SlideShare a Scribd company logo
1 of 35
Download to read offline
tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 1tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 1
Norman Finn
Cisco Systems
Version 3, July 3, 2015
TSN Control & Configuration
tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 2
•  This contribution is in response to the excellent analyses presented in
cc-goetz-MRPv2-MSP-v13, cc-goetz-Next-Steps-v1, and
tsn-sexton-feature-priority-request.
•  It is an attempt to map the shortest route from the current state of the IEEE
802.1 TSN Task Group to a viable set of TSN standards.
tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 3
1.  Static: The Talkers, Listeners, and relay systems are configured before power-
up. There are no run-time changes to reservations.
2.  Central: On top of (1), there is a central network controller that learns what was
preconfigured, and is responsible for coordinating any changes to those
configured reservations with any new reservations. Reservations can be made
by Talkers, Listeners, and third-parties (e.g. applications controllers).
NOTE: I differ strongly from Götz “next steps.” A fully-centralized control model is perfectly
within the scope of IEEE 802.1!
3.  Peer-to-peer: On top of (1), there is no central controller. Talkers and Listeners
are responsible for making additional reservations using a peer-to-peer
protocol (MSRP or MSRP++).
4.  Mixed: Some relay systems know about the central controller, and some only
know the peer-to-peer protocol.
tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 4
tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 5
•  If we assume that the customer does not want a central controller,
More to come on central controllers – I think there are better control models in that case’
•  If we assume that we are not using time-scheduled queues,
Only a central controller can make the global tradeoffs necessary to use scheduling;
•  If we assume that the Talkers are capable of describing their streams,
Having a third party set up the streams is merely another name for “central controller”;
•  Then, the current model using MSRP (or improved MSRP) works just fine.
•  IMO, we should continue to support this model.
tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 6
tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 7
Without going into details, there are three protocols used for controlling the
TSN network when a central controller is used:
1.  Bandwidth reservations are made along the paths of the streams, as done
today, with MSRP (or a newer version of MSRP), whether a central
controller is used, or not.
2.  A new protocol is used to exchange reservation information, bridge
capabilities, schedules, etc. between the central controller and the
bridges.
3.  Topology information is obtained by the central controller by connecting it
directly to the ISIS instance running the bridged network.
4.  Stream descriptions and decisions about paths are distributed from the
controller or from edge bridges via ISIS.
tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 8
tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 9
extreme version
•  When a controller is present, edge relay systems (1, 5) participate in UNI
(MSRP++) only to make/accept opaque data registrations. The NetWork
Controller (NWC) can see the registrations and order relay system to make
others (e.g., replies).
•  Topology (LLDP), registrations, schedules, pinned-down paths –
everything – passes through YANG or MIBs to/from the NWC.
L1 T
NWC
1 2 3 4 5
UNIUNI
tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 10
tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 11
•  Let us look at the central controller model.
•  In both the all-MO and ISIS-MRP models, the central controller requires
exactly the same information from the network, and distributes exactly the
same information to the network.
•  There is no difference in the two models in the information that the
controller and relay systems must know!
tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 12
•  There are only 2.5 protocols:
LLDP for topology discovery, which most bridges, routers, and end stations do, already.
YANG + carrier (or MIB + carrier), which are necessary, no matter what.
A simplified, non-propagating version of MSRP, controlled by YANG(MIB).
•  Any topology control protocol is satisfactory, including MRP, G.8032,
MSTP, RSTP, and SPB. (Or, none, if no redundancy!)
•  Control packets are purely best-effort data, unnoticed by all relay systems
except for the endpoints (controller and one relay system).
•  No relay system maintains any data that is not of direct interest to that relay
system.
•  Things timed out: One connection to controller, per-port LLDP partners,
per-port MRP timers (only if used), topology protocol (if used).
tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 13
•  There are 4 protocols:
YANG + carrier (or MIB + carrier)
ISIS-SPB
PCEP
MSRP, enhanced with new capabilities.
•  Plus, you can’t use any network topology protocol except ISIS.
•  Control packets passed via ISIS require processing and software relaying at
every hop between controller and target relay system.
•  Information passed via ISIS requires every relay system in the network maintain
the entire database, with a timer attached to each individual information bundle.
•  Things timed out: Per-port LLDP (if used), per-port times per-registration MRP,
per-port times per-LSP ISIS (adjacencies and LSPs).
tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 14
•  In both models, the central controller processes the same information.
•  The all-MO model is faster: relay systems receive and operate upon
controller instructions in parallel, instead of in series, and all control data is
passed as data, not as hop-by-hop ISIS processing and database
propagation.
•  The all-MO model requires somewhat less software: 2.5 protocols vs. 4.
(Or 3, if we say that PCEP à YANG/MIB, or 5, if we don’t exclude LLDP.)
•  The all-MO model requires vastly less processing power and memory:
No hop-by-hop processing of stream descriptions or paths, no databases
with other systems’ data must be maintained, no per-data element timers.
tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 15
tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 16
1.  Define managed objects to support remote control of
MRP in P802.1Qcc.
(See Finn’s comments on Qcc D0.4.)
tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 17
See cc-goetz-Next-Steps-v1 for complete list.
tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 18
tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 19
•  Few hops
•  Many hops
tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 20
•  But, if we assume a “many hops” network (long chains of two-port end
systems), and
•  If we assume that we are running current ISIS,
We’ll talk about the “S2IS” later;
•  Then, this model has some severe drawbacks, outlined in the next slide.
We will talk about an alternative model, a little later.
tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 21
•  The end systems must maintain the full topology database.
Again, we’ll talk about the S2IS possibility, later.
•  The end systems must maintain all stream descriptions distributed by ISIS.
Knowledge of the ISIS stream descriptions must precede the MSRP** registration
phase.
Pruning them based on network topology and knowledge of the locations of Talkers and
Listeners is conceivable, but requires multiple Dijkstra calculations on the topology in
each end system to determine whether it cares about a given stream. This slows down
convergence after a topology change. It’s probably easier to maintain the whole
database.
•  Every new or changed stream description anywhere in the network
requires every end system in the network to wake up and pay attention to
receive two and send two ISIS packets for the new/altered LSP.
tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 22
•  Consider also the “pinned-down” paths for Seamless Redundancy.
•  Passing the path information via ISIS (802.1Qca), again, requires every
end system to maintain the entire path database for all streams in the
network.
Even if an end system knows it’s not on a given stream’s path, it must maintain the path
information and pass it on, because the end system may provide the only path through
the network from the controller to some relay or end system that requires the
information.
tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 23
•  IEEE 802.1 has not, so far, even discussed how to make the bridged LAN
function properly with the S2IS. In particular, the S2IS cannot know in
which direction (left or right) to send a packet without doing the Dijkstra
calculation.
•  In the ISIS-MRP solution, the S2IS still must maintain the entire stream
description database.
•  The topology database can be deleted. It may be that a S2IS only need to
retain those path descriptions that pass through it, and that it can pass
other path descriptions transparently. Passing some information
transparently and retaining other information has not been investigated (to
my knowledge) but it seems plausible.
tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 24
•  The security model for the all-MO model is that each relay node has a
secure relationship (e.g. an IPSec connection) with the NetWork Controller
(NWC). That requires one secure connection per relay system, which
means o(n) trust relationships.
•  All requests are vetted by the NWC. Policy, including security policy, is
applied.
•  We may or may not have to add a security element for the UNI. MACsec
may be sufficient. We may have to add data integrity TLVs to the UNI, in
order to avoid MACsec on the physical wire. We could discuss
connecting the Talker or Listener directly to the controller.
•  The security model for MSRP and ISIS is less obvious. Contributions from
its proponents are encouraged. Are there widely-shared keys?
tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 25
•  Neither model scales super well. Certainly, there is a lot of control traffic near
the NetWork Controller. But, this is best-effort data once it leaves the controller,
not hop-by-hop ISIS packets to be processed by every system along its path.
•  On the other hand, the total number of packets processed by any given relay
system, and in particular, by a two-port chained end system, is orders of
magnitude lower for the all-MO model than for the ISIS-MRP model.
•  The IETF has long recognized that multiple controllers (PCEs) are necessary for
scaling to large networks. The same rules apply, here. Whether peered
controllers, or a hierarchy of controllers, is better, is To Be Determined. But, we
know from experience it can be done. In particular, the IETF PCE WG has a
number of drafts on this problem.
•  The usual way to scale up multiple ISIS regions involves BGP. No proposal has
been made for this, either. Experience with BGP shows clearly that it will be
subject to the same scaling issues as its underlying ISIS basis.
tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 26
•  We want to do an open source stack for a 2-port chainable end system in
the AVnu Alliance.
If a chain of two-port end systems is not looped back for redundancy, no topology
protocol is required in those systems.
If the chain connected at both ends, simple STP, MRP, G.8032, and many other
protocols are sufficient for the all-MO model.
•  This author does not believe that the chances of success for this
open source effort will be improved by requiring this stack to support
the ISIS-MRP model!
The requirements for memory for data base storage, alone, will render the ISIS-MRP
solution unacceptable for many potential users.
tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 27
•  Databases maintained by a two-port end system
Entire network topology
All stream descriptions
Reservations passing through
All pinned-down paths
Which streams to pass or not
Which streams to pass or not
Four integers
ISIS-MRP All-MO
tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 28
•  Control packets processed by a two-port end system
Two packets and two packets
out (or more), every time
anything in the network
Changes.
One packet in and one packet out
when something relevant to this
end system changes
ISIS-MRP all-MO
tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 29
•  What must be implemented if controller is used
ISIS for all of the databases
MSRP** data distribution model
YANG/MIB for schedules, etc.
ISIS or LLDP for topology only
Opaque MSRP++ for UNI
YANG/MIB for schedules, etc.
ISIS-MRP All-MO
tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 30
•  What else do we have to standardize?
Edge system / controller protocol
UNI/MSRP**
ISIS stream descriptions
Augmented MSRP for compatibility
UNI/MSRP++ with remote YANG/MIB
Augmented MSRP for compatibility.
ISIS-MRP All-MO
tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 31
•  Compatibility with non-SPB topology protocols?
Requires SPB be
implemented, whether
used for topology or not..
No connection. MRP, G.8032,
MSTP all work just fine.
ISIS-MRP All-MO
tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 32
•  What new things are required in a mixed L2/L3 network?
Extending multiple ISIS
instances to the controller.
Router participates in N L2 ISIS
instances + L3 instance(s).
Data must migrate between L2/L3
and L2/L2 ISIS instances.
Mixed L2/L3 MSRP**
Mixed L2/L3 MSRP++ (only if
no controller)
ISIS-MRP All-MO
tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 33
•  It may be that dividing a network up into geographically-based VLANs
might help reduce the sizes of the databases that must be kept.
•  At present, computing VLAN forwarding requires each node to have the full
topology; so the S2IS won’t work; the two-port end stations still have to run
full SPB.
•  Furthermore, I believe that the proposal for distributing stream descriptions
uses ISIS, not MxRP. ISIS floods all information everywhere, regardless of
VLAN. Flooding information along VLANs gets one into the trap of
requiring full connectivity to create anything, and allow topology failures to
cause essential information to be deleted, lengthening the time it takes to
restore service.
•  This idea needs more explanation from its proponents.
tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 34
•  If we accept as a given, that we need to support the scenario where a central
controller is present only during configuration time, or perhaps during startup
time, and it then disappears …
•  Then the extreme all-MO model, as presented in this deck, requires nothing else
to be completely dynamic, except:
1.  A requirement to run LLDP for topology discovery.
2.  The ability to run the MSRP++ UNI interface remotely, via a YANG (or MIB) model.
•  This author believes very strongly that it is absolutely essential to standardize
the trivial amount of additional work required by the all-MO model.
•  If 802.1 insists that only one model be standardized, it should be the all-MO
model, not the ISIS-MRP model.
•  Until the discussion has progressed further, this author has no strong opinion on
whether the ISIS-MRP model should be pursued any further.
tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 35
Thank you.

More Related Content

What's hot

Introduction to ss7
Introduction to ss7Introduction to ss7
Introduction to ss7Abdul Nasir
 
INSTRUCTION LEVEL PARALLALISM
INSTRUCTION LEVEL PARALLALISMINSTRUCTION LEVEL PARALLALISM
INSTRUCTION LEVEL PARALLALISMKamran Ashraf
 
Pipelining of Processors
Pipelining of ProcessorsPipelining of Processors
Pipelining of ProcessorsGaditek
 
Chapter 04 the processor
Chapter 04   the processorChapter 04   the processor
Chapter 04 the processorBảo Hoang
 
Ch 02 --- sdn and openflow architecture
Ch 02 --- sdn and openflow architectureCh 02 --- sdn and openflow architecture
Ch 02 --- sdn and openflow architectureYoram Orzach
 
Traffic Engineering in Software-Defined Networks
Traffic Engineering in Software-Defined NetworksTraffic Engineering in Software-Defined Networks
Traffic Engineering in Software-Defined NetworksHai Dinh Tuan
 
SDN Architecture & Ecosystem
SDN Architecture & EcosystemSDN Architecture & Ecosystem
SDN Architecture & EcosystemKingston Smiler
 
10 instruction sets characteristics
10 instruction sets characteristics10 instruction sets characteristics
10 instruction sets characteristicsdilip kumar
 
pipelining and hazards occure in assembly language.
pipelining and hazards occure in assembly language.pipelining and hazards occure in assembly language.
pipelining and hazards occure in assembly language.Zohaib Arshid
 
RTOS CASE STUDY OF CODING FOR SENDING APPLIC...
                                RTOS  CASE STUDY OF CODING FOR SENDING APPLIC...                                RTOS  CASE STUDY OF CODING FOR SENDING APPLIC...
RTOS CASE STUDY OF CODING FOR SENDING APPLIC...JOLLUSUDARSHANREDDY
 

What's hot (20)

pipelining
pipeliningpipelining
pipelining
 
3 Pipelining
3 Pipelining3 Pipelining
3 Pipelining
 
Unit - 5 Pipelining.pptx
Unit - 5 Pipelining.pptxUnit - 5 Pipelining.pptx
Unit - 5 Pipelining.pptx
 
Carrier Ethernet
Carrier EthernetCarrier Ethernet
Carrier Ethernet
 
1.prallelism
1.prallelism1.prallelism
1.prallelism
 
Introduction to ss7
Introduction to ss7Introduction to ss7
Introduction to ss7
 
INSTRUCTION LEVEL PARALLALISM
INSTRUCTION LEVEL PARALLALISMINSTRUCTION LEVEL PARALLALISM
INSTRUCTION LEVEL PARALLALISM
 
Pipelining of Processors
Pipelining of ProcessorsPipelining of Processors
Pipelining of Processors
 
Group 1
Group 1Group 1
Group 1
 
Chapter07
Chapter07Chapter07
Chapter07
 
15 ia64
15 ia6415 ia64
15 ia64
 
Chapter 04 the processor
Chapter 04   the processorChapter 04   the processor
Chapter 04 the processor
 
Ch 02 --- sdn and openflow architecture
Ch 02 --- sdn and openflow architectureCh 02 --- sdn and openflow architecture
Ch 02 --- sdn and openflow architecture
 
Traffic Engineering in Software-Defined Networks
Traffic Engineering in Software-Defined NetworksTraffic Engineering in Software-Defined Networks
Traffic Engineering in Software-Defined Networks
 
13 risc
13 risc13 risc
13 risc
 
SDN Architecture & Ecosystem
SDN Architecture & EcosystemSDN Architecture & Ecosystem
SDN Architecture & Ecosystem
 
10 instruction sets characteristics
10 instruction sets characteristics10 instruction sets characteristics
10 instruction sets characteristics
 
pipelining and hazards occure in assembly language.
pipelining and hazards occure in assembly language.pipelining and hazards occure in assembly language.
pipelining and hazards occure in assembly language.
 
OpenFlow
OpenFlowOpenFlow
OpenFlow
 
RTOS CASE STUDY OF CODING FOR SENDING APPLIC...
                                RTOS  CASE STUDY OF CODING FOR SENDING APPLIC...                                RTOS  CASE STUDY OF CODING FOR SENDING APPLIC...
RTOS CASE STUDY OF CODING FOR SENDING APPLIC...
 

Similar to Tsn nfinn-control-and-config-0515-v03

Addressing Network Operator Challenges in YANG push Data Mesh Integration
Addressing Network Operator Challenges in YANG push Data Mesh IntegrationAddressing Network Operator Challenges in YANG push Data Mesh Integration
Addressing Network Operator Challenges in YANG push Data Mesh IntegrationThomasGraf42
 
ietf115-network-telemetry-data-mesh-challenges.pptx
ietf115-network-telemetry-data-mesh-challenges.pptxietf115-network-telemetry-data-mesh-challenges.pptx
ietf115-network-telemetry-data-mesh-challenges.pptxThomasGraf40
 
The Challenges of SDN/OpenFlow in an Operational and Large-scale Network
The Challenges of SDN/OpenFlow in an Operational and Large-scale NetworkThe Challenges of SDN/OpenFlow in an Operational and Large-scale Network
The Challenges of SDN/OpenFlow in an Operational and Large-scale NetworkOpen Networking Summits
 
2004 qof is_mpls_ospf
2004 qof is_mpls_ospf2004 qof is_mpls_ospf
2004 qof is_mpls_ospfAdi Nugroho
 
Addressing Network Operator Challenges in YANG push Data Mesh Integration
Addressing Network Operator Challenges in YANG push Data Mesh IntegrationAddressing Network Operator Challenges in YANG push Data Mesh Integration
Addressing Network Operator Challenges in YANG push Data Mesh IntegrationThomasGraf42
 
LISP and NSH in Open vSwitch
LISP and NSH in Open vSwitchLISP and NSH in Open vSwitch
LISP and NSH in Open vSwitchmestery
 
Pipelining and vector processing
Pipelining and vector processingPipelining and vector processing
Pipelining and vector processingKamal Acharya
 
AIX Advanced Administration Knowledge Share
AIX Advanced Administration Knowledge ShareAIX Advanced Administration Knowledge Share
AIX Advanced Administration Knowledge Share.Gastón. .Bx.
 
Presentation systemc
Presentation systemcPresentation systemc
Presentation systemcSUBRAHMANYA S
 
8051 Embedded Programming in C - Book-II
8051 Embedded Programming in C - Book-II8051 Embedded Programming in C - Book-II
8051 Embedded Programming in C - Book-IIhandson28
 
5G core use cases in CORE NetworkSBI.pptx
5G core use cases in CORE NetworkSBI.pptx5G core use cases in CORE NetworkSBI.pptx
5G core use cases in CORE NetworkSBI.pptxlakshmianthony80
 
lect4_SDNbasic_openflow.pptx
lect4_SDNbasic_openflow.pptxlect4_SDNbasic_openflow.pptx
lect4_SDNbasic_openflow.pptxJesicaDcruz1
 
Pipelining And Vector Processing
Pipelining And Vector ProcessingPipelining And Vector Processing
Pipelining And Vector ProcessingTheInnocentTuber
 
configuration of switch campus network
configuration of switch campus networkconfiguration of switch campus network
configuration of switch campus networksubhash subbu
 
PLNOG 8: Peter Ashwood-Smith - Shortest Path Bridging IEEE 802.1aq
PLNOG 8: Peter Ashwood-Smith - Shortest Path Bridging IEEE 802.1aqPLNOG 8: Peter Ashwood-Smith - Shortest Path Bridging IEEE 802.1aq
PLNOG 8: Peter Ashwood-Smith - Shortest Path Bridging IEEE 802.1aqPROIDEA
 
Radio relay network auto discovery
Radio relay network auto discoveryRadio relay network auto discovery
Radio relay network auto discoveryDmitriy Suraev
 

Similar to Tsn nfinn-control-and-config-0515-v03 (20)

Addressing Network Operator Challenges in YANG push Data Mesh Integration
Addressing Network Operator Challenges in YANG push Data Mesh IntegrationAddressing Network Operator Challenges in YANG push Data Mesh Integration
Addressing Network Operator Challenges in YANG push Data Mesh Integration
 
ietf115-network-telemetry-data-mesh-challenges.pptx
ietf115-network-telemetry-data-mesh-challenges.pptxietf115-network-telemetry-data-mesh-challenges.pptx
ietf115-network-telemetry-data-mesh-challenges.pptx
 
CA UNIT III.pptx
CA UNIT III.pptxCA UNIT III.pptx
CA UNIT III.pptx
 
The Challenges of SDN/OpenFlow in an Operational and Large-scale Network
The Challenges of SDN/OpenFlow in an Operational and Large-scale NetworkThe Challenges of SDN/OpenFlow in an Operational and Large-scale Network
The Challenges of SDN/OpenFlow in an Operational and Large-scale Network
 
2004 qof is_mpls_ospf
2004 qof is_mpls_ospf2004 qof is_mpls_ospf
2004 qof is_mpls_ospf
 
Addressing Network Operator Challenges in YANG push Data Mesh Integration
Addressing Network Operator Challenges in YANG push Data Mesh IntegrationAddressing Network Operator Challenges in YANG push Data Mesh Integration
Addressing Network Operator Challenges in YANG push Data Mesh Integration
 
SDN approach.pptx
SDN approach.pptxSDN approach.pptx
SDN approach.pptx
 
LISP and NSH in Open vSwitch
LISP and NSH in Open vSwitchLISP and NSH in Open vSwitch
LISP and NSH in Open vSwitch
 
Pipelining and vector processing
Pipelining and vector processingPipelining and vector processing
Pipelining and vector processing
 
CCNA 1
CCNA 1CCNA 1
CCNA 1
 
AIX Advanced Administration Knowledge Share
AIX Advanced Administration Knowledge ShareAIX Advanced Administration Knowledge Share
AIX Advanced Administration Knowledge Share
 
Presentation systemc
Presentation systemcPresentation systemc
Presentation systemc
 
8051 Embedded Programming in C - Book-II
8051 Embedded Programming in C - Book-II8051 Embedded Programming in C - Book-II
8051 Embedded Programming in C - Book-II
 
5G core use cases in CORE NetworkSBI.pptx
5G core use cases in CORE NetworkSBI.pptx5G core use cases in CORE NetworkSBI.pptx
5G core use cases in CORE NetworkSBI.pptx
 
lect4_SDNbasic_openflow.pptx
lect4_SDNbasic_openflow.pptxlect4_SDNbasic_openflow.pptx
lect4_SDNbasic_openflow.pptx
 
Pipelining And Vector Processing
Pipelining And Vector ProcessingPipelining And Vector Processing
Pipelining And Vector Processing
 
configuration of switch campus network
configuration of switch campus networkconfiguration of switch campus network
configuration of switch campus network
 
10 sdn-vir-6up
10 sdn-vir-6up10 sdn-vir-6up
10 sdn-vir-6up
 
PLNOG 8: Peter Ashwood-Smith - Shortest Path Bridging IEEE 802.1aq
PLNOG 8: Peter Ashwood-Smith - Shortest Path Bridging IEEE 802.1aqPLNOG 8: Peter Ashwood-Smith - Shortest Path Bridging IEEE 802.1aq
PLNOG 8: Peter Ashwood-Smith - Shortest Path Bridging IEEE 802.1aq
 
Radio relay network auto discovery
Radio relay network auto discoveryRadio relay network auto discovery
Radio relay network auto discovery
 

More from Jörgen Gade

Current state of IEEE 802.1 Time-Sensitive Networking Task Group Norman Finn,...
Current state of IEEE 802.1 Time-Sensitive Networking Task Group Norman Finn,...Current state of IEEE 802.1 Time-Sensitive Networking Task Group Norman Finn,...
Current state of IEEE 802.1 Time-Sensitive Networking Task Group Norman Finn,...Jörgen Gade
 
5g tsn-integration-for-industrial-automation
5g tsn-integration-for-industrial-automation5g tsn-integration-for-industrial-automation
5g tsn-integration-for-industrial-automationJörgen Gade
 
B cisco n3k_layer2_config_gd_503_u2_1_chapter_01101
B cisco n3k_layer2_config_gd_503_u2_1_chapter_01101B cisco n3k_layer2_config_gd_503_u2_1_chapter_01101
B cisco n3k_layer2_config_gd_503_u2_1_chapter_01101Jörgen Gade
 
Iic tsn testbed_char_mapping_of_converged_traffic_types_whitepaper_20180328
Iic tsn testbed_char_mapping_of_converged_traffic_types_whitepaper_20180328Iic tsn testbed_char_mapping_of_converged_traffic_types_whitepaper_20180328
Iic tsn testbed_char_mapping_of_converged_traffic_types_whitepaper_20180328Jörgen Gade
 
Iec 62439 3.4-prp_kirrmann
Iec 62439 3.4-prp_kirrmannIec 62439 3.4-prp_kirrmann
Iec 62439 3.4-prp_kirrmannJörgen Gade
 
Tsn farkas-intro-0318-v01
Tsn farkas-intro-0318-v01Tsn farkas-intro-0318-v01
Tsn farkas-intro-0318-v01Jörgen Gade
 

More from Jörgen Gade (7)

Current state of IEEE 802.1 Time-Sensitive Networking Task Group Norman Finn,...
Current state of IEEE 802.1 Time-Sensitive Networking Task Group Norman Finn,...Current state of IEEE 802.1 Time-Sensitive Networking Task Group Norman Finn,...
Current state of IEEE 802.1 Time-Sensitive Networking Task Group Norman Finn,...
 
Ts 123501v150300p
Ts 123501v150300pTs 123501v150300p
Ts 123501v150300p
 
5g tsn-integration-for-industrial-automation
5g tsn-integration-for-industrial-automation5g tsn-integration-for-industrial-automation
5g tsn-integration-for-industrial-automation
 
B cisco n3k_layer2_config_gd_503_u2_1_chapter_01101
B cisco n3k_layer2_config_gd_503_u2_1_chapter_01101B cisco n3k_layer2_config_gd_503_u2_1_chapter_01101
B cisco n3k_layer2_config_gd_503_u2_1_chapter_01101
 
Iic tsn testbed_char_mapping_of_converged_traffic_types_whitepaper_20180328
Iic tsn testbed_char_mapping_of_converged_traffic_types_whitepaper_20180328Iic tsn testbed_char_mapping_of_converged_traffic_types_whitepaper_20180328
Iic tsn testbed_char_mapping_of_converged_traffic_types_whitepaper_20180328
 
Iec 62439 3.4-prp_kirrmann
Iec 62439 3.4-prp_kirrmannIec 62439 3.4-prp_kirrmann
Iec 62439 3.4-prp_kirrmann
 
Tsn farkas-intro-0318-v01
Tsn farkas-intro-0318-v01Tsn farkas-intro-0318-v01
Tsn farkas-intro-0318-v01
 

Recently uploaded

Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 

Recently uploaded (20)

Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 

Tsn nfinn-control-and-config-0515-v03

  • 1. tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 1tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 1 Norman Finn Cisco Systems Version 3, July 3, 2015 TSN Control & Configuration
  • 2. tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 2 •  This contribution is in response to the excellent analyses presented in cc-goetz-MRPv2-MSP-v13, cc-goetz-Next-Steps-v1, and tsn-sexton-feature-priority-request. •  It is an attempt to map the shortest route from the current state of the IEEE 802.1 TSN Task Group to a viable set of TSN standards.
  • 3. tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 3 1.  Static: The Talkers, Listeners, and relay systems are configured before power- up. There are no run-time changes to reservations. 2.  Central: On top of (1), there is a central network controller that learns what was preconfigured, and is responsible for coordinating any changes to those configured reservations with any new reservations. Reservations can be made by Talkers, Listeners, and third-parties (e.g. applications controllers). NOTE: I differ strongly from Götz “next steps.” A fully-centralized control model is perfectly within the scope of IEEE 802.1! 3.  Peer-to-peer: On top of (1), there is no central controller. Talkers and Listeners are responsible for making additional reservations using a peer-to-peer protocol (MSRP or MSRP++). 4.  Mixed: Some relay systems know about the central controller, and some only know the peer-to-peer protocol.
  • 4. tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 4
  • 5. tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 5 •  If we assume that the customer does not want a central controller, More to come on central controllers – I think there are better control models in that case’ •  If we assume that we are not using time-scheduled queues, Only a central controller can make the global tradeoffs necessary to use scheduling; •  If we assume that the Talkers are capable of describing their streams, Having a third party set up the streams is merely another name for “central controller”; •  Then, the current model using MSRP (or improved MSRP) works just fine. •  IMO, we should continue to support this model.
  • 6. tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 6
  • 7. tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 7 Without going into details, there are three protocols used for controlling the TSN network when a central controller is used: 1.  Bandwidth reservations are made along the paths of the streams, as done today, with MSRP (or a newer version of MSRP), whether a central controller is used, or not. 2.  A new protocol is used to exchange reservation information, bridge capabilities, schedules, etc. between the central controller and the bridges. 3.  Topology information is obtained by the central controller by connecting it directly to the ISIS instance running the bridged network. 4.  Stream descriptions and decisions about paths are distributed from the controller or from edge bridges via ISIS.
  • 8. tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 8
  • 9. tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 9 extreme version •  When a controller is present, edge relay systems (1, 5) participate in UNI (MSRP++) only to make/accept opaque data registrations. The NetWork Controller (NWC) can see the registrations and order relay system to make others (e.g., replies). •  Topology (LLDP), registrations, schedules, pinned-down paths – everything – passes through YANG or MIBs to/from the NWC. L1 T NWC 1 2 3 4 5 UNIUNI
  • 10. tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 10
  • 11. tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 11 •  Let us look at the central controller model. •  In both the all-MO and ISIS-MRP models, the central controller requires exactly the same information from the network, and distributes exactly the same information to the network. •  There is no difference in the two models in the information that the controller and relay systems must know!
  • 12. tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 12 •  There are only 2.5 protocols: LLDP for topology discovery, which most bridges, routers, and end stations do, already. YANG + carrier (or MIB + carrier), which are necessary, no matter what. A simplified, non-propagating version of MSRP, controlled by YANG(MIB). •  Any topology control protocol is satisfactory, including MRP, G.8032, MSTP, RSTP, and SPB. (Or, none, if no redundancy!) •  Control packets are purely best-effort data, unnoticed by all relay systems except for the endpoints (controller and one relay system). •  No relay system maintains any data that is not of direct interest to that relay system. •  Things timed out: One connection to controller, per-port LLDP partners, per-port MRP timers (only if used), topology protocol (if used).
  • 13. tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 13 •  There are 4 protocols: YANG + carrier (or MIB + carrier) ISIS-SPB PCEP MSRP, enhanced with new capabilities. •  Plus, you can’t use any network topology protocol except ISIS. •  Control packets passed via ISIS require processing and software relaying at every hop between controller and target relay system. •  Information passed via ISIS requires every relay system in the network maintain the entire database, with a timer attached to each individual information bundle. •  Things timed out: Per-port LLDP (if used), per-port times per-registration MRP, per-port times per-LSP ISIS (adjacencies and LSPs).
  • 14. tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 14 •  In both models, the central controller processes the same information. •  The all-MO model is faster: relay systems receive and operate upon controller instructions in parallel, instead of in series, and all control data is passed as data, not as hop-by-hop ISIS processing and database propagation. •  The all-MO model requires somewhat less software: 2.5 protocols vs. 4. (Or 3, if we say that PCEP à YANG/MIB, or 5, if we don’t exclude LLDP.) •  The all-MO model requires vastly less processing power and memory: No hop-by-hop processing of stream descriptions or paths, no databases with other systems’ data must be maintained, no per-data element timers.
  • 15. tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 15
  • 16. tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 16 1.  Define managed objects to support remote control of MRP in P802.1Qcc. (See Finn’s comments on Qcc D0.4.)
  • 17. tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 17 See cc-goetz-Next-Steps-v1 for complete list.
  • 18. tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 18
  • 19. tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 19 •  Few hops •  Many hops
  • 20. tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 20 •  But, if we assume a “many hops” network (long chains of two-port end systems), and •  If we assume that we are running current ISIS, We’ll talk about the “S2IS” later; •  Then, this model has some severe drawbacks, outlined in the next slide. We will talk about an alternative model, a little later.
  • 21. tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 21 •  The end systems must maintain the full topology database. Again, we’ll talk about the S2IS possibility, later. •  The end systems must maintain all stream descriptions distributed by ISIS. Knowledge of the ISIS stream descriptions must precede the MSRP** registration phase. Pruning them based on network topology and knowledge of the locations of Talkers and Listeners is conceivable, but requires multiple Dijkstra calculations on the topology in each end system to determine whether it cares about a given stream. This slows down convergence after a topology change. It’s probably easier to maintain the whole database. •  Every new or changed stream description anywhere in the network requires every end system in the network to wake up and pay attention to receive two and send two ISIS packets for the new/altered LSP.
  • 22. tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 22 •  Consider also the “pinned-down” paths for Seamless Redundancy. •  Passing the path information via ISIS (802.1Qca), again, requires every end system to maintain the entire path database for all streams in the network. Even if an end system knows it’s not on a given stream’s path, it must maintain the path information and pass it on, because the end system may provide the only path through the network from the controller to some relay or end system that requires the information.
  • 23. tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 23 •  IEEE 802.1 has not, so far, even discussed how to make the bridged LAN function properly with the S2IS. In particular, the S2IS cannot know in which direction (left or right) to send a packet without doing the Dijkstra calculation. •  In the ISIS-MRP solution, the S2IS still must maintain the entire stream description database. •  The topology database can be deleted. It may be that a S2IS only need to retain those path descriptions that pass through it, and that it can pass other path descriptions transparently. Passing some information transparently and retaining other information has not been investigated (to my knowledge) but it seems plausible.
  • 24. tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 24 •  The security model for the all-MO model is that each relay node has a secure relationship (e.g. an IPSec connection) with the NetWork Controller (NWC). That requires one secure connection per relay system, which means o(n) trust relationships. •  All requests are vetted by the NWC. Policy, including security policy, is applied. •  We may or may not have to add a security element for the UNI. MACsec may be sufficient. We may have to add data integrity TLVs to the UNI, in order to avoid MACsec on the physical wire. We could discuss connecting the Talker or Listener directly to the controller. •  The security model for MSRP and ISIS is less obvious. Contributions from its proponents are encouraged. Are there widely-shared keys?
  • 25. tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 25 •  Neither model scales super well. Certainly, there is a lot of control traffic near the NetWork Controller. But, this is best-effort data once it leaves the controller, not hop-by-hop ISIS packets to be processed by every system along its path. •  On the other hand, the total number of packets processed by any given relay system, and in particular, by a two-port chained end system, is orders of magnitude lower for the all-MO model than for the ISIS-MRP model. •  The IETF has long recognized that multiple controllers (PCEs) are necessary for scaling to large networks. The same rules apply, here. Whether peered controllers, or a hierarchy of controllers, is better, is To Be Determined. But, we know from experience it can be done. In particular, the IETF PCE WG has a number of drafts on this problem. •  The usual way to scale up multiple ISIS regions involves BGP. No proposal has been made for this, either. Experience with BGP shows clearly that it will be subject to the same scaling issues as its underlying ISIS basis.
  • 26. tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 26 •  We want to do an open source stack for a 2-port chainable end system in the AVnu Alliance. If a chain of two-port end systems is not looped back for redundancy, no topology protocol is required in those systems. If the chain connected at both ends, simple STP, MRP, G.8032, and many other protocols are sufficient for the all-MO model. •  This author does not believe that the chances of success for this open source effort will be improved by requiring this stack to support the ISIS-MRP model! The requirements for memory for data base storage, alone, will render the ISIS-MRP solution unacceptable for many potential users.
  • 27. tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 27 •  Databases maintained by a two-port end system Entire network topology All stream descriptions Reservations passing through All pinned-down paths Which streams to pass or not Which streams to pass or not Four integers ISIS-MRP All-MO
  • 28. tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 28 •  Control packets processed by a two-port end system Two packets and two packets out (or more), every time anything in the network Changes. One packet in and one packet out when something relevant to this end system changes ISIS-MRP all-MO
  • 29. tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 29 •  What must be implemented if controller is used ISIS for all of the databases MSRP** data distribution model YANG/MIB for schedules, etc. ISIS or LLDP for topology only Opaque MSRP++ for UNI YANG/MIB for schedules, etc. ISIS-MRP All-MO
  • 30. tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 30 •  What else do we have to standardize? Edge system / controller protocol UNI/MSRP** ISIS stream descriptions Augmented MSRP for compatibility UNI/MSRP++ with remote YANG/MIB Augmented MSRP for compatibility. ISIS-MRP All-MO
  • 31. tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 31 •  Compatibility with non-SPB topology protocols? Requires SPB be implemented, whether used for topology or not.. No connection. MRP, G.8032, MSTP all work just fine. ISIS-MRP All-MO
  • 32. tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 32 •  What new things are required in a mixed L2/L3 network? Extending multiple ISIS instances to the controller. Router participates in N L2 ISIS instances + L3 instance(s). Data must migrate between L2/L3 and L2/L2 ISIS instances. Mixed L2/L3 MSRP** Mixed L2/L3 MSRP++ (only if no controller) ISIS-MRP All-MO
  • 33. tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 33 •  It may be that dividing a network up into geographically-based VLANs might help reduce the sizes of the databases that must be kept. •  At present, computing VLAN forwarding requires each node to have the full topology; so the S2IS won’t work; the two-port end stations still have to run full SPB. •  Furthermore, I believe that the proposal for distributing stream descriptions uses ISIS, not MxRP. ISIS floods all information everywhere, regardless of VLAN. Flooding information along VLANs gets one into the trap of requiring full connectivity to create anything, and allow topology failures to cause essential information to be deleted, lengthening the time it takes to restore service. •  This idea needs more explanation from its proponents.
  • 34. tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 34 •  If we accept as a given, that we need to support the scenario where a central controller is present only during configuration time, or perhaps during startup time, and it then disappears … •  Then the extreme all-MO model, as presented in this deck, requires nothing else to be completely dynamic, except: 1.  A requirement to run LLDP for topology discovery. 2.  The ability to run the MSRP++ UNI interface remotely, via a YANG (or MIB) model. •  This author believes very strongly that it is absolutely essential to standardize the trivial amount of additional work required by the all-MO model. •  If 802.1 insists that only one model be standardized, it should be the all-MO model, not the ISIS-MRP model. •  Until the discussion has progressed further, this author has no strong opinion on whether the ISIS-MRP model should be pursued any further.
  • 35. tsn-nfinn-control-and-config-0515-v03.pdf IEEE 802.1 plenary, Berlin DE, March 2015 35 Thank you.