured as internal. This also applies to the ports connecting the slave nodes to each other. Internal ports are optional. • An internal port may be configured on all node types (master, deputy, and slave). • The state “absent” is used when there is no internal port. (This state distinguishes the configuration from that in which an existing internal link failed. In both cases, the port does not receive a message form its peer.) Master Slave1 W I I P I W P I Deputy Slide 15 May, 2008 Slave2 Solution Highlights Master • The master becomes a traffic gateway: – Always when it operates in revertive mode – If the deputy is not already a traffic gateway in non-revertive mode • The master chooses the port for conveying traffic according to: – Existence of a traffic gateway amongst the slaves – Port configuration and link states (in the absence of a traffic gateway) Master Slave1 W I I P I W P I Deputy Slide 16 May, 2008 Slave2 Solution Principles Slaves A slave that receives a request to become a traffic gateway from a control node will: – become a traffic gateway: ▪ when there is an internal link, and the other slave is not a traffic gateway ▪ when the internal link is absent – become an intermediate node in a bypass that redirects traffic to the other slave ▪ when there is an internal link, and the other slave is a traffic gateway Master Slave1 W I I P I W P I Deputy Slide 17 May, 2008 Slave2 The master behaves in the same way. The slave decides whether or not to form a bypass. Solution Highlights Deputy • The deputy becomes a traffic gateway: – immediately, when it looses connectivity with the master (when the control nodes are connected) – when there is no traffic gateway amongst the slaves for a predetermined period of time (which indicates that there is no traffic gateway amongst the control nodes) and the control nodes are not connected • The deputy chooses the port to convey traffic according to: – the existence of a traffic gateway amongst the slaves – port configuration and link states (in the absence of a traffic gateway) Master Slave1 W I I Slave1 W P I P W P I W P Deputy Slide 18 May, 2008 Master Slave2 Deputy Slave2 Solution principles Revertive modes Revertive mode is supported by the control nodes at 2 levels: port level and node level • Port-level revertive mode Traffic is restored to the configured working port. Note: Port revertive may have an effect on the attached networks - TG changed. • Node-level revertive mode Traffic is restored to the master after it recovers from a failure. Note: Node revertive may have an effect on the attached networks - TG changed. Slide 19 May, 2008 M W P1 P P2 S 1 I I I I D W P1 P P2 M W P1 P P2 S 2 S 1 I I I I D W P1 P P2 S 2 Transition table Facility failure State M M S1 D S2 S1 D S2 M-S1 S1-S2 D-S2 M-D M-S2 D-S1 M Link recovers recovers Node revertive mode Link revertive mode M D M-S1 D-S1 M-S2 - - M-S2-S1 - - - - - - - D-S1 - D-S2 - - M-S2 D-S1 - - D-S1-S2 - - - M-S2 D-S1 - M-S1 M-S2 D-S2 - - M-S1 - - - - M-S1-S2 - - M-S1 D-S1 - D-S1 - D-S2 M-S1 - - - - - - D-S2-S1 M-S1 - - M-S1 M-S2-S1 D-S1 M-S2 - M-S1 - M-S1 - - M-S1 - - M-S1 D-S1 - M-S1-S2 D-S2 M-S2 - M-S1 M-S2 M-S2 - - - - - - D-S1 - D-S1-S2 - D-S2 M-S2 D-S1 - D-S2 - - - D-S2 M-S2 - - M-S1 D-S2-S1 - D-S2 M-S1 D-S1 - D-S1 D-S1 - - - M-S1 D-S1 - M-S1 Note 1: A bypass to a failed link always goes through a slave (never through a control node). Note 2: The last two columns are for constructs that only have five links. (The control nodes are not connected.) Note 3: The scenario in which there are only four links can be reached, when applicable, by removing the S1 S2 connectivity. Slide 20 May, 2008 State machine • Each node retains its own state (TG or not) and the states (active/standby) of its ports (P1, P2, and I) which are part of the interconnected zone. • The node is updated on the state of the peer ports and the nodes connected to it via information received over the links connected to the other nodes. • Each node may change its own state and the state of its ports according to the configuration, the state of the node and the ports, and according to the information received. S P1 S S M P2 A A I S S S Slide 21 May, 2008 S S D Selected Scenarios Slide 22 Start Up Master Entity Local Remote node C u Node Standby r W Standby r e P Standby n t I Standby N e w port S The master changes its state The slave receives a request on P1 to active, becomes a traffic to become a traffic gateway. It The master receivesthe an indication gateway, and chooses changes its state to active to from the slave that it became a Beginning working port to convey become a traffic gateway, and trafficItgateway using P1. Itstart when all nodes Theport scenario traffic. creates new chooses the port on which the does not change its state or the are started for the first time; no messages and sends them request arrived (P1) for conveying messages sendstraffic over its is ports. conveyed. The nodes start over theitports traffic. It creates new messages with all ports in standby; none acts and sends them over its ports. as a traffic gateway. S S M S S S Node Active W Active S A S A P Standby S S I Standby S S W P Remote node C u Node Standby r W Standby r e P Standby n t I Standby port S S S S S A S S S 1 Entity Local A S S N e w End The mater and Slave 1 are traffic gateways; they use the link connecting the working port of the master and P1 of Slave1. The deputy and Slave 2 are aware of the situation. They do not convey traffic. S D P S S W P I Slide 23 May, 2008 S S S Active A A P2 Standby S S I Standby S S S S S S I P1 P2 S 2 Node The deputy receives an indication from the master that it is a traffic gateway plus an indication from the slave on the working port that it is also a traffic gateway. The deputy does not change its state and the messages it sends over its ports. S Active The slave receives an indication from the master that it is a traffic gateway but does not receive a request to become a traffic gateway. It also receives an indication from the other slave that it too is a traffic gateway. The slave does not change its state and the messages it sends over its ports. Local C u Node Standby r P1 Standby r e P2 Standby n t I Standby Node N e w S A P1 Entity S S W S A Slave 2 S S S Remote node port C u Node Standby r P1 Standby r e P2 Standby n t I Standby Node I A S S I A S P2 A S S I Deputy Entity Local A A S S A A S S P1 Slave 1 N e w P1 P2 I Remote node port A S S S S A S S Link fails Master Entity Local Remote node C u Node Active r W Active r e Standby P n t I Standby N e w port A The link connecting the master and The master does not receive Slave 1 failed. The slave that acts as a traffic health messages from Slave 1 gateway loses connectivity with and realizes that it lost the master. After a short while, it Beginning connectivity with it. It chooses receives a request over the The scenario starts with traffic the protection port to convey internal port indicating that the being conveyed between the traffic. other slave is using it as a bypass. master and Slave 1 using the It activates the internal port. working port of the master and P1 of the slave. A S M S S S Node Active W Standby P Active S S I Standby S S W S S A A A A S P P2 A A S I P1 A S S 1 I A A S S A A S Slave 1 Entity C u Node Active r P1 Active r e P2 Standby n t I Standby N e w End The master and Slave 1 are traffic gateways. Slave 2 is used as an intermediate node in a bypass created between the master and Slave 1. Local Remote port port A A S S S S A Active P1 Standby P2 Standby S S I Active S A Entity S S SS SA I A S S S A S Node N e w node Slave 2 node C u Node Standby r W Standby r e P Standby n t I Standby Remote Node Deputy Entity Local W P I Slide 24 May, 2008 D W P S S S S S S A S S I P1 P2 S 2 Local C u Node Standby r P1 Standby r e P2 Standby n t I Standby Remote node Port port A S A S S A S Node Standby The slave receives a request on P1 to become a traffic gateway. It is aware of the fact that the slave connected through the internal port is a traffic gateway. It activates the internal port but does not become a traffic gateway. It will pass all packets received on P1 to the internal port. Packets received from the attached network will be dropped. It creates new messages and sends them over its ports. N e w P1 Active A A P2 Standby S S I Active S S Slave fails Master Entity Local Remote node C u Node Active r W Active r e Standby P n t I Standby N e w port A The slave acting as the TG of this The master does not receive network fails. health messages from Slave 1 The realizes master receives an indication and that it lost Beginning from the slave it became a connectivity with it. that It chooses Theport scenario traffic gateway using P2. Itstarts with traffic the protection port to convey between the does not change itsbeing state conveyed or the traffic. master and Slave 1 using the messages it sends over its ports. working port of the master and P1 of the slave. A S M S S S Node Active W Standby P Active S S I Standby S S W Local node C u Node Standby r W Standby r e P Standby n t I Standby port S S S A S A S S 1 Entity C u Node Active r P1 Active r e P2 Standby n t I Standby A S N e w D P S S W P I Slide 25 May, 2008 The deputy receives an indication from the master that it is a traffic gateway as well as an indication from the slave on the protection port that it too is a traffic gateway. The deputy is aware that it is not connected to Slave 1. It does not change its state and the messages it sends over its ports. A A S S S S P2 S S A A S S A I P1 P2 S 2 C u Node Standby r P1 Standby r e P2 Standby n t I Standby Node N e w port P1 Entity Local SAS S W node Slave 2 S S S Remote I End The master and Slave 2 act as traffic gateways using the link connecting the protection port of the master and P1 of Slave 2. The deputy and Slave 2 are aware of the situation. They do not convey traffic. S Local Node I A A S S I A P1 P2 A A S I Remote A A P Deputy Entity S S A A Slave 1 The slave receives a request on P1 to become traffic gateway. It does not have connectivity with Slave 1, so it change its state to active to become a traffic gateway, and chooses the port on which the request arrived (P1) to convey traffic. It creates new messages and sends them over its ports. N e w Remote node port A S A S S A S Node Active P1 Active A A P2 Standby S S I Standby S S Master fails Master Entity Local Remote node C u Node Active r Active W r e Standby P n t Standby I port A A S S S S Node N e w Slave 1 senses that it lost connectivity with the master and it receives a request to become a The master acting as the TG of Beginning this traffic gateway on P2. Since it is network fails. The scenario starts with traffic a traffic gateway, it only being conveyed betweenalready the needs master and Slave 1 using the to deactivate P1 and activate creates new messages and working port of the master P2. andIt P1 sends them over its ports. of Slave 1. M W A S A P P2 A S I W A A P1 A A S 1 I A S P S A S I Slave 1 Entity C u Node Active r P1 Active r e P2 Standby n t I Standby N e w End The deputy is a traffic gateway and conveys traffic using its working port. Slave 1 is a traffic gateway of the attached network and it conveys traffic using P2. Node N e w node port A A S S S S Active P1 Standby P2 Standby A A I Standby A S Slave 2 Remote node C u Node Standby r W Standby r e P Standby n t I Standby Remote Node Deputy Entity Local Local port S A S S S I A S S S A S D Entity W P A S A S A S S S S S S I P1 P2 S 2 C u Node Standby r P1 Standby r e P2 Standby n t I Standby Active Node W Active A S P Standby S S I Standby Slide 26 May, 2008 The deputy senses that the master failed. It becomes a traffic gateway and uses the port that is connected to a slave which is a traffic gateway (if there is such). It creates new messages and send them over its ports. Local N e w P1 P2 I Remote node port A S S S A S Proposal Start a new project in the IEEE 802.1 aimed at defining a protection mechanism for Ethernet services in UNI/E-NNI (interconnected networks). • Adopt the proposed topologies. • The mechanism should comply with the requirements introduced in this presentation. Slide 27 May, 2008 Thank you zehavit.alon@nsn.com nurit.sprecher@nsn.com Slide 28 Backup Slide 29 Flow Chart M S1 M failed S1 failed M-S2-S1 D S2 S2 failed D failed M-S2 failed || S1-S2 failed || S2 failed M D S1 D-S1-S2 S2 D-S1 failed || S1-S2 failed || S1 failed M1-S1 failed M S1 M-S1 D D-S2 failed M S2 S1 D-S2 D S2 M failed D failed S2 failed || LRM && S1 recovered S1 failed LRM && M-S1 recovered || S2 failed M D S1 M-S2 NRM && M recovered || D failed M S2 D M-S2 failed M-S1 failed || S1-S2 failed || S1 failed M S1 D-S1 S2 D-S1 failed S1 M S2 D S1 S2 failed D M-S1-S2 S1 failed M failed D failed Slide 30 May, 2008 M failed D-S2-S1 S1-S2 failed || D-S2 failed || S2 failed S1 failed S2