The document discusses the current state of the IEEE 802.1 Time-Sensitive Networking Task Group. It provides details on deterministic networking features like time synchronization, resource reservation, and extremely low packet loss ratios. It describes work being done in the task group on standards for time synchronization, bandwidth reservation, queuing models, and other technologies to enable deterministic networking capabilities in Ethernet networks.
Presentation from October 2012 RTI Technical Road Show.
Agenda Highlights:
How the DDS standard fosters information sharing and interoperability across systems of systems while driving down development, integration, maintenance, upgrade and acquisition costs
The latest 5.0 release of RTI's DDS solution and future roadmap, including enhanced security, support for integration patterns common in C2 systems, FAA DO-178C Level A certification, and DDS standardization initiatives
RTI's new Open Community Source license, which provides free-of-charge access to RTI DDS and allows it to be freely shared across projects and organizations
Previous research has solidified the core idea referred to as circuit emulation. The chief premise is that bulk transfer -- Big Data shards, for a practical example -- can achieve the best e2e throughput when all the switches along the path are in the cut-through mode, as opposed to the store-and-forward mode when under any form of contention. Most networking technology in the world today, including network virtualization (SDN, NFV, etc.) runs under contention. This paper looks into physical and logical network designs that provide a degree of control over contention which, in turn, creates room for efficient scheduling of e2e circuits. The unit of new mode of networking is a ring, but -- rather than the comeback of Token Rings, this paper will talk about partially overlapping asynchronous rings.
Presentation from October 2012 RTI Technical Road Show.
Agenda Highlights:
How the DDS standard fosters information sharing and interoperability across systems of systems while driving down development, integration, maintenance, upgrade and acquisition costs
The latest 5.0 release of RTI's DDS solution and future roadmap, including enhanced security, support for integration patterns common in C2 systems, FAA DO-178C Level A certification, and DDS standardization initiatives
RTI's new Open Community Source license, which provides free-of-charge access to RTI DDS and allows it to be freely shared across projects and organizations
Previous research has solidified the core idea referred to as circuit emulation. The chief premise is that bulk transfer -- Big Data shards, for a practical example -- can achieve the best e2e throughput when all the switches along the path are in the cut-through mode, as opposed to the store-and-forward mode when under any form of contention. Most networking technology in the world today, including network virtualization (SDN, NFV, etc.) runs under contention. This paper looks into physical and logical network designs that provide a degree of control over contention which, in turn, creates room for efficient scheduling of e2e circuits. The unit of new mode of networking is a ring, but -- rather than the comeback of Token Rings, this paper will talk about partially overlapping asynchronous rings.
Network on Chip Architecture and Routing Techniques: A surveyIJRES Journal
The processor designing and development was designed to perform various complex logical information exchange and processing operations in a variety of resolutions. They mainly rely on concurrent and sync, both that of the software and hardware to enhance the productivity and performance. With the high speed growth approaching multi-billion transistor integration era, some of the main problems which are symbolized by all gate lengths in the range of 60-90 nm, will be from non-scalable delays generated by wire. All similar problems may be solved by using Network on Chip (NOC) systems. In the presented paper, we have summarized research papers and contributions in NOC area. With advancement in the technology in the on chip communication, faster interaction between devices is becoming vital. Network on Chip (NOC) can be one of the solutions for faster on chip communication. For efficient link between devices of NOC, routers are needed. This paper also reviews implementation of routing techniques. The use of routing gives higher throughput as required for dealing with complexity of modern systems. It is mainly focused on the routing design parameters on both system level including traffic pattern, network topology and routing algorithm, and architecture level including arbitration algorithm.
Network Virtualization in Cloud Data Centersrjain51
Class lecture by Prof. Raj Jain on Network Virtualization in Cloud Data Centers. The talk covers Network Virtualization, Network Virtualization Techniques, NVO3, NVO3 Goals, NVO3 Terminology, NVO3 Components, Current NVO Technologies, GRE, EoMPLSoGRE, NVGRE, VXLAN, VXLAN Architecture, VXLAN Deployment Example, VXLAN Encapsulation Format, Stateless Transport Tunneling Protocol (STT), LSO and LRO, STT Optimizations, STT Frame Format, TCP-Like Header in STT. Video recording available in YouTube.
DPDK Summit 2015 - NTT - Yoshihiro NakajimaJim St. Leger
DPDK Summit 2015 in San Francisco.
NTT presentation by Yoshihiro Nakajima.
For additional details and the video recording please visit www.dpdksummit.com.
Performance Evaluation using STP Across Layer 2 VLANsijcnesiir
The network security and performance are the major
factors to be considered for end user at usage level in a hybrid
communication network. In terms of security and performance
of network are studied in many cases but it requires being
explored more based on the size of the network and the end
user handling at lower layer of OSI model. There are
voluminous steps taken to consider the issues such as Layer - 2
Exploitation, the inability of a device to perform the required
services at time due to redundant switch loops. This study
evaluates the security issues and the performance issues
together with the trial of VLAN (Virtual LAN) security
perspective and STP (Spanning Tree Protocol) loop free
performance aspect. The real time devices such as router,
switches are used to carry out experiment and the network
behavior observed using wireshark. The different CLI outputs
generated are evaluated the security and performance issues
coherently using show commands. This project experiments
security and performance issues together with help of VLAN
and STP and suggests the best practice of VLAN and STP in
typical hybrid network environment.
Class lecture by Prof. Raj Jain on Data Center Ethernet. The talk covers Residential vs. Data Center Ethernet, IEEE 802 Address Format, IEEE Standards Numbering System, Ethernet vs IEEE 802.3, Names, IDs, Locators, Interconnection Devices, Interconnection Devices, Ethernet Speeds, Link Aggregation Control Protocol (LACP), Spanning Tree Algorithm, Spanning Tree Example, Enhancements to STP, Rapid Spanning Tree, RSTP Example, MSTP (Multiple Spanning Tree), IS-IS Protocol, Shortest Path Bridging, What is a LAN?, What is a Virtual LAN, Virtual LAN, Types of Virtual LANs, IEEE 802.1Q-2011 Tag, Link Layer Discovery Protocol (LLDP), Data Center Bridging, Ethernet Flow Control: Pause Frame, Priority-based Flow Control (PFC), Enhanced Transmission Selection, Quantized Congestion Notification (QCN), DCBX. Video recording available in YouTube.
Introduction to Software Defined Networking (SDN)rjain51
Class lecture by Prof. Raj Jain on Introduction to . The talk covers Origins of SDN, What is SDN?, Original Definition of SDN, What = Why We need SDN?, SDN Definition, XMPP, XMPP in Data Centers, Path Computation Element, PCE, Forwarding and Control Element, Sample ForCES Exchanges, Application Layer Traffic Optimization, ALTO, ALTO Extension, Current SDN Debate: What vs. How?, SDN Controller Functions, RESTful APIs, OSGi Framework, Open Daylight SDN Controller, OpenDaylight Tools, Affinity Metadata Service, SDN Related Organizations and Projects, SDN Web Sites, Hierarchy of Operations, Introduction to, Origins of SDN, What is SDN?, Original Definition of SDN, What = Why We need SDN?, SDN Definition, XMPP, XMPP in Data Centers, Path Computation Element, PCE, Forwarding and Control Element, Sample ForCES Exchanges, Application Layer Traffic Optimization, ALTO, ALTO Extension, Current SDN Debate: What vs. How?, SDN Controller Functions, RESTful APIs, OSGi Framework, Open Daylight SDN Controller, OpenDaylight Tools, Affinity Metadata Service, SDN Related Organizations and Projects, SDN Web Sites. Video recording available in YouTube.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
VL2: A scalable and flexible Data Center NetworkAnkita Mahajan
This Data Center Network Architecture introduces a virtual layer 2.5 in the protocol stack of hosts and uses a directory service to achieve efficient forwarding. It uses separate location/identifier IPs
Software Defined Networking: A Concept and Related IssuesEswar Publications
SDN (Software Defined Networking) is the networking architecture that has gained attention of researchers in recent past. It is the future of programmable networks. Traditional networks were very complex and difficult to manage. SDN is going to change this by offering a standard interface (OpenFlow) between the control plane and the networking devices (data plane). Its implementation is fully supported by software so that we can control the behavior of networking devices through programmatic control. This programmatic control provides various new ways to find breakpoints and failures in networking devices. Today SDN has become an important part of networking, so it is important to emulate its behavior. SDN support virtualization which makes it scalable and flexible. Data traffic resides in the data plane. The main function of intelligent controller is to decide the routing
policy and manage the traffic in data plane. So effectively SDN emerges as a networking architecture that has the ability to solve all problems those were found in traditional architecture In this paper the authors discussed historical perspective of SDN, languages that support SDN, emulation tools, security issues with SDN and advantages that makes SDN suitable choice for today’s network.
Quality of Service at the Internet Engineering Task ForceJohn Loughney
"Quality of Service at the Internet Engineering Task Force" Workshop on "End-to-End Quality of Service. What is it? How do we get it?" Geneva, 1-3 October 2003.
The IEEE 802 is a family of IEEE standards dealing with Local Area Networks and Metropolitan Area Networks. The IEEE 802 family of standards is maintained by the IEEE 802 LAN/MAN Standards Committee (LMSC).
The most widely used standards are for the Bridging and Virtual Bridged LANs (802.1), Ethernet family (802.3), Token Ring (802.5) and Wireless LAN (802.11).
Discussing the Industrial Internet and the crucial role that low-power wireless sensor networks will play to gather these vast amounts of data. Describing how existing industrial wireless technologies must be extended to reach higher scales at lower costs (albeit, with lower guarantees), and the architectural approach and standards that are being developed at 6TiSCH, which encompasses work at IETF, IEEE, and industrial standard bodies.
Network on Chip Architecture and Routing Techniques: A surveyIJRES Journal
The processor designing and development was designed to perform various complex logical information exchange and processing operations in a variety of resolutions. They mainly rely on concurrent and sync, both that of the software and hardware to enhance the productivity and performance. With the high speed growth approaching multi-billion transistor integration era, some of the main problems which are symbolized by all gate lengths in the range of 60-90 nm, will be from non-scalable delays generated by wire. All similar problems may be solved by using Network on Chip (NOC) systems. In the presented paper, we have summarized research papers and contributions in NOC area. With advancement in the technology in the on chip communication, faster interaction between devices is becoming vital. Network on Chip (NOC) can be one of the solutions for faster on chip communication. For efficient link between devices of NOC, routers are needed. This paper also reviews implementation of routing techniques. The use of routing gives higher throughput as required for dealing with complexity of modern systems. It is mainly focused on the routing design parameters on both system level including traffic pattern, network topology and routing algorithm, and architecture level including arbitration algorithm.
Network Virtualization in Cloud Data Centersrjain51
Class lecture by Prof. Raj Jain on Network Virtualization in Cloud Data Centers. The talk covers Network Virtualization, Network Virtualization Techniques, NVO3, NVO3 Goals, NVO3 Terminology, NVO3 Components, Current NVO Technologies, GRE, EoMPLSoGRE, NVGRE, VXLAN, VXLAN Architecture, VXLAN Deployment Example, VXLAN Encapsulation Format, Stateless Transport Tunneling Protocol (STT), LSO and LRO, STT Optimizations, STT Frame Format, TCP-Like Header in STT. Video recording available in YouTube.
DPDK Summit 2015 - NTT - Yoshihiro NakajimaJim St. Leger
DPDK Summit 2015 in San Francisco.
NTT presentation by Yoshihiro Nakajima.
For additional details and the video recording please visit www.dpdksummit.com.
Performance Evaluation using STP Across Layer 2 VLANsijcnesiir
The network security and performance are the major
factors to be considered for end user at usage level in a hybrid
communication network. In terms of security and performance
of network are studied in many cases but it requires being
explored more based on the size of the network and the end
user handling at lower layer of OSI model. There are
voluminous steps taken to consider the issues such as Layer - 2
Exploitation, the inability of a device to perform the required
services at time due to redundant switch loops. This study
evaluates the security issues and the performance issues
together with the trial of VLAN (Virtual LAN) security
perspective and STP (Spanning Tree Protocol) loop free
performance aspect. The real time devices such as router,
switches are used to carry out experiment and the network
behavior observed using wireshark. The different CLI outputs
generated are evaluated the security and performance issues
coherently using show commands. This project experiments
security and performance issues together with help of VLAN
and STP and suggests the best practice of VLAN and STP in
typical hybrid network environment.
Class lecture by Prof. Raj Jain on Data Center Ethernet. The talk covers Residential vs. Data Center Ethernet, IEEE 802 Address Format, IEEE Standards Numbering System, Ethernet vs IEEE 802.3, Names, IDs, Locators, Interconnection Devices, Interconnection Devices, Ethernet Speeds, Link Aggregation Control Protocol (LACP), Spanning Tree Algorithm, Spanning Tree Example, Enhancements to STP, Rapid Spanning Tree, RSTP Example, MSTP (Multiple Spanning Tree), IS-IS Protocol, Shortest Path Bridging, What is a LAN?, What is a Virtual LAN, Virtual LAN, Types of Virtual LANs, IEEE 802.1Q-2011 Tag, Link Layer Discovery Protocol (LLDP), Data Center Bridging, Ethernet Flow Control: Pause Frame, Priority-based Flow Control (PFC), Enhanced Transmission Selection, Quantized Congestion Notification (QCN), DCBX. Video recording available in YouTube.
Introduction to Software Defined Networking (SDN)rjain51
Class lecture by Prof. Raj Jain on Introduction to . The talk covers Origins of SDN, What is SDN?, Original Definition of SDN, What = Why We need SDN?, SDN Definition, XMPP, XMPP in Data Centers, Path Computation Element, PCE, Forwarding and Control Element, Sample ForCES Exchanges, Application Layer Traffic Optimization, ALTO, ALTO Extension, Current SDN Debate: What vs. How?, SDN Controller Functions, RESTful APIs, OSGi Framework, Open Daylight SDN Controller, OpenDaylight Tools, Affinity Metadata Service, SDN Related Organizations and Projects, SDN Web Sites, Hierarchy of Operations, Introduction to, Origins of SDN, What is SDN?, Original Definition of SDN, What = Why We need SDN?, SDN Definition, XMPP, XMPP in Data Centers, Path Computation Element, PCE, Forwarding and Control Element, Sample ForCES Exchanges, Application Layer Traffic Optimization, ALTO, ALTO Extension, Current SDN Debate: What vs. How?, SDN Controller Functions, RESTful APIs, OSGi Framework, Open Daylight SDN Controller, OpenDaylight Tools, Affinity Metadata Service, SDN Related Organizations and Projects, SDN Web Sites. Video recording available in YouTube.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
VL2: A scalable and flexible Data Center NetworkAnkita Mahajan
This Data Center Network Architecture introduces a virtual layer 2.5 in the protocol stack of hosts and uses a directory service to achieve efficient forwarding. It uses separate location/identifier IPs
Software Defined Networking: A Concept and Related IssuesEswar Publications
SDN (Software Defined Networking) is the networking architecture that has gained attention of researchers in recent past. It is the future of programmable networks. Traditional networks were very complex and difficult to manage. SDN is going to change this by offering a standard interface (OpenFlow) between the control plane and the networking devices (data plane). Its implementation is fully supported by software so that we can control the behavior of networking devices through programmatic control. This programmatic control provides various new ways to find breakpoints and failures in networking devices. Today SDN has become an important part of networking, so it is important to emulate its behavior. SDN support virtualization which makes it scalable and flexible. Data traffic resides in the data plane. The main function of intelligent controller is to decide the routing
policy and manage the traffic in data plane. So effectively SDN emerges as a networking architecture that has the ability to solve all problems those were found in traditional architecture In this paper the authors discussed historical perspective of SDN, languages that support SDN, emulation tools, security issues with SDN and advantages that makes SDN suitable choice for today’s network.
Quality of Service at the Internet Engineering Task ForceJohn Loughney
"Quality of Service at the Internet Engineering Task Force" Workshop on "End-to-End Quality of Service. What is it? How do we get it?" Geneva, 1-3 October 2003.
The IEEE 802 is a family of IEEE standards dealing with Local Area Networks and Metropolitan Area Networks. The IEEE 802 family of standards is maintained by the IEEE 802 LAN/MAN Standards Committee (LMSC).
The most widely used standards are for the Bridging and Virtual Bridged LANs (802.1), Ethernet family (802.3), Token Ring (802.5) and Wireless LAN (802.11).
Discussing the Industrial Internet and the crucial role that low-power wireless sensor networks will play to gather these vast amounts of data. Describing how existing industrial wireless technologies must be extended to reach higher scales at lower costs (albeit, with lower guarantees), and the architectural approach and standards that are being developed at 6TiSCH, which encompasses work at IETF, IEEE, and industrial standard bodies.
Building the foundations of Ultra-RELIABLE and Low-LATENCY Wireless Communica...3G4G
Presented by Dr.Mehdi Bennis, Centre for Wireless Communications, University of Oulu, Finland at The International Conference on Wireless Networks and Mobile Communications (WINCOM'17), November 01-04, 2017, Rabat, Morocco
** SHARED WITH PERMISSION **
Advanced TCP/IP-based Industrial Networking for Engineers & TechniciansLiving Online
This manual is for engineers and technicians who need a practical and extensive knowledge of the design and troubleshooting of Industrial Ethernet networks, as well as the selection, installation, and configuration of components such as routers and switches.
It deals in-depth with the underlying TCP/IP protocols, and specifically addresses both design and configuration issues related to IPv4 and the more recent IPv6.
It also covers the more advanced aspects and applications of Ethernet such as advanced switching and routing, CCTV over IP, OPC and Modbus/TCP over Ethernet, industrial security, intrinsically safe applications, switched rings (included the latest IEC 62439-3 redundant ring standard), and highly-deterministic Ethernet-based field buses (e.g. for servo control) capable of 1 millisecond repetition rates and jitter of less than 1 microsecond.
http://www.idc-online.com/content/advanced-tcpip-based-industrial-networking-engineers-and-technicians-21
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
Current state of IEEE 802.1 Time-Sensitive Networking Task Group Norman Finn, Cisco Systems
1. Current state of IEEE 802.1
Time-Sensitive Networking
Task Group
Norman Finn, Cisco Systems
IETF91 Honolulu Current state of IEEE 802.1 Time-Sensitive Networking Task Group 1
2. What is Deterministic Networking?
Same as normal networking, but with the following features for
critical data streams:
1. Time synchronization for network nodes and hosts to better
than 1 µs.
2. Software for resource reservation for critical data streams
(buffers and schedulers in network nodes and bandwidth on
links), via configuration, management, and/or protocol action.
3. Software and hardware to ensure extraordinarily low
packet loss ratios, starting at 10–6 and extending to 10–10 or
better, and as a consequence, a guaranteed end-to-end
latency for a reserved flow.
4. Convergence of critical data streams and other QoS features
(including ordinary best-effort) on a single network, even
when critical data streams are 75% of the bandwidth.
IETF91 Honolulu Current state of IEEE 802.1 Time-Sensitive Networking Task Group 2
3. Who needs Deterministic Networking?
• Two classes of bleeding-edge customers, Industrial and Audio/Video.
Both have moved into the digital world, and some are using packets, but
now they all realize they must move to Ethernet, and most will move to
the Internet Protocols.
1. Industrial: process control, machine control, and vehicles.
• At Layer 2, this is IEEE 802.1 Time-Sensitive Networking (TSN).
• Data rate per stream very low, but can be large numbers of streams.
• Latency critical to meeting control loop frequency requirements.
2. Audio/video: streams in live production studios.
• At Layer 2, this is IEEE 802.1 Audio Video Bridging (AVB).
• Not so many flows, but one flow is 3 Gb/s now, 12 Gb/s tomorrow.
• Latency and jitter are important, as buffers are scarce at these
speeds.
• (You won’t find any more market justification in this deck.)
IETF91 Honolulu Current state of IEEE 802.1 Time-Sensitive Networking Task Group 3
4. Why such a low packet loss ratio?
Back-of-the-envelope calculations:
1. Industrial:
• Automotive factory floor: 1000 networks • 1000 packets/s/network •
100,000 s/day = 1011 packets/day.
• Machine fails safe when 2 consecutive packets are lost.
• At a random loss ratio of 10–5, 10–10 is chance of 2 consecutive
losses.
• 1011 packets/day • 10–10 2-loss ratio = 10 production line halts/day.
• In extreme cases, lost packets can damage equipment or kill people.
2. Audio video production: (not distribution)
• 1010 b/s • 10 processing steps • 1000 s/show = 1014 bits = 1010
packets.
• Waiting for ACKs and retries = too many buffers, too much latency.
• Lost packets result in a flawed master recording, which is the user’s
end product.
IETF91 Honolulu Current state of IEEE 802.1 Time-Sensitive Networking Task Group 4
5. How such a low packet loss ratio?
1. Zero congestion loss.
• This requires reserving resources along the path. (Think, “IntServ”
and “RSVP”) You cannot guarantee anything if you cannot say, “No.”
• This requires hardware in the form of buffers, shapers, and
schedulers. Overprovisioning not useful: its packet loss curve has a
tail.
• Circuits only scale by aggregation in to larger circuits. ( MPLS?
Others?)
• 0 congestion loss goes hand-in-hand with finite guaranteed latency,
also of importance to the users.
2. Seamless redundancy.
• 1+1 redundancy: Serialize packets, send on 2 (or more) fixed paths,
then combine and delete extras. Paths are seldom automatically
rerouted.
• 0 congestion loss means packet loss is failed equipment or cosmic
rays.
• Zero congestion loss satisfies some customers without seamless
redundancy. The reverse is not true in a converged network—if there
is congestion on one path, congestion is likely on the other path, as
well.
IETF91 Honolulu Current state of IEEE 802.1 Time-Sensitive Networking Task Group 5
6. Why all the fuss? You could just …
• Old-timers remember the fuss 1983-1995 about Ethernet
vs. Token Bus, Token Ring, and other “more deterministic”
versions of IEEE 802 wired media. Ethernet won. One
could argue that this TSN stuff sounds like the same
argument. So, what’s different besides, “That was them,
this is us”?
1. Neither Ethernet nor any other IEEE 802 medium
captured the business of the industrial control, vehicle
control, or video studios that drive the present effort—
they went to non-802 (including non-packet) answers.
2. Yes, Voice over IP works pretty well—except when it
doesn’t. The “except when it doesn’t” is a non-starter
for these users.
3. Too much data to overprovision.
IETF91 Honolulu Current state of IEEE 802.1 Time-Sensitive Networking Task Group 6
7. Reference network
• Gazillions of complex protocols
Controller
Talker
Listener
La
Ld
Lc
Bridges
Physical
connectivity
MultiLink
subnet
L2
L2
L2
As seen by network
topology protocols
T
L3
Lb
routers
Network sizes vary from
~home to ~large but within
one administrative domain.
IETF91 Honolulu Current state of IEEE 802.1 Time-Sensitive Networking Task Group 7
8. • Just nodes, queues, clocks, and wires!!
As seen by reliability/
queuing/latency/time
Talker
Listener
Lb
Lc
T
Physical
connectivity
Queue
X
La
Clock
Ld
IETF91 Honolulu Current state of IEEE 802.1 Time-Sensitive Networking Task Group 8
Reference network
9. Mixed L2/L3 = IEEE/IETF cooperation
• Both bridges and routers are important parts of these networks.
Neither is going away.
• Every box along the path must reserve resources, and participate
in the reservation protocols, whether a bridge or a router.
• Reservations from pre-configuration, management, or protocol.
• Hosts = applications can participate in the protocols.
• Hosts and operations managers don’t know or care whether
network is bridged or routed. One Host UNI, one operator view.
• There are valid use cases for application-driven peer-to-peer
control flow models, for centrally controlled models, and for mixed
scenarios.
IETF91 Honolulu Current state of IEEE 802.1 Time-Sensitive Networking Task Group 9
10. IEEE 802 standards complete and in-progress
802.1 Audio Video Bridging TG is now the Time-Sensitive Networking TG.
• Time: A plug-and-play Precision Time Protocol (PTP) profile that allow
bridges, routers, or multi-homed end stations to serve as “time relays” in
a physical network, regardless of L2/L3 boundaries. (Complete.
Enhancements in progress.)
• Reservation: A protocol (MSRP) to reserve bandwidth along an L2 path
determined by L2 topology protocol, e.g. ISIS. (Complete.
Enhancements in progress.)
• Execution: Several kinds of resources (shapers, schedulers, etc.) that
can be allocated to realize the promises made by the reservation. (See
next slide.)
• Path distribution: ISIS TLVs to compute and distribute multiple paths
through a network. (In progress)
• Seamless Redundancy: 1+1 duplication for reliability. (In progress)
IETF91 Honolulu Current state of IEEE 802.1 Time-Sensitive Networking Task Group 10
11. The IEEE 802.1Q Queuing Model
• IEEE 802.1 has an integrated set of queuing capabilities.
• There are several capabilities, most familiar to all.
• The “integrated” part is important—the interactions among
these capabilities are well-characterized and
mathematically sound.
IETF91 Honolulu Current state of IEEE 802.1 Time-Sensitive Networking Task Group 11
12. Priority queuing and weighted queuing
• 802.1Q-1998: Priority (including weighted round robin)
• 802.1Q-2012 (802.1Qaz) adds weighted queues. This
standard provides standard management hooks for
weighted priority queues without over-specifying the
details.
IETF91 Honolulu Current state of IEEE 802.1 Time-Sensitive Networking Task Group 12
Priority selection
1 0 2 3 4 5 6 7
Priority selection
1 0 2 3 4 5 6 7
Weighted
13. AVB shapers
• 802.1Q-2012 (802.1Qat) adds shapers . Shaped
queues have higher priority than unshaped queues. The
shaping still guarantees bandwidth to the highest
unshaped priority (7).
• The AVB shaper is similar to the typical run rate/burst rate
shaper, but with really useful mathematical properties.
• Only parameter = bandwidth.
• The impact on other queues of any number of adjacent shapers Is
the same as the impact of one shaper with the same total
bandwidth.
IETF91 Honolulu Current state of IEEE 802.1 Time-Sensitive Networking Task Group 13
Priority selection
1 0 4 5 6 7 2 3
Weighted ß Highest priority for shaped queues
14. Time-gated queues
• 802.1Qbv: A circular schedule of {time, 8-bit mask} pairs
controls gates between each queue and the priority
selection function.
• These features, plus others in progress, support
guaranteed zero congestion loss and guaranteed
finite latency for reserved flows, and those guarantees
are maintained as more reservations are made (or
refused).
IETF91 Honolulu Current state of IEEE 802.1 Time-Sensitive Networking Task Group 14
Priority selection
1 0 4 5 6 7 4 5
T TT T T T T T ßOperated by a repeating schedule
Weighted
15. But wait! There’s more!
• Transmission preemption: Interrupt (1 level only) transmission
of an Ethernet frame with a frame with tight latency requirements,
then resume the interrupted frame. (With a calculable impact on
the other queuing mechanisms.)
• But remember, if everyone is “special”, then no one is special.
• Cut-through forwarding: The scheduling tools mentioned,
above, allow one to guarantee scheduled cut-through forwarding
opportunities for predictable ultra-low-latency packets.
• Intentional buffering delays: Time-scheduled transmissions can
intentionally delaying transmissions in order to guarantee both a
minimum and a maximum latency, thus minimizing jitter for the
critical traffic. Industrial systems that trigger events based on
packet reception require this.
IETF91 Honolulu Current state of IEEE 802.1 Time-Sensitive Networking Task Group 15
17. Complete IEEE AVB Standards
• IEEE Std 802.1BA-2011 “Audio Video Bridging (AVB) Systems”
• A profile of a number of standards, picking out required options, special initialization parameters,
etc., required for AVB-compliant bridges and end stations.
• An “AVB Device” is a device conforming to 802.1BA.
• IEEE Std 802.1AS-2011 “Timing and Synchronization for Time-Sensitive Applications in Bridged
Local Area Networks”
• A plug-and-play profile of IEEE 1588, including master clock selection, link discovery, and automatic
creation of a tree to distribute the clock signal.
• IEEE Std 802.1Qat-2010 “Stream Reservation Protocol (SRP)”
• The software protocol for making stream reservations
• Has been rolled into 802.1Q as Clauses 34 and 35 of IEEE Std 802.1Q-2011.
• IEEE Std 802.1Qav-2009 “Forwarding and Queuing Enhancements for Time-Sensitive Streams”
• A special credit-based hardware shaper for bridges and end stations that gives better latency
guarantees than the usual shapers.
• Has been rolled into 802.1Q as Clause 34 of IEEE Std 802.1Q-2011.
• IEEE Std 1722-2011 “Layer 2 Transport Protocol for Time Sensitive Applications in a Bridged
Local Area Network”
• A Layer 2 transport protocol carrying a time-to-display stamp on each packet.
• (All 802 standards (not 1722) are free 6 months after publication at
http://standards.ieee.org/about/get.)
IETF91 Honolulu Current state of IEEE 802.1 Time-Sensitive Networking Task Group 17
18. IEEE 802.1 TSN standards under way
• P802.1AS-REV* “Timing and Synchronization”
• Revision of 802.1AS making it clear that it can run on a router as easily as on a bridge.
• P802.1Qbu* “Frame Preemption”
• Amends 802.1Q to support 802.3br
• P802.3br “Interspersed Express Traffic”
• One level of transmission preemption – interrupts transmission of an ordinary frame to transmit an “express”
frame, then resumes the ordinary.
• 802.3 document, not an 802.1 document.
• P802.1Qbv* “Enhancements for Scheduled Traffic”
• Runs the 8 port output queues of a bridge on a rotating schedule.
• P802.1Qca* “Path Control and Reservation”
• Enhances 802.1 ISIS to create multiple paths through a network.
• P802.1CB* “Seamless Redundancy”
• Defines the sequence-split-recombine method for reliability improvement.
• Stand-alone document. NOT an amendment to 802.1Q.
• P802.1Qcc* “Stream Reservation Protocol (SRP) Enhancements and Performance Improvements”
• For more streams, faster convergence, less chattiness, and maybe more.
* For the necessary password, Google “p802.1 username password”
IETF91 Honolulu Current state of IEEE 802.1 Time-Sensitive Networking Task Group 18
19. Other TSN-related standards
• Two IEEE 802 standards are underway at present, P802.1Qbz* and
P802.11ak. These standards make it legal to:
• Integrate a bridge into a Wi-Fi Access Point; and
• Use a Wi-Fi station as a port on a bridge.
• And thus, use an 802.11 link interior to a network, instead of only at the
edge.
• Upon completion, the entirety of TSN is available for Wi-Fi links.
• In IETF, the 6tisch Working Group (under Cisco’s Pascal Thubert) is
defining Deterministic Networking for the wireless space, particularly for
IEEE 802.15.4e equipment.
• IEEE hopes to adapt the IETF Path Control Element into Deterministic
Networking. That effort is just now starting.
• IEC 62439-3 defines the High-availability Seamless Redundancy (HSR)
and Parallel Redundancy Protocol (PRP).
* For the necessary password, Google “p802.1 username password”
IETF91 Honolulu Current state of IEEE 802.1 Time-Sensitive Networking Task Group 19
20. 0 congestion loss:
AVB class shaper
• 802.1Qav defines a hardware credit-based traffic shaper, one of which is
applied to each AVB priority queue (typically two). All traffic on one class
goes through the same shaper.
• Shaper can start transmitting whenever a) its queue is not empty and b) it
has ≥ 0 credit.
• There is no configured “burst limit”, but the configuration of bandwidth of this
and higher-priority queues limits the maximum credit that can be accrued.
• Shaper acquires credit at its programmed bandwidth whenever a) it’s
transmitting, b) its credit is below 0, or c) its queue is not empty.
Programmed bandwidth = sum of all flows’ reservations using the queue.
• Shaper loses credit at line rate whenever it is transmitting. The net credit
rate is therefore a loss of (line rate) – (configured rate) during a transmission.
• Shaper’s credit is forced to zero whenever a) its credit is ≥ 0, b) it is not
transmitting, and c) the queue is empty.
• This inability to save up for the future never reduces the configured bandwidth, but
does reduce the receiver’s worst-case buffer requirements.
IETF91 Honolulu Current state of IEEE 802.1 Time-Sensitive Networking Task Group 20
21. 0 congestion loss:
AVB class shaper
• The AVB traffic shaper operating on classes (it does not operate
on individual streams) cannot guarantee 0 congestion loss without
knowledge of the network topology and intense calculations.
• But, it does give good enough results, in practice, to drive a
growing market.
IETF91 Honolulu Current state of IEEE 802.1 Time-Sensitive Networking Task Group 21
22. 0 congestion loss:
TSN Time-aware queues
• 802.1Q defines a maximum of 8 queues per output port, one per priority
level.
• In the 802.1Q architecture, the 8 queues all feed a “transmission
selection” function that selects among the queues presenting the “not
empty” flag. This function operates by priority, modified by an optional
weighted round-robin algorithm. Of course, AVB shaped queues go
ahead of any priority queue.
• P802.1Qbv introduces a gate between each queue’s “not empty” flag
and the transmission selection function. The 8 gates are controlled by a
repeating schedule that can be synchronized over all ports in all bridges
in a network.
• This simple mechanism can be configured to support a wide range of
behaviors:
• Create a window when a queue has the wire to itself.
• TDM (time domain multiplexing) allocation for queues or groups of
queues.
• Time slots that can guarantee that cut-through forwarding is available.
IETF91 Honolulu Current state of IEEE 802.1 Time-Sensitive Networking Task Group 22
23. 0 congestion loss: Urgency Based Scheduler
(UBS) (TSN)
• UBS uses a large array of AVB traffic shapers, all prioritized at one
level with each other, and with the best-effort queues, with one
shaper per stream, instead of one per class.
• A central server is required to set the priorities for each flow at
each bridge port (and host port).
• The AVB shaper makes calculation of the worst-case buffer dwell
time very easy as these queues are stacked up; six queues
behave exactly like one queue with the same total bandwidth.
• By juggling the priorities at each node, any physically realizable
set of latency requirements for intersecting streams can be met.
This author believes that the required calculation is NP-complete.
• UBS has been proposed in the 802.1 TSN TG, but no project has
yet started. (There are a number of presentations by Johannes Specht in the
IEEE 802.1 2013 and 2014 public folders.)
IETF91 Honolulu Current state of IEEE 802.1 Time-Sensitive Networking Task Group 23
24. 0 congestion loss: Cyclical Queuing and
Forwarding (CQF) (TSN)
• Formerly called “peristaltic shaping,” proposed by Michael Johas Teener (Broadcom).
• Each bridge runs a clock at a certain frequency. All clocks are synchronized. 1/
frequency = “cycle time”
• Reservations made via SRP define the maximum number of bytes (on the wire)
allowed to each flow per clock cycle. Minimum reservation is one frame/cycle.
• Each port requires up to 3 buffers, each big enough to hold one cycle of data.
• The key is to match the (delayed) receive cycle on each port to the next cycle on the
output port. As long as no frame jumps to the wrong cycle, there is 0 congestion loss.
• User must make a tradeoff when configuring:
• Small cycles = low latency.
• Large cycles = more flows and higher ratio between maximum and minimum bandwidth
reservation and more buffers.
• TSN TG is just starting work on this project. The PAR is not approved.
IETF91 Honolulu Current state of IEEE 802.1 Time-Sensitive Networking Task Group 24
25. Seamless Redundancy (TSN)
• Serializes packets, splits them among several paths, then recombines
the streams.
• May be done by multi-homed hosts or by network.
• Two very different scenarios:
• “Industrial” = interval between transmissions on one flow slower than
delivery times. Recombination is trivial: remember last-received serial
number and discard repeats.
• “Video” = many packets in flight, receive out-of sequence at recombination
point. Recombination requires remembering a bit vector of recently-
received sequence numbers and optional buffering to restore order.
• There is a challenge when combining bridging and routing in a single
network, e.g. data center virtual controllers for a factory floor: how is the
sequence number encapsulated?
• P802.1CB is underway in TSN TG. Since this author is the editor, it will
have a framework suitable for mixed L2/L3 networks.
IETF91 Honolulu Current state of IEEE 802.1 Time-Sensitive Networking Task Group 25
26. Control Plane details:
802.1AS Time Synchronization
• 802.1AS does not support “transparent clocks”.
• A “transparent clock” in the 802.1 context would be a bridge that forwards
an L2 PTP packet as an ordinary packet, based on its destination MAC
address and VLAN, while updating a field in the packet that totals the time
spent in bridges along the path waiting for forwarding.
• 802.1AS adds TLVs to the normal PTP packets to automatically elect a
Grand Master and construct a delivery tree for the time signals. These
tasks are combined into what is an addition to, not just a profile of, IEEE
Std 1588, because:
• Links that are measured to have variable delays (typically due to the
presence of non-time-aware relay devices) or overly-long delays are
removed from the active time topology. That means that the time topology
does not equal the data topology. (This helps explain “no transparent
clocks.”)
• There is no point in electing a single “best” Grand Master using the
algorithm in IEEE Std 1588 if that GM has no path to some of the users;
every user needs a Grand Master.
IETF91 Honolulu Current state of IEEE 802.1 Time-Sensitive Networking Task Group 26
27. Control Plane details: IEEE Std
802.1Qat Stream Reservation Protocol
• IEEE Std 802.1Qat-2010 was first published separately, as an
amendment to IEEE Std 802.1Q-2005, and has since been rolled
into IEEE 802.1Q-2011.
• SRP is based on the 802.1Q Multiple Reservation Protocol (MRP),
just like the 802.1Q VLAN and multicast pruning protocols, MVRP
and MMRP.
• “Talker Declarations” of streams are distributed throughout the network
along the path (paths for multicasts) to the Listeners.
• Each Declaration creates a “Registration” on the receiving port,
indicating the direction back to the device issuing the Declaration.
• Listeners issue Listener Declarations that run back towards the Talker
and actually reserve the resources.
• Because MRP is chatty, and is optimized for the case that all data
fits in one data frame (often not the case for SRP), it tends to be a
CPU pig, especially if implemented naively.
IETF91 Honolulu Current state of IEEE 802.1 Time-Sensitive Networking Task Group 27
28. Control Plane details:
P802.1Qca Path Control and Reservation
• Defines extensions to ISIS to allow the multiple paths required by
P802.1CB Seamless Redundancy to be computed and distributed
throughout the network.
• Paths can be restrained by metrics other than the usual used for
forwarding.
• Paths can be pinned down completely, or pinned only to certain points.
• Algorithms have been included for computing multiple paths that are
maximally disjoint, according to various criteria.
IETF91 Honolulu Current state of IEEE 802.1 Time-Sensitive Networking Task Group 28
29. Control Plane details:
P802.1Qcc SRP Enhancements
• New project for Stream Reservation Protocol (SRP)
Enhancements and Performance Improvements
• Charter includes improving the chattiness of SRP and its current
difficulty with handling 1000s of streams.
• May use the same mechanism as ISIS LSPs to transmit and
acknowledge Declarations.
• Will use the same “context forwarding” scheme as the existing SRP, so
that the data follows the same path and gets to the same places; only
the bits on the wire will change.
• 802.1Qcc will likely not cover the L3 needs for a Deterministic
Networking UNI,
IETF91 Honolulu Current state of IEEE 802.1 Time-Sensitive Networking Task Group 29
30. Control Plane details:
P802.1CB Seamless Redundancy
• New project for 1+1 redundancy
• Standalone document, not an amendment to the 802.1Q Bridge
specification.
• Current draft includes useful view of the overall TSN architecture.
• Supports a variety of sequence number marking methods
including:
1. A new L2 sequence number tag for Ethernet frames.
2. HSR or PRP sequence numbers.
3. Pseudowire sequence numbers.
IETF91 Honolulu Current state of IEEE 802.1 Time-Sensitive Networking Task Group 30