1 / 62

Ethernet and its evolution towards Carrier Grade Ethernet

Agenda. Ethernet and IEEE 802.3Introduction on Ethernet origin and IEEE.802 projectFrame formatMedium Access Control Layer (CSMA/CD protocol, full duplex)Physical Layer (10 BASE-X, Fast Ethernet, Gigabit Ethernet) Switched EthernetBridges/switchesBridging processSpanning tree protocolVi

roana
Download Presentation

Ethernet and its evolution towards Carrier Grade Ethernet

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    1. Ethernet and its evolution towards Carrier Grade Ethernet Marina Settembre

    2. Agenda Ethernet and IEEE 802.3 Introduction on Ethernet origin and IEEE.802 project Frame format Medium Access Control Layer (CSMA/CD protocol, full duplex) Physical Layer (10 BASE-X, Fast Ethernet, Gigabit Ethernet) Switched Ethernet Bridges/switches Bridging process Spanning tree protocol Virtual LAN Basic VLAN concepts IEEE 802.1Q Carrier Grade Ethernet and Ethernet services Ethernet in MAN Ethernet services ( E-Line, E-LAN) Provider Backbone Transport

    3. Why Ethernet? 98% of all data traffic start and end on an Ethernet port Easy to understand Low cost Strong industry support Continuous development Extensive topological flexibility Most dominant standard in the networking industry IEEE802.3 /ISO 8802.3 30 years of history Developed in 70s 1989 Standardized ‘90s : Switched Ethernet 1997: Fast Ethernet 1999: Gigabit Ethernet 2001 Metro Ethernet Forum 2002: 10 Gigabit Ethernet From LAN to MAN

    4. Ethernet origin Invented by Metcalfe at Xerox in 1973 and patented in 1976 Xerox convinced Intel and Digital in joining and making products (hence the group called DIX) IEEE standard in 1989

    5. Original Ethernet Ethernet was designed as a LAN technology: A Lan connects different computers together in a relatively small area through a single high transmission rate and low error rate(< 10-6, 10-7) physical channel In a LAN all computers/users share LAN resources with the same priority Transmission is broadcast: Need of medium access control (MAC is specific of each LAN solution) Bus topology Carrier Sense Multiple Access/Collision Avoidence (CSMA/CD) protocol is required (CSMA/CD) to avoid collisions Limitation to the physical dimension of the network and the bit rate.

    6. MAC Half Duplex: CSMA/CD CS: Carrier sense (Is someone already talking?) MA: Multiple Access (I hear what you hear!) CD: Collision Detection ( Hey, we are both talking!) CSMA/CD rules: If the medium is idle, transmit anytime If the medium is busy, wait and transmit later If a collision occurs, send 4 bytes Jam, backoff for a random period, then go back to 1

    7. MAC: collision domain Half-duplex Ethernet network must be configured to allow a station to detect a collision within a specified interval time Minimum packet size imposes a maximum network length

    8. Full Duplex Transmission (for FE and GbE) Remember CSMA/CD and related physical limitations? Now forget it! Full duplex operation is an optional MAC capability that allows simultaneous bidirectional transmission over point-to-point links: transmitting while receiving! It is functionally simpler than half duplex since it involves: No media contention No collisions No need to schedule retransmissions Distance limitations are not due to MAC but on the physical media It must respect a minimum InterFrame Gap (IFG)

    9. IEEE 802.3 IEEE802.3 is considered as the evolution of Ethernet and they are often considered as synonyms Covers Ethernet family of LAN products Supports two transmission modality: Half Duplex (CSMA/CD protocol) Full duplex (only for FE,GbE and 10 GbE) Defines four data rates for operation over optical fiber and/or twisted-pair cables: 10 Mbps 100 Mbps – Fast Ethernet 1000 Mbps – Gigabit Ethernet 10 Gbps – 10-Gigabit Ethernet

    10. Ethernet Frame Frame size varies from 64 to 1518 Bytes, except when VLAN tag is supported (more on that later..)

    11. The Ethernet Physical Layer The naming convention is a concatenation of three terms indicating the transmsission rate, the transmission method, and the media type/signal encoding (Es: 10 Base-T)

    13. Switches Switches allow to create larger Ethernet systems by linking multiple collision domains together

    14. Bridges/switches Switches operate at the Data Link Layer (Layer 2) IEEE 802.1D bridge operates in store and forward mode (complete reception of the frame before transmission)

    15. Hubs vs Switches

    16. Main processes in a bridge (IEEE 802.1D Transparent Bridge) The bridging process deals with: Frames forwarding from input to output port Build and update the database for forwarding decisions The spanning tree process this process is essential in presence of loops

    17. Forwarding and filtering data base Each bridge maintains a forwarding database/routing table (filtering data base) with the following entries: < MAC address, port, age> MAC address: host address port: port number of bridge age: aging time of entry

    18. Frame forwarding

    19. Address Learning Creating a new entry in the database with source MAC address, if not existing Flooding on all the ports but the source one Database updating

    20. Danger of Loops Consider the two LANs that are connected by two bridges Assume host n is transmitting a frame F with unknown destination

    21. Spanning Tree A solution is to prevent loops in the topology IEEE 802.1d has an algorithm that organizes the bridges as spanning tree in a dynamic environment Bridges exchange messages to configure the bridges (Configuration Bridge Protocol Data Units (BPDUs)) to build the tree

    22. Routers Routers operate at the Network Layer (Layer 3) Interconnect IP networks

    23. Interconnected devices

    25. What are VLANs ? A Virtual LAN is a method of creating independent logical networks within a single physical network infrastrucure or in other words… A Virtual LAN is a logical segmentation of a broadcast domain (switched network) into different broadcast domains

    26. Why VLANs? Advantages: Reduces the broadcast traffic and increases network security (both of which are hampered in case of single large broadcast domain) Reduces management effort to create subnetworks Reduces hardware requirement, as networks can be logically instead of physically separated Increases control over multiple traffic types

    27. Why are VLANs needed? An example

    28. A possible solution: Routers

    29. Another solution: move users or cables

    30. Easier solution: VLANs

    31. VLAN Intra-Switch Switch Ports are grouped into different broadcast domains

    32. VLAN Inter-Switch Sharing VLAN among switches is achieved by inserting a tag with a VLAN identifier in each frame (802.1Q VLAN standard specification)

    33. VLAN Tagging Scheme: IEEE 802.1Q Tag Protocol Identifier (TPID): identifies the frame as a tagged frame Tag Control Information (TCI) with the following fields: User priority: carries priority information based on the values defined in the 802.1p standard Canonical Format Indicator (CFI): allows Source Routing control Information to be specified VLAN identifier (VID): uniquely identifies the VLAN to which the frame belongs

    34. 802.1p Standard The 802.1p standard defines a scheme to prioritize different types of traffic in Ethernet The forwarding process may provide more transmission queues for each switch port Frames will be assigned to each queue according to their user_priority

    35. Trunk links A trunk link attaches two VLAN switches It carries tagged frames only

    36. Trunk links

    37. Access Links Accees links are untagged for VLAN unaware devices The VLAN switch adds tags to received frames and removes taggs when transmitting frames

    38. Agenda Ethernet and IEEE 802.3 Introduction on Ethernet origin and IEEE.802 project Frame format Medium Access Control Layer (CSMA/CD protocol, full duplex) Physical Layer (10 BASE-X, Fast Ethernet, Gigabit Ethernet) Switched Ethernet Bridges/switches Bridging process Spanning tree protocol Virtual LAN Basic VLAN concepts IEEE 802.1Q Carrier Grade Ethernet and Ethernet services Ethernet in MAN Ethernet services ( E-Line, E-LAN) Provider Backbone Transport (PBT)

    39. In the beginning ..

    40. Increasing proportion of packet traffic

    41. Services driving demand for packet based technology Three main areas of broadband explosion are driving Carrier Ethernet: Business Services – where Gigabit connectivity becomes a must with requirement of data center consolidation, storage and disaster recovery, gigabit connectivity between businesses, and through supply chain. Residential Services – where Triply Play/IPTV becomes broadband driver to deliver >20 Mb to homes with TV, VoD, telephony and Internet services Mobile Services – where wireless 3G packet traffic , in addition to WiMAX and Wi-Fi backhaul, will surpass voice traffic just like in the wireline world. All of these broadband requirement drives a new packet friendly infrastructure, where Carrier Ethernet thrives.Three main areas of broadband explosion are driving Carrier Ethernet: Business Services – where Gigabit connectivity becomes a must with requirement of data center consolidation, storage and disaster recovery, gigabit connectivity between businesses, and through supply chain. Residential Services – where Triply Play/IPTV becomes broadband driver to deliver >20 Mb to homes with TV, VoD, telephony and Internet services Mobile Services – where wireless 3G packet traffic , in addition to WiMAX and Wi-Fi backhaul, will surpass voice traffic just like in the wireline world. All of these broadband requirement drives a new packet friendly infrastructure, where Carrier Ethernet thrives.

    42. Ethernet drivers in the Metro Area Ease of use Widely available, well understood technology Simplifies network operations (OAM&P) Packet based technology IP compatible Flexibility Single interface can connect to multiple services Internet, VPN, Extranet supplier, Storage Provider Bandwidth can be added in 1Mbps increments Cost Effectiveness Widespread use of Ethernet interface Purchase bandwidth only when needed

    43. Ethernet from a carrier perspective Ethernet as a service: Metro Ethernet Network Packet based telecom services that offer an Ethernet interface to the customer and ensure reliable delivery of Ethernet packet data. Ethernet as a transport technology in Metro Area: Carrier Grade Ethernet It is not a prerequisite for delivery Ethernet services and up to now has lacked the features that carriers require, but latest evolutionary steps in layer 2 networks seem to be very promising from a carrier perspective

    44. Ethernet as a service Ethernet services are packet based services that offer an Ethernet interface ( or UNI) to the customer (CE) and ensure reliable delivery of Ethernet packet data Ethernet services do not have necessarily to be delivered using Ethernet tranport The services are defined only in terms that are observable to the CE

    45. Ethernet service model defined by MEF CE can be router IEEE 802.1Q bridge (switch) UNI (User Network Interface) Standard IEEE 802.3 Ethernet PHY and MAC 10Mbps, 100Mbps, 1Gbps or 10Gbps Metro Ethernet Network (MEN) May use different transport and service delivery technologies SONET/SDH, WDM, RPR, MAC-in-MAC, Q-in-Q, MPLS Service frame With IEEE 802.1Q tag (up to 1522 bytes) Without IEEE 802.1Q tag (up to 1518 bytes)

    46. Ethernet Virtual Connection(EVC) An EVC is “an instance of an association of 2 or more UNIs” EVCs help conceptualize the service connectivity Like Frame Relay and ATM PVCs MEF has defined 2 EVC types Point-to-Point (It associates only 2UNIs) Multipoint-to-Multipoint (It associates 2 or more UNIs)

    47. E-Line Services Provided by means of point-to-point EVC E-Line Services can be used to create Ethernet Private Line Services Ethernet Internet Access Ethernet Point-to-Point VPNs( EVPL) (service multiplexing can be supported at UNI to minimize power, space and cost)

    48. E-LAN Services Provided by means of multipoint-to-multipoint EVC E-LAN Services can be used to create Multipoint VPNs Transparent LAN Service

    49. E-Tree Services (1/2) Provided by point-to-multipoint EVC Ethernet Private Tree (EP-Tree), Ethernet Virtual Private LAN (EVP-LAN) Used for Triple Play services

    50. E-Tree Services (2/2) At least one UNI should act as a “Root” The other UNIs are “Leaf” A frame can be sent from a Root to one or more Leaves A frame cannot be sent from a Leaf to a Leaf

    51. Carrier Grade Ethernet Requirements

    52. Technologies for Carrier Ethernet Services MEF defines service models, put requirements, but does not define the transport technologies Legacy transport technologies: WDM : it uses wavelenghts Bandwidth wasting for low bit rate EVC SDH: it uses Virtual Circuits and GFP Expensive …and circuit technology ATM: ATM LAN Emulation service (ATM LANE) Packet technology..but expensive IP/MPLS: Virtual Private LAN Service (VPLS) Packet technology ..but still expensive for metro area Emerging transport technologies: Ethernet-based technology: Provider Bridge (PB), Provider Backbone Bridge (PBB), and Provider Backbone Bridge – TE (PBT) MPLS-based technology:T-MPLS

    53. Evolution of Ethernet towards Carrier Ethernet Two key issues to be addressed: Evolution from flat to hierachical approach IEEE 802.1Q ( Q-Tag) IEEE 802.1ad ( Q-in-Q) - Provider Bridge IEEE 802.1ah (MAC-in-MAC) - Provider Backbone Bridge Evolution from connectionless to deterministic connection oriented forwarding IEEE 802.1Qay - Provider Backbone Bridge –TE (or PBT)

    54. Hierarchical tunneling in Ethernet: Q-tag First Hierarchical level: 802.1Q (Q-tag for VLAN support)

    55. Hierarchical tunneling in Ethernet: Q-in-Q Second Hierarchical level: 802.1ad - Provider Bridges (PB) The original Q-tag (C-VID) is used to identify VLANs within the customer’s network The S-VID tag allows the service provider to administrate their own tags to identify individual customer networks and better manage its own traffic

    56. Hierarchical tunneling in Ethernet: MAC-in-MAC Third Hierarchical level: 802.1ah - Provider Backbone Bridge (PBB) It encapsulates the customer MAC header with a service provider Mac header I-SID identify the Instance ID B-VID represent flood domains that interconnect multiple PB networks B-DA (B-SA) are the Backbone Destination (Source) addresses, which are totally indipendent of customer ones (those ones are transparently carried through the provider domain)

    57. Evolution of Ethernet tunneling Without a hierarchy Ethernet networks have a flat structure Q-tag identifies VLAN Q-inQ identifies customer MAC-in-MAC allows to transparently transport customer frame from UNI to UNI

    58. IEEE 802.1Qay - PBB-TE (PBT) Provider Backbone Bridge - Traffic Engineering (PBB-TE), also known as Provider Backbone Transport (PBT) has the following features: Introduces a connection oriented forwarding mode by turning off Mac learning and Spanning Tree Protocol Provides TE functionalities, hard QoS and resiliency Forwarding information is provided by an external agent (Management plane or Distributed Control plane) Does not change data plane behaviour of PBB Bridges (VID + D-MAC)

    59. Ethernet evolution summary

    60. GMPLS Controlled Ethernet Develop a native packet-oriented transport technology GMPLS to support CO-Ethernet provisioning and reconfiguration A common transport control plane can reduce errors due to manual database configuration A control plane can responds in real time

    61. GMPLS Controlled Ethernet and ASON IETF CCAMP working group is extending the GMPLS control plane for PBB-TE Ethernet networks GMPLS controlled Ethernet label switching (GELS) Objective: Meet the requirements of ITU-T G.8080 framework architecture (ASON)

    62. Forwarding technologies Routed (IP/MPLS) Bridged: 802.1ad (Q-in-Q) 802.1ah (MAC-in-MAC) Spanning tree variants Tunnelled: 802.1Qay PBB-TE T-MPLS

More Related