1 / 13

David Allan (ed) Peter Ashwood-Smith Nigel Bragg (ed) Don Fedyk Paul Unbehagen]

IS-IS Extensions Supporting IEEE 802.1aq Shortest Path Bridging http://www.ietf.org/internet-drafts/draft-ietf-isis-ieee-aq-00.txt. David Allan (ed) Peter Ashwood-Smith Nigel Bragg (ed) Don Fedyk Paul Unbehagen] IETF 78 Maastricht / July 2010. Provider. Backbone. Bridges. 802.1ah.

hank
Download Presentation

David Allan (ed) Peter Ashwood-Smith Nigel Bragg (ed) Don Fedyk Paul Unbehagen]

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. IS-IS Extensions Supporting IEEE 802.1aq Shortest Path Bridginghttp://www.ietf.org/internet-drafts/draft-ietf-isis-ieee-aq-00.txt David Allan (ed) Peter Ashwood-Smith Nigel Bragg (ed) Don Fedyk Paul Unbehagen] IETF 78 Maastricht / July 2010

  2. Provider Backbone Bridges 802.1ah Provider Bridges 802.1ad Ethernet Ethertype VLAN C-VID C-TAG Ethernet 802.3 S-VID S-TAG SA DA Ethertype C-VID I-SID Ethertype C-TAG I-TAG C-VID S-VID B-VID Ethertype Q-TAG S-TAG B-TAG SA SA SA B-SA DA DA DA B-DA 1998 2005 2008 IEEE 802.1 wishes to provide SPF/L2VPN routing to existing Ethernet ASIC based data paths Macin Mac Q in Q FORWARDING ONTHESE FIELDSONLY BECAUSE …. USING THESE DATAPATHS

  3. They are routed with distance vector style protocol(s) (*)STP that create trees .. not ideal at larger scales because… 2 – long wayfrom shortest paths.. 1- Can’t use these links SOURCE A1.. A100 ROOT DEST 3 - LEARN A1..A100on tree..

  4. We wish to achieve this….. All links usable Shortest Paths Equal Cost x N Animation Courtesy of Guoli Yin AND …

  5. Support logical connectivity (L2VPN) An L2VPN (E-LAN) with 7 members Want to have single point membership provisioning. Want automatic unicast and multicast forwarding. Want existing Ethernet OA&M to work unchanged. This causes requirements for symmetric and congruent unicast/multicast. Animation Courtesy of Guoli Yin

  6. The set of all pruned SPF trees for a given VPN is referred to as an “active topology” for that VPN service. Active topology for VPN instance 256 with 8 members.

  7. IS-IS is the logical choice • Topology discovery • Each bridge is aware of the physical topology • We add a new link metric just for SPB. • Service discovery • VPN membership is included “ISID”. • Calculations produce FIB: [DA, VID] => NextHop(s) • 16 different variations (ECT-ALGORITHMs) • produces different Equal cost behaviors isolate by VID.

  8. 802.1aq ISIS LSP extensions at a glance LSPID Seq Num Checksum …. ---------------------------------------------- 4455.6677.0001.00-00 0x0000007a 0xc01f ….. SOURCE 4455.6677.0001.00 HOST NAME Instance_1 NLPID SPB (0xC1) AREA ADDR 22.3344 NBR ID 4455.6677.0004.00 COST: 10 NBR ID 4455.6677.0003.00 COST: 10 SPSOURCEID 07-00-01 SPB ECT-ALGORITHM 1 ECT-VID 101 SPB ECT-ALGORITHM 0 ECT-VID 100 SPB BMAC 44-55-66-77-00-01 ECT-VID 100 SPB ISID 255T&R SPB BMAC 44-55-66-77-00-01 ECT-VID 101 SPB ISID 256T&R (1) :4 10 (2) 255 (3) :1 :3 10 256 (4) LSP fragment for node :1 with 2 peers:4 and :3 and two services 255, 256 (5)

  9. SPB sub-TLV layout +-----+----+-----------------+--------+------+-------------+| PDU |TLV | SUB-TLV | TYPE | TYPE | #OCCURRENCE |+-----+----+-----------------+--------+------+-------------+ IIH MT-Port-Capability 143 SPB-B-VID 5 1 SPB-Digest 6 1 LSP MT-Capability 144 SPB-Inst 1 1 SPB-I-OALG 2 >=0 SPBM-SI 3 >=0 SPBV-ADDR 4 >=0 MT-Intermediate-System 222 SPB-Metric 12 1 SPB-A-OALG 13 >=0

  10. SPB specific Link Metric - nodal +-+-+-+-+-+-+-+-+ |Type=SPB-Metric| = 12+-+-+-+-+-+-+-+-+| Length | (1 byte)+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+| SPB-LINK-METRIC | (3 bytes)+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+| Num of ports | (1 byte)+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+| Port Identifier | (2 bytes)+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ • Provides a the link metric used for min sum optimization in Disjkstra. • When link metrics differ in each direction uses MAX of both. • Independent of IP link metrics. • Additional identifiers used for construction of a single CIST. • P2P links only.

  11. SPBM Service Identifier (VPN membership) - nodal +-+-+-+-+-+-+-+-+|Type = SPBM-SI | = 3+-+-+-+-+-+-+-+-+| Length | (1 byte)+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+| B-MAC ADDRESS | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+| B-MAC ADDRESS (6 bytes) | Res. | Base-VID (12 bits) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |T|R| Reserved | ISID #1 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |T|R| Reserved | ISID #2 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |T|R| Reserved | ISID #n | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ • The work-horse sub-TLV • Indicate that a particular node hosts members of a VPN (ISID). • Indicates properties (Transmit/Receive) of that member • Allows additional addresses B-MACs for multi homing etc.

  12. SPB Instance Identifier - nodal +-+-+-+-+-+-+-+-+|Type = SPB-Inst| = 1+-+-+-+-+-+-+-+-+| Length | (1 byte)+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+| CIST Root Identifier (4 bytes) |+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+| CIST Root Identifier (cont) (4 bytes) |+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+| CIST External ROOT Path Cost (4 bytes) |+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+| Bridge Priority | (2 bytes)+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+|R R R R R R R R R R R|V| SPSOURCEID |+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+| Num of Trees | (1 bytes)+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+| VLAN-ID (1) Tuples (8 bytes) |+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+| VLAN-ID (N) Tuples (8 bytes) |+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ A nodes properties – described to all other nodes. VIDs in use, what algorithms associated with VID Data path modes etc.

  13. Hello Extensions IIH +-+-+-+-+-+-+-+-+|Type=SPB-Digest| = 6+-+-+-+-+-+-+-+-+| Length | (1 byte)+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+| MCID (50 Bytes) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+| Aux MCID (50 Bytes) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+| Agreement Digest (32 Bytes) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |RES | A | D|+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+|Type= SPB-B-VID| = 5+-+-+-+-+-+-+-+-+| Length | (1 byte)+-+-+-+-+-+-+-+-+-------------------------------+| ECT - VID Tuple (1) (6 bytes) |+-----------------------------------------------+| ......................... |+-----------------------------------------------+| ECT - VID Tuples (N) (6 bytes) |+-----------------------------------------------+

More Related