IP Unnumbered

Total Page:16

File Type:pdf, Size:1020Kb

IP Unnumbered Building Simplified, Automated and Scalable Data Center Networks with Overlays (VXLAN/FabricPath) BRKDCT-3378 Lukas Krattiger, Technical Marketing Engineer [email protected] @CCIE21921 Session Objectives • Focus on Data Center Networks and Fabrics with Overlays • Closer Look on Packet Encapsulation (VXLAN) – Underlay – the Transport for the Overlay – Control-Plane – Exchanging Information – Optimizing the Forwarding • Overview on Frame Encapsulation (FabricPath) – Similarities to Packet Encapsulation • Fabric Management & Automation approaches BRKDCT-3378 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public Session Non-Objectives • Deep-Dive into FabricPath – There are many Sessions and Recordings • Comparison between different Orchestration and Management Tools • Automation Workflows or Services Catalogs BRKDCT-3378 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public 4 Who am I? • Born behind the Mountains • Other People call it Switzerland • Living in the land of E-Cars and Startups • Aka San Francisco Bay Area • Not sure if I’m 100% Human • US Immigration calls me “Legal Alien” • Dad, Husband, Geek BRKDCT-3378 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public “We can NOT solve our Problems with the same Thinking we used when we Created them” Albert Einstein 6 Agenda • Data Center Fabric Properties • Optimized Networking with VXLAN – Overview – Underlay – Control & Data Plane – Multi-Tenancy • Optimized Networking with FabricPath • Fabric Management & Automation BRKDCT-3378 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public 7 Data Center “Fabric” Journey (Standalone) STP VPC FabricPath VXLAN MAN/WA N FabricPath VXLAN /BGP /EVPN MAN/WA MAN/WA N N BRKDCT-3378 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public A Fork in the Road BRKDCT-3378 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public Data Center Fabric Properties Data Center Fabric Properties Scale, Resiliency, Efficiency • Any subnet, anywhere, rapidly • Reduced Failure Domains • Extensible Scale & Resiliency • Profile Controlled Configuration Full Bi-Sectional Bandwidth (N Spines) Any/All Leaf Distributed Default Gateways Any/All Subnets on Any Leaf BRKDCT-3378 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public 11 Spine/Leaf Topologies Data Center Fabric Properties • High Bi-Sectional Bandwidth • Wide ECMP: Unicast or Multicast RR RR • Uniform Reachability, Deterministic Latency • High Redundancy: Node/Link Failure • Line rate, low latency, for all traffic BRKDCT-3378 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public 12 Variety of Fabric Sizes Data Center Fabric Properties • Fabric size: Hundreds to 10s of Thousands of 10G ports RR RR • Variety of Building Blocks: – Varying Size – Varying Capacity – Desired oversubscription – Modular and Fixed • Scale Out Architecture – Add compute, service, external connectivity as the demand grows BRKDCT-3378 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public 13 Variety of South-bound Topological Connectivity Data Center Fabric Properties • Flexible connectivity options to the Leaf nodes – FEX in straight-through or dual-active RR RR mode (eVPC) – Blade Switches – Hypervisors or bare-metal servers attached in vPC mode Virtual Switch BRKDCT-3378 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public 14 Data Center Fabric Properties Extended Namespace Scalable Layer-2 Domains Integrated Route and Bridge Hybrid Overlays Inter-Pod connectivity Multi-Tenancy BRKDCT-3378 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public 15 Optimized Networks with VXLAN Overview Classic Ethernet IEEE 802.1Q Frame Format Classic Ethernet • Traditionally VLAN is expressed DMAC SMAC 802.1Q Etype Payload CRC over 12 bits (802.1Q tag) Frame – Limits the maximum number of segments in a Data Center to 4096 Destination MAC (DMAC) VLANs Source MAC (SMAC) TPID TCI 4 bytes 802.1Q 0x8100 PCP CFI VID (16 bits) (3 bits) (1 bits) (12 bits) Ether Type (Etype) Data (Payload) CRC/FCS VLAN ID 12 bits TPID = Tag Protocol Identifier, TCI = Tag Control Information, PCP = Priority Code Point, CFI BRKDCT= Canonical-3378 Format© 2015 CiscoIndicator, and/or its VIDaffiliates. = AllVLAN rights reserved. Identifier Cisco Public 17 Overview FabricPath Encapsulation and Frame Format Classic Ethernet • Cisco FabricPath introduces Classic DMAC SMAC 802.1Q Etype Payload CRC Ethernet Frame Encapsulation by Frame adding 16 bytes • Traditionally VLAN, expressed over 16 bytes IEEE 802.1Q tag, stays the same Cisco Outer Outer FP CRC DA SA Tag DMAC SMAC 802.1Q Etype Payload FabricPath (new) Frame (48) (48) (32) BRKDCT-3378 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public 18 Overview Introducing FabricPath w/Segment-ID (1) Classic Ethernet • Cisco FabricPath introduces Classic DMAC SMAC 802.1Q Etype Payload CRC Ethernet Frame Encapsulation by Frame adding 16 bytes • Traditionally VLAN, expressed over 16 bytes IEEE 802.1Q tag, stays the same Cisco Outer Outer FP FabricPath+Segm Segment CRC DMAC SMAC Etype Payload DA SA Tag ID ent-ID (48) (48) (32) (new) Frame • FabricPath w/Segment-ID leverages a two 802.1Q tags for a total address space of 24 bits 802.1Q VLAN ID (12 bits) Segment-ID 24 bits – Support of ~16M segments 802.1Q VLAN ID (12 bits) TPIDBRKDCT 0x8100-3378 = VLAN© 2015 Tagged Cisco and/or Frame its affiliates. with All IEEErights reserved. 802.1Q /Cisco TPID Public 0x893B19 = TRILL Fine Grained Labeling Overview Introducing FabricFath w/Segment-ID (2) Classic Ethernet • Cisco FabricPath introduces Classic DMAC SMAC 802.1Q Etype Payload CRC Ethernet Frame Encapsulation by Frame adding 16 bytes • Traditionally VLAN, expressed over 16 bytes IEEE 802.1Q tag, stays the same Cisco Outer Outer FP FabricPath+Segm Segment CRC DMAC SMAC Etype Payload DA SA Tag ID ent-ID (48) (48) (32) (new) Frame • FabricPath w/Segment-ID leverages TCI outer TPID a double 802.1Q tag for a total 4 bytes 0x8100 PCP CFI VID 802.1Q (16 bits) (3 bits) (1 bit) (12 bits) address space of 24 bits Inner TPID TCI – Support of ~16M segments 4 bytes 0x893B PCP CFI VID 802.1Q (16 bits) (3 bits) (1 bit) (12 bits) TPIDBRKDCT 0x8100-3378 = VLAN© 2015 Tagged Cisco and/or Frame its affiliates. with All IEEErights reserved. 802.1Q /Cisco TPID Public 0x893B20 = TRILL Fine Grained Labeling Overview Introducing VXLAN • Traditionally VLAN is expressed over 12 bits (802.1Q tag) – Limits the maximum number of segments in a Data Center to 4096 VLANs Classical Ethernet Frame DMAC SMAC 802.1Q Etype Payload CRC • VXLAN leverages the VNI field with 50 bytes Original CE Frame Outer a total address space of 24 bits VXLAN IP UDP VxLAN 802.1Q CRC MAC DMAC SMAC Etype Payload (20) (8) (8) optional (new) Frame (14) – Support of ~16M segments Cisco DFA Frame 8 bits 24 bits 24 bits 8 bits • The VXLAN Network Identifier ags Reserved VNIVNI Reserved (VNI/VNID) is part of the VXLAN Header VNI BRKDCT-3378 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public 21 Next-Hop MAC Address Src VTEP MAC Address VXLAN Frame Format Dest. MAC Address 48 MAC-in-IP Encapsulation Src. MAC Address 48 VLAN Type 14 Bytes 16 IP Header 0x8100 (4 Bytes Optional) 72 Misc. Data VLAN ID 16 Tag Outer MAC Header Protocol 0x11 (UDP) 8 Ether Type 16 Header 0x0800 16 20 Bytes Checksum Source IP 32 Outer IP Header Src and Dst Underlay addresses of the Source 16 Dest. IP 32 VTEPs Port UDP Header VXLAN Port 16 Hash of the inner L2/L3/L4 headers of 8 Bytes the original frame. UDP Length 16 Enables entropy for ECMP Load balancing in the Network. VXLAN Header UDP 4789 Checksum 0x0000 16 50 (54) Bytes of Overhead of Bytes (54) 50 VXLAN Flags 8 RRRRIRRR Allows for 16M Original Layer-2 Frame Overlay possible Reserved 24 Segments 8 Bytes VNI 24 Reserved 8 BRKDCT-3378 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public 22 Optimized Networks with VXLAN Data Center Fabric Properties Extended Namespace Scalable Layer-2 Domains Integrated Route and Bridge Multi-Tenancy BRKDCT-3378 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public 23 Why VXLAN? VXLAN provides a Network with Segmentation, IP Mobility, and Scale • “Standards” based Overlay • Leverages Layer-3 ECMP – all links forwarding • Increased Name-Space to 16M identifier • Integration of Physical and Virtual • It’s SDN BRKDCT-3378 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public 24 VXLAN Taxonomy (1) Edge Device Edge Device Local LAN Local LAN IP Interface Segment Segment Physical Physical Host Edge Device Local LAN Host Segment Virtual Switch Virtual Hosts BRKDCT-3378 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public 25 VXLAN Taxonomy (2) VTEP VTEP V V Local LAN Local LAN Segment Segment Encapsulation Physical Physical Host VTEP V Local LAN Host Segment Virtual Switch VTEP – VXLAN Tunnel End-Point VNI/VNID – VXLAN Network Identifier Virtual Hosts BRKDCT-3378 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public 26 Session Marketing Session ID Session Title Speaker Day / Time LTRDCT-1224 Implementing VXLAN in Datacenter Lilian Quan Tuesday, 9:30 Technical Marketing Engineer Wednesday, 9:00 BRKAPP-9004 Data Center Mobility, VXLAN & ACI Fabric Architecture Bradley Wong Tuesday, 11:15 Principal Engineer PNLDCT-2001 Panel: Overlays in the Data Center - A Customer Perspective Panel Tuesday, 4:45p BRKDCT-2328 Evolution of Network Overlays in Data Center Clouds Victor Moreno Wednesday, 11:30 Distinguished TME BRKDCT-2456 Building Multi-tenant DC using Cisco Nexus Switching Elyor Khakimov Wednesday, 2:30p Technical Marketing Engineer BRKDCT-2404 VXLAN deployment models - A practical perspective Victor Moreno Thursday, 9:00 Distinguished TME BRKACI-2001 Integration and Interoperation of existing Nexus networks into Mike Herbert Thursday, 11:30 an ACI architecture Principal Engineer BRKDCT-2049 Overlay Transport Virtualization Brian Farnham Thursday, 2:30p Technical Marketing Engineer BRKDCT-3378 © 2015 Cisco and/or its affiliates.
Recommended publications
  • Gigabit Ethernet - CH 3 - Ethernet, Fast Ethernet, and Gigabit Ethern
    Switched, Fast, and Gigabit Ethernet - CH 3 - Ethernet, Fast Ethernet, and Gigabit Ethern.. Page 1 of 36 [Figures are not included in this sample chapter] Switched, Fast, and Gigabit Ethernet - 3 - Ethernet, Fast Ethernet, and Gigabit Ethernet Standards This chapter discusses the theory and standards of the three versions of Ethernet around today: regular 10Mbps Ethernet, 100Mbps Fast Ethernet, and 1000Mbps Gigabit Ethernet. The goal of this chapter is to educate you as a LAN manager or IT professional about essential differences between shared 10Mbps Ethernet and these newer technologies. This chapter focuses on aspects of Fast Ethernet and Gigabit Ethernet that are relevant to you and doesn’t get into too much technical detail. Read this chapter and the following two (Chapter 4, "Layer 2 Ethernet Switching," and Chapter 5, "VLANs and Layer 3 Switching") together. This chapter focuses on the different Ethernet MAC and PHY standards, as well as repeaters, also known as hubs. Chapter 4 examines Ethernet bridging, also known as Layer 2 switching. Chapter 5 discusses VLANs, some basics of routing, and Layer 3 switching. These three chapters serve as a precursor to the second half of this book, namely the hands-on implementation in Chapters 8 through 12. After you understand the key differences between yesterday’s shared Ethernet and today’s Switched, Fast, and Gigabit Ethernet, evaluating products and building a network with these products should be relatively straightforward. The chapter is split into seven sections: l "Ethernet and the OSI Reference Model" discusses the OSI Reference Model and how Ethernet relates to the physical (PHY) and Media Access Control (MAC) layers of the OSI model.
    [Show full text]
  • Ethernet and Wifi
    Ethernet and WiFi hp://xkcd.com/466/ CSCI 466: Networks • Keith Vertanen • Fall 2011 Overview • Mul?ple access networks – Ethernet • Long history • Dominant wired technology – 802.11 • Dominant wireless technology 2 Classic Ethernet • Ethernet – luminferous ether through which electromagne?c radiaon once thought to propagate – Carrier Sense, Mul?ple Access with Collision Detec?on (CSMA/CD) – IEEE 802.3 Robert Metcalfe, co- inventor of Ethernet 3 Classic Ethernet • Ethernet – Xerox Ethernet standardized as IEEE 802.3 in 1983 – Xerox not interested in commercializing – Metcalfe leaves and forms 3Com 4 Ethernet connec?vity • Shared medium – All hosts hear all traffic on cable – Hosts tapped the cable – 2500m maximum length – May include repeaters amplifying signal – 10 Mbps bandwidth 5 Classic Ethernet cabling Cable aSer being "vampire" tapped. Thick Ethernet cable (yellow), 10BASE-5 transceivers, cable tapping tool (orange), 500m maximum length. Thin Ethernet cable (10BASE2) with BNC T- connector, 185m maximum length. 6 Ethernet addressing • Media Access Control address (MAC) – 48-bit globally unique address • 281,474,976,710,656 possible addresses • Should last ?ll 2100 • e.g. 01:23:45:67:89:ab – Address of all 1's is broadcast • FF:FF:FF:FF:FF:FF 7 Ethernet frame format • Frame format – Manchester encoded – Preamble products 10-Mhz square wave • Allows clock synch between sender & receiver – Pad to at least 64-bytes (collision detec?on) Ethernet 802.3 AlternaWng 0's 48-bit MAC and 1's (except addresses SoF of 11) 8 Ethernet receivers • Hosts listens to medium – Deliver to host: • Any frame with host's MAC address • All broadcast frames (all 1's) • Mul?cast frames (if subscribed to) • Or all frames if in promiscuous mode 9 MAC sublayer • Media Access Control (MAC) sublayer – Who goes next on a shared medium – Ethernet hosts can sense if medium in use – Algorithm for sending data: 1.
    [Show full text]
  • Ethernet by T.S.R.K
    L8 – Ethernet by T.S.R.K. Prasad EA C451 Internetworking Technologies 02/02/2013 References / Acknowledgements Sec 4.3, 4.8: Computer Networks, Andrew Tanenbaum Sec 5.4 – 5.6: [Kurose] Sec 2.6: [Peterson] References EA C451 INET TECH Optional Readings [Shenker-ETH] Scott Shenker, L18- Ethernet, EE122, Fall 2012, Dept of EECS, University of California, Berkeley. http://inst.eecs.berkeley.edu/~ee122/ [Kurose] Chapter 5: The Link Layer and Local Area Networks, Computer Networking, Kurose & Ross Optional Readings EA C451 INET TECH Optional Readings [Tanenbaum] Chapters 3: Data Link Layer and Chapter 4: MAC Sublayer, Computer Networks, Andrew Tanenbaum, 4th Edition. [Peterson] Chapter 2: Getting Connected, Computer Networks, Peterson & Davie. IEEE 802 Project Look Ma – NO RFCs!!! Optional Readings EA C451 INET TECH Self-Study Topics Spanning tree protocol Self-Study EA C451 INET TECH IEEE 802 Project Network Layer Network LLC 802.2 Layer Logical Link Control (LLC) Data Link 802.3 MAC CSMA/CD 802.11a 802.11b 802.11g 802.15 802.16 Layer Ethernet Wireless LAN / Wi-Fi Bluetooth WiMax Physical QAM / Manchester OFDM HR-DSSS OFDM FHSS Physical Layer QPSK IEEE Standard OSI Model Note: This is not the complete model; IEEE 802 standard has 20 sub-committees formulating the details of the Data link layer standards. IEEE 802 Project EA C451 INET TECH You Said It If something comes along to replace Ethernet, it will be called “Ethernet”, so therefore Ethernet will never die. - Attributed to Bob Metcalfe by Ken Thompson You Said It EA C451 INET TECH Presentation Overview Conclusion Deployment Scenarios Gigabit Ethernet Classic Ethernet Introduction Lecture Outline EA C451 INET TECH Presentation Overview Conclusion Deployment Scenarios Gigabit Ethernet Classic Ethernet Introduction Lecture Outline EA C451 INET TECH Ethernet “dominant” wired LAN technology: • cheap Rs.
    [Show full text]
  • Network Architectures
    Dr. Beinschróth József Telecommunication informatics I. Part 4 ÓE-KVK Budapest, 2019. Dr. Beinschróth József: Telecommunication informatics I. Content Network architectures: collection of recommendations The Physical Layer: transporting bits The Data Link Layer: Logical Link Control and Media Access Control Examles for technologies based on the Data Link Layer The Network Layer 1: functions and protocols The Network Layer 2: routing Examle for technology based on the Network Layer The Transport Layer The Application Layer Criptography IPSec, VPN and border protection QoS and multimedia Additional chapters Dr. Beinschróth József: Telecommunication informatics I. 2 The content of this chapter Wired LAN-s Wireless LAN-s Bluetooth PLC, BPL (Power Line Communication, Broadband over Power Lines) DOCSIS Dr. Beinschróth József: Telecommunication informatics I. 3 The LAN (Local Area Network) architecture covers the first two layer of the model The LAN technology is very widespread Covers the first two layer of the model, The data link layer plays a decisive role in the LAN architecture. Wired LAN-s Dr. Beinschróth József: Telecommunication informatics I. 4 The LAN is implemented in buildings or buildings close to each other (1) Located within a relatively small range of intelligent devices: the physical dimension limit: max. a few km, the transmission time is known in advance (micro, nanosecond scale delays). Typically is implemented in buildings, buildings close to each other, companies, institutions. The data transfer is implemented in a communication channel (does not use connected or leased telephone or data networks) Typically private network - work with one owner and administrative management. Destination: computers, printers and other shared resources sharing, messaging.
    [Show full text]
  • Industrial Ethernet
    Industrial Ethernet ... from the Office to the Machine - world wide - Band I Ronald Dietrich Industrial Ethernet ... from the Office to the machine - world wide - HARTING The best connections worldwide – because quality connects. HARTING was founded in 1945 by the family that still retains sole ownership of the company. HARTING presently employs more than 2 000 people including 150 highly qualified engineers and over 100 sales engineers who take care of the daily needs of our customers. Today, HARTING is the leading manufacturer of connectors with 34 subsidiary companies in Europe, America and Asia. As the market leader, HARTING offers the advantage of ‘just in time’ services. It is therefore no wonder that the company maintains close business relationships with all of its important customers active in the world market. HARTING is the market leader in several of its product sectors. HARTING can draw on many years of extensive experience gained in achieving high degrees of protection in industrial environments (IP 65 and higher), all of which has flowed into expanding its product portfolio as well as the development of its family of devices for industrial communication. HARTING products are manufactured utilizing cutting edge and efficient productions methods. CAD systems support research and development as well as tool making activities. We abide by our philosophy of quality, which states that only fully automatic manufacturing processes can achieve a zero error rate. In accordance with DIN EN ISO 9001, the organisation and procedures constituting our quality assurance measures are documented in a quality assurance manual. HARTING employs approximately 60 members of staff in quality assurance.
    [Show full text]
  • Time Sensitive Ethernet the Future for Industrial Control System Networks a Whitepaper
    Time Sensitive Ethernet The future for industrial control system networks A Whitepaper Call: +44 345 222 1711 / +353 1 210 1711 Email: [email protected] Visit: bsigroup.com Introduction Local Area Networks (LAN) are extremely important in the fully interconnected world we live in nowadays, acting as the backbone that enable the interaction between IT elements. They are also used to link local IT systems with the Wide Area Network (Internet). In the industrial world, LANs are even more critical, fulfilling real-time communication requirements to the interaction of the different elements present in SCADA (Supervisory Control and Data Acquisition). This paper will focus on the new enhancements of the most widespread LAN: ETHERNET, and how they allow the standard to achieve a prominent position in the industrial world. Local Area Networks (LANs), OT Architecture Review Ethernet LANs IT and OT Ethernet is, by far, the most used Local Area Network used Before introducing the Automation Pyramid in section 1.3, in IT systems all over the world. It is an open, manufacturer this section provides a brief comparison for the IT and OT independent technology, driven by the Standard IEEE 802.3 concepts. (part of the ISO standard organization) that has found wide The world of traditional Information Technology (IT) acceptance by network hardware manufacturers. has split over the years into several categories. In the “Ethernet refers to the family of LAN products covered by the IEEE case of Information Technology applied to supporting 802.3 standard that defines the carrier sense multiple access manufacturing processes and control systems the collision detect (CSMA/CD) protocol.
    [Show full text]
  • Medium Access Control These Slides Are Created by Dr
    Data Link Layer, Part 3 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable copy and print a single copy of each slide for their own reference, so long as each slide contains the copyright statement, and GMU facilities are not used to produce paper copies. Permission for any other use, either in machine- readable or printed form, must be obtained from the author in writing. CS 455 1 Preface In our earlier discussion about DLL, we assumed that a link is associated with two nodes. When a link/medium is shared among many nodes, we need to resolve the conflicts of multiple nodes transmitting at the same time. This issue is addressed by a sublayer within the DLL: the medium access control (MAC) sublayer. CS 455 2 1 Two Approaches of MAC Compete for the medium – ALOHA – Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Wait for Your Turn – Token Passing Ring – Token Passing Bus – FDDI CS 455 3 Carrier Sense Multiple Access (CSMA) Station listens to channel for ongoing transmissions. If so, the station waits until the channel is idle. When the channel is idle, the frame is transmitted. Collisions may still occur. How ? 1 2 If a collision occurs, the station waits random amount of time and retransmits. The longer the propagation delay, the longer the window of collisions and the worse the performance. CS 455 4 2 Collision Detection During a transmission, the station also listens to the channel and, if it detects collisions, it immediately aborts the transmission with a jamming signal.
    [Show full text]
  • Unit-Iii Datalink Layer: Error Detection and Correction
    UNIT-III DATALINK LAYER: ERROR DETECTION AND CORRECTION Error-Correcting Codes Error control in computer networks is typically achieved by error detecting using cyclic redundancy check (CRC), which is the checksum inside a frame, combined with retransmission For this purpose, systematic cyclic or polynomial generated codes are often used, which are special linear block codesSome basic concepts in error control coding are first reviewedAn n-bit frame, which consists of m-bit data and r check bits, is called a codeword. AllCode words form the codebook Hamming distance between two code words is number of bits in which two code words differ For example, 10001001 and 10110001 have a Hamming distance of 3, where is bit-wise exclusive OR (modulo 2) The minimum Hamming distance d min of a codebook is the smallest Hamming distance between any pair of code words in the codebook A codebook with dmin can detect up to dmin − 1 errors and correct up to (dmin − 1)/2 errors in each codeword. Use of a Hamming code to correct burst errors Hamming codes can only correct single errors. However, there is a trick that can be used to permit Hamming codes to correct burst errors. A sequence of k consecutive codewords is arranged as a matrix, one codeword per row. Normally, the data would be transmitted one codeword at a time, from left to right. To correct burst errors, the data should be transmitted one column at a time, starting with the leftmost column. When all k bits have been sent, the second column is sent, and so on.
    [Show full text]
  • Connection-Oriented Ethernet On-Ramp Aggregation for Next-Generation Networks
    Connection-Oriented Ethernet On-Ramp Aggregation for Next-Generation Networks shaping tomorrow with you Connection-Oriented Ethernet On-Ramp Aggregation for Next-Generation Networks Introduction The Essential Functions of Connection-Oriented This paper describes the way in which high-security networks Ethernet are relying on Connection-Oriented Ethernet (COE) to facilitate In order to make Ethernet connection-oriented, the following functions a geographically-distributed, protocol-simple, IP-based network are required: architecture, that provides the quality of service, network aggregation • Predetermined EVC paths efficiencies, and security that’s needed. • Resource reservation and admission control (CAC) As networks grow, a secure, manageable access and on-ramp • Per-connection (EVC) traffic engineering and traffic management infrastructure is vital. Today, access networks consist of a highly heterogeneous mix, chiefly dominated by TDM and ATM technologies The ability to predetermine the EVC path through the Ethernet network and a combination of copper- and fiber-based last miles. is fundamental to making Ethernet connection-oriented. In classic connectionless Ethernet bridging, Ethernet frames are forwarded in the To enable the new generation of high-bandwidth applications, it network according to the MAC bridging tables in the learning bridge. is necessary to migrate the access infrastructure from these legacy If a destination MAC address is unknown, the bridge floods the frame technologies to Ethernet-centric approaches. These approaches are to all ports in the broadcast domain. Spanning tree protocols like IEEE designed to reduce cost, while delivering the highest degree of security 802.1s are run to ensure there are no loops in the topology and to and deterministic performance.
    [Show full text]
  • CSC458 - Lecture 3 Part 1
    CSC458 - Lecture 3 Part 1 MAC Protocols From Aloha to Ethernet Last Time … This Lecture • Error detection and correction • Key Focus: How do multiple parties • Redundant bits are added to share a wire? We want the benefits Application of statistical multiplexing … Application messages to protect against Presentation Presentation transmission errors. Session • This is the Medium Access Control Session • Two recovery strategies are Transport (MAC) portion of the Link Layer Transport retransmissions (ARQ) and error Network Network correcting codes (FEC) Data Link • Randomized access protocols: Data Link • The Hamming distance tells us how Physical 1. Aloha Physical much error can safely be tolerated. 2. CSMA variants 3. Classic Ethernet 1. ALOHA 2. Carrier Sense Multiple Access • Wireless links between the Hawaiian islands in the 70s • We can do better by listening before we send (CSMA) • Want distributed allocation – good defense against collisions only if “a” is small (LANs) – no special channels, or single point of failure X (wire) • Aloha protocol: collision – Just send when you have data! A B – There will be some collisions of course … – Detect errored frames and retransmit a random time later • “a” parameter: number of packets that fit on the wire • Simple, decentralized and works well for low load – a = bandwidth * delay / packet size – Small (<<1) for LANs, large (>>1) for satellites – For many users, analytic traffic model, max efficiency is 18% What if the Channel is Busy? CSMA with Collision Detection • 1-persistent CSMA • Even
    [Show full text]
  • Looking Inside Real-Time Ethernet
    Analog Dialogue 53-03, March 2019 Share on Twitter Facebook LinkedIn Email Looking Inside Real-Time Ethernet By Volker Goller Industrial Ethernet—real-time Ethernet—has experienced a huge upswing Ethernet is a so-called bridged network. The frames (Ethernet frames) are over the last few years. Although classic fieldbuses are still running in large sent from one point to another: From the endpoint to the switch (bridge), numbers, they have passed their prime. The popular real-time Ethernet from there possibly to other bridges, and finally to the other endpoint. This protocols extended the Ethernet standard to meet the requirements for architecture is largely self-configuring. The bridges first completely receive real-time capabilities. TSN now provides a new route to real-time Ethernet. frames before forwarding them. And this is where multiple problems arise: Real Time and Communications X If at peak times there are more frames to store than the buffer memory in the bridge can hold, then the newly incoming frames are discarded. In the context of factory automation and drive technology, real time means X Because the frames differ in length, they are delayed as a function of safely and reliably reaching cycle times in the range of less than ten mil- their lengths. This leads to fluctuating latencies (jitter). liseconds down to microseconds. For these real-time requirements to be satisfied, Ethernet also had to gain real-time capabilities. X Because the port through which the switch is supposed to send a frame may already be occupied by other frames up to the full frame Ethernet Is a Lot Faster Than a Fieldbus— size, additional delays come into play.
    [Show full text]
  • Introduction to LAN/WAN
    Introduction to LAN/WAN Medium Access Sublayer (Part II) Now,Where Were We? ) Introduction ) Multiple Access Protocols ) IEEE 802 Standard – Ethernet (802.3) ← ) Wireless LAN Protocols ) Misc Ethernet Performance ) Mean frame transmission time, P sec ) Probability that a frame transmits, A – (complicated stuff skipped) ) Channel Efficiency = ___P____ P + 2τ/A ) The longer the cable, the longer the contention period ) This is why Ethernet specifies maximum cable length (i.e. put limit on 2τ) – Longest allowed path is 2.5km + 4 repeaters ≈ 50 μsecs – Minimum frame must allow for at least this – At 10 Mbps is 512 or 64 bytes, shortest frame – 1 Gbps Ethernet is even longer! (or shorter cable) Ethernet Performance (cont.) ) Convert previous formula to: – Frame length F – Network bandwidth B – Cable len L – Cable propagation speed c – (complicated stuff skipped) ) Channel Efficiency = _____1_____ 1 + 2BLe/cF ) Increasing B x L reduces efficiency ) But everyone wants high-bandwidth, WAN! – Then they better not use Ethernet Ethernet Performance and Frame Size Ethernet Perf Final Thoughts ... ) Lots of theoretical work on Ethernet perf – all assumes traffic is Poisson ) Turns out, traffic is self-similar – averaging over long-periods of time does not smooth out traffic (same variance each time interval) – bi-modal (packets are either big or small) ) Take models with grain of salt Saturated LAN ) Net saturated? Add bandwidth … good idea? – Expensive to replace cards – Efficiency –Instead Switched LANs ) Switch with high-speed backplane with connected
    [Show full text]