SlideShare a Scribd company logo
1 of 82
ARCs
Uni.lu, December 2012




                        Pascal Thubert (Cisco Systems)
Agenda



ARCs Concept
oLAF algorithm
Bicasting
fArctals




   Uni.lu   © 2012 Cisco and/or its affiliates. All rights reserved.   Unclassified   2
Available Routing Constructs




BRKEWN-3012   © 2010 Cisco and/or its affiliates. All rights reserved.   Unclassified   3
Arc concept
             Cursor                                                                                      Edge
                                                              Re                 C      Re
                           Re                                  v                         v          Re
                            v                                                                        v


                      An Arc is a 2 ended reversible path
          Edges are directed outwards; links within are reversible
      An arc is resilient to any link or Junction break by returning links
Links are oriented from cursor to edges and returned by moving the cursor.



                       We build Arcs between Safe Nodes


    Uni.lu            © 2012 Cisco and/or its affiliates. All rights reserved.       Unclassified               4
ARC topology
   ARCs form dual or multi-ended structures
   • An ARC stitches 2 SPF subpaths together
   • ARCs + buttressing ARCs = Comb
   • One cursor per ARC / Comb as the water separation line
                                               cursor

          cursor                                               cursor
                                                                     cursor

                                                                         cursor

                                   cursor
            cursor                cursor




                                                                                        Omega
Uni.lu        © 2012 Cisco and/or its affiliates. All rights reserved.   Unclassified           5
Forwarding
   In normal operations, traffic flows away from the cursor and cascades
   from ARC to ARC along shortest path



                                                cursor

          cursor                                                cursor
                                                                      cursor

                                                                          cursor

                                    cursor
             cursor                cursor




                                                                                         Omega
Uni.lu         © 2012 Cisco and/or its affiliates. All rights reserved.   Unclassified           6
Forwarding errors
Are Addressed inside an ARC by returning the incoming link,
In order to exit via the other edge of this ARC
In control plane, this means that the Cursor is placed at the failure location

                                                   cursor

             cursor                             A                  cursor
                                                                         cursor
                                                                      B
                                                                          cursor

                                       cursor
               cursor                 cursor




                                                                                            Omega
   Uni.lu         © 2012 Cisco and/or its affiliates. All rights reserved.   Unclassified           7
Double breakage
Each ARC is its own domain of fault recovery




                                                 cursor

            cursor                            A                  cursor
                                                                       cursor
                                                                    B
                                                                        cursor

                                        cursor
              cursor

                                    cursor


                                                                                          Omega
   Uni.lu       © 2012 Cisco and/or its affiliates. All rights reserved.   Unclassified           8
oLAF




BRKEWN-3012   © 2010 Cisco and/or its affiliates. All rights reserved.   Unclassified   9
Notations for Link types


     A                                    B                          A is SPF successor of B

     A                                    B                          A is non shortest path successor of
                                                                     B
     A   ?-S                              B                          B -> A is unresolved for Safe Node S


     A   Rev                              B                          B is standby alternate on A isolation


     A                                    B                          Non SPF Link used to join an ARC




Uni.lu    © 2012 Cisco and/or its affiliates. All rights reserved.    Unclassified                           10
LAF (Lowest ARC First)
   LAF is a SPF variation that creates ARCs by connecting SPF paths
   - The ARCs include the SPF tree
   - The algorithm identifies the mono-connected zones
   - and provides redundancy inside such zones
                                                                    R


                                                                                          B
                 D                                 A



                                                  C
                                                                                                       K

                                                                                    M
                                                                                    M
             L
                                 E
                                                                   F
                                                                                           J

         N           G                          H
                                                                              I


Uni.lu                   © 2012 Cisco and/or its affiliates. All rights reserved.       Unclassified       11
oLAF Example: Initial topology
                                                                      R

                                   A                                                            B


                  D                                 C
                                                                                                    K
                                                                                    M
          L                E
                                                                  F

                                                                                                J

    N         G
                                            H                                I



 Uni.lu           © 2012 Cisco and/or its affiliates. All rights reserved.       Unclassified           12
Running the modified Algo, Start from R:
                   R
                                                                       o
                                                            R(A)
                                                                       o R(B)                           A and B are Heir
                                             ?-A                       t
                                   A                                                            B       Since we have a
                                                                                                        single root we
                                                                                                        create virtual roots
                  D                                 C                                                   R(A) and R(B)
                                                                                                    K   We note the set
                                                                                                        dependent on R(A)
          L                                                                                             as ?-A for
                           E
                                                                  F                                     convenience

                                                                                                J

    N         G
                                            H                                I



 Uni.lu           © 2012 Cisco and/or its affiliates. All rights reserved.       Unclassified                                  13
Picking A (closest to root), and D, and C:
                                                                       R                                 Then pick
                                                ?-A                                                      Pick D,
                                    A                                                            B       Pick C,
                                                                                                         Each time place in
                        ?-A               ?-A                                                            the parent set
                   D                                 C
                                                                                                     K


           L                E
                                                                   F

                                                                                                 J

     N         G
                                             H                                I



  Uni.lu           © 2012 Cisco and/or its affiliates. All rights reserved.       Unclassified                                14
Picking B:
                                                        R(A)                 R(B)                              Pick K, start
                                           ?-A                                           ?-B                   building up B’s
                                   A                                                             B             dependent set
                       ?-A               ?-A
                                                                                                     ?-B
                  D                                 C
                                                                                                           K
                                                                                     M
          L                E
                                                                  F

                                                                                                 J

    N         G
                                            H                                 I



 Uni.lu           © 2012 Cisco and/or its affiliates. All rights reserved.        Unclassified                                   15
Picking M and J:
                                                        R(A)                 R(B)
                                           ?-A                                           ?-B
                                   A                                                             B
                       ?-A               ?-A
                                                                                                      ?-B
                  D                                 C                                                            - The dependent
                                                                                                                   sets grow.
                                                                                                             K
                                                                                                 ?-B
                                                                                     M
          L                                                                                            ?-B
                           E
                                                                  F

                                                                                                  J

    N         G
                                            H                                 I



 Uni.lu           © 2012 Cisco and/or its affiliates. All rights reserved.        Unclassified                                     16
Running the Algo
Picking L and then E:
                                                         R(A)                  R(B)
                                             ?-A                                           ?-B
                                     A                                                             B
                         ?-A               ?-A
                                                                                                        ?-B
                    D                                 C
                                                                                                               K
              ?-A   ?-A                                                                            ?-B
                                                                                       M
          L                                                                                              ?-B
                             E
                                                                    F

                                                                                                    J

    N           G
                                              H                                 I



 Uni.lu             © 2012 Cisco and/or its affiliates. All rights reserved.        Unclassified                   17
Picking G:
                                                         R(A)                  R(B)
                                             ?-A                                           ?-B
                                     A                                                             B
                         ?-A               ?-A
                                                                                                        ?-B
                    D                                 C
                                                                                                               K
              ?-A   ?-A                                                                            ?-B
                                                                                       M
          L                                                                                              ?-B
                             E
                                                                    F
                    ?-A                                                                             J

    N           G
                                              H                                 I



 Uni.lu             © 2012 Cisco and/or its affiliates. All rights reserved.        Unclassified                   18
Picking F; F is a Safe node!
                                                          R(A)                  R(B)                               Examining F’s
                                              ?-A                                   ?-B
                                                                                                                   neighbors we find J
                                      A                                                            B               that is B-dependent
                          ?-A               ?-A
                                                                                                        ?-B        F has 2 non
                     D                                 C                                                           congruent path to 2
                                                                                                               K   Safe Nodes, though
               ?-A   ?-A                                                                           ?-B             virtual this time
                                                         ?-A
                                                                                       M                           since they are R(A)
           L                                                                                             ?-B
                              E                                                                                    and R(B)
                                                                     F
                     ?-A                                                                            J

 N               G
                                                  H                             I



  Uni.lu             © 2012 Cisco and/or its affiliates. All rights reserved.       Unclassified                                   19
We can form the first infrastructure ARC!
                                                                        R
                                             ?-A                                          ?-B                     We can use F-J to
                                     A                                                            B               tie F’s shortest path
                                                                                                                  to R(A) with J’s
                         ?-A               ?-A
                                                                                                       ?-B        shortest path to
                    D                                 C                                                           R(B)
                                                                                                              K
              ?-A   ?-A                                                                           ?-B
                                                        ?-A
                                                                                      M
          L                                                                                             ?-B
                             E
                                                                    F
                    ?-A                                                                            J
                G
                                              H                                I



 Uni.lu             © 2012 Cisco and/or its affiliates. All rights reserved.       Unclassified                                       20
All nodes along the ARC are Safe
                                                                      R

                                   A                                                            B
                                                                                                              Nodes along the
                                         Rev                                                                  ARC are placed
                                                                                                    Rev
                  D                                 C                                                         alone in there own
                                                                                                              dependent set
                                                                                                          K   (not represented)
                                                      Rev
                                                                                    M
                                                                                                    Rev       All other nodes are
          L                E
                                                                  F                                           returned to the
                                                                             Rev                              original set
                                                                                                J

    N         G
                                            H                                I



 Uni.lu           © 2012 Cisco and/or its affiliates. All rights reserved.       Unclassified                                   21
Next is D
                                                                      R

                                   A                                                            B
                                                                                                              - D depends on A
                      ?-A                Rev                                                                  - D can reach C
                                                                                                    Rev
                  D                                 C                                                           which is in
                                                                                                                another set
                                                                                                          K
                                                      Rev
                                                                                    M
          L                                                                                         Rev
                           E
                                                                  F
                                                                             Rev
                                                                                                J

    N         G
                                            H                                I



 Uni.lu           © 2012 Cisco and/or its affiliates. All rights reserved.       Unclassified                                22
D is a collapsed ARC
                                                                      R

                                   A                                                            B
                                                                                                              D’s parent A and
                                         Rev                                                                  D’s preferred
                                                                                                    Rev
                  D                                 C                                                         neighbor C are both
                                                                                                              Safe Nodes
                                                                                                          K
                                                      Rev
                                                                                    M
          L                                                                                         Rev
                           E
                                                                  F
                                                                             Rev
                                                                                                J

    N         G
                                            H                                I



 Uni.lu           © 2012 Cisco and/or its affiliates. All rights reserved.       Unclassified                                  23
Next is M
                                                                      R

                                   A                                                            B
                                                                                                               - Same goes for M
                                         Rev
                                                                                                     Rev
                  D                                 C
                                                                                                           K
                                                      Rev                                       ?-K
                                                                                    M
          L                                                                                           Rev
                           E
                                                                  F
                                                                             Rev
                                                                                                 J

    N         G
                                            H                                I



 Uni.lu           © 2012 Cisco and/or its affiliates. All rights reserved.       Unclassified                                 24
M is a collapsed ARC
                                                                      R

                                   A                                                            B
                                         Rev
                                                                                                    Rev
                  D                                 C
                                                                                                          K
                                                      Rev
                                                                                    M
          L                                                                                         Rev
                           E
                                                                  F
                                                                             Rev
                                                                                                J

    N         G
                                            H                                I



 Uni.lu           © 2012 Cisco and/or its affiliates. All rights reserved.       Unclassified                 25
Picking L
                                                                        R

                                     A                                                            B
                                                                                                                All depend on D at
                                           Rev                                                                  this point
                                                                                                      Rev
                    D                                 C
                                                                                                            K
              ?-D
                                                        Rev
                                                                                      M
          L                                                                                           Rev
                             E
                                                                    F
                                                                               Rev
                                                                                                  J

    N           G
                                              H                                I



 Uni.lu             © 2012 Cisco and/or its affiliates. All rights reserved.       Unclassified                                  26
Picking E
                                                                        R

                                     A                                                            B
                                                                                                                All depend on D at
                                           Rev                                                                  this point
                                                                                                      Rev
                    D                                 C
                                                                                                            K
              ?-D   ?-D
                                                        Rev
                                                                                      M
          L                                                                                           Rev
                             E
                                                                    F
                                                                               Rev
                                                                                                  J

    N           G
                                              H                                I



 Uni.lu             © 2012 Cisco and/or its affiliates. All rights reserved.       Unclassified                                  27
E has links to C and F
                                                                        R

                                     A                                                            B
                                                                                                                E has links that end
                                           Rev                                                                  deeper than D’s
                                                                                                      Rev
                    D                                 C                                                         collapsed ARC

                                                                                                            K
              ?-D   ?-D
                                                        Rev
                                                                                      M
          L                                                                                           Rev
                             E
                                                                    F
                                                                               Rev
                                                                                                  J

    N           G
                                              H                                I



 Uni.lu             © 2012 Cisco and/or its affiliates. All rights reserved.       Unclassified                                   28
E adds a buttressing ARC
                                                                      R

                                   A                                                            B
                                                                                                              We can form a
                                         Rev                                                                  buttressing ARC
                                                                                                    Rev
                  D                                 C                                                         keeping E’s links
                                                                                                              that end deeper
                                                                                                          K   than D’s collapsed
                  Rev
                                                      Rev                                                     ARC
                                                                                    M
          L                                                                                         Rev
                           E                                                                                  E->D becomes this
                                                                  F
                                                                             Rev                              reversible
                                                                                                J
                                                                                                              L returns to the set
    N         G
                                            H                                I                                D being the Cursor
                                                                                                              of the origin ARC is
                                                                                                              cursor for the Comb

 Uni.lu           © 2012 Cisco and/or its affiliates. All rights reserved.       Unclassified                                    29
Picking L
                                                                        R

                                     A                                                            B
                                                                                                                L forms its own
                                           Rev                                                                  collapsed ARC
                                                                                                      Rev
                    D                                 C
                                                                                                            K
              ?-D   Rev
                                                        Rev
                                                                                      M
          L                                                                                           Rev
                             E
                                                                    F
                                                                               Rev
                                                                                                  J

    N           G
                                              H                                I



 Uni.lu             © 2012 Cisco and/or its affiliates. All rights reserved.       Unclassified                                   30
Picking N
                                                                      R

                                   A                                                            B
                                         Rev
                                                                                                    Rev
                  D                                 C
                                                                                                          K
                  Rev
                                                      Rev
                                                                                    M
          L                                                                                         Rev
                           E
                                                                  F
                                                                             Rev
     ?-A                                                                                        J

    N         G
                                            H                                I



 Uni.lu           © 2012 Cisco and/or its affiliates. All rights reserved.       Unclassified                 31
Picking G
                                                                      R

                                   A                                                            B
                                         Rev
                                                                                                    Rev
                  D                                 C
                                                                                                          K
                  Rev
                                                      Rev
                                                                                    M
          L                                                                                         Rev
                           E
                                                                  F
                                                                             Rev
     ?-A          ?-E                                                                           J

    N         G
                                            H                                I



 Uni.lu           © 2012 Cisco and/or its affiliates. All rights reserved.       Unclassified                 32
Picking H
                                                                      R

                                   A                                                            B
                                         Rev
                                                                                                    Rev
                  D                                 C
                                                                                                          K
                  Rev
                                                      Rev
                                                                                    M
          L                                                                                         Rev
                           E
                                                                  F
                                                                             Rev
     ?-A          ?-E           ?-E                                                             J

    N         G
                                            H                                I



 Uni.lu           © 2012 Cisco and/or its affiliates. All rights reserved.       Unclassified                 33
H adds a buttressing ARC
                                                                      R

                                   A                                                            B
                                         Rev
                                                                                                    Rev
                  D                                 C
                                                                                                          K
                  Rev
                                                      Rev
                                                                                    M
          L                                                                                         Rev
                           E
                                                                  F
                                                                             Rev
                               Rev                                                              J

    N         G
                                            H                                I



 Uni.lu           © 2012 Cisco and/or its affiliates. All rights reserved.       Unclassified                 34
Picking N and G again
                                                                      R

                                   A                                                            B
                                         Rev
                                                                                                    Rev
                  D                                 C
                                                                                                          K
                  Rev
                                                      Rev
                                                                                    M
          L                                                                                         Rev
                           E
                                                                  F
                                                                             Rev
     ?-A          ?-E          Rev                                                              J

    N         G
                                            H                                I



 Uni.lu           © 2012 Cisco and/or its affiliates. All rights reserved.       Unclassified                 35
Picking N again
                                                                      R

                                   A                                                            B
                                         Rev
                                                                                                    Rev
                  D                                 C
                                                                                                          K
                  Rev
                                                      Rev
                                                                                    M
          L                                                                                         Rev
                           E
                                                                  F
                                                                             Rev
     ?-A                       Rev                                                              J

    N         G
                                            H                                I



 Uni.lu           © 2012 Cisco and/or its affiliates. All rights reserved.       Unclassified                 36
Picking N again and then I
                                                                      R

                                   A                                                            B             We’re done with the
                                         Rev                                                                  set
                                                                                                    Rev
                  D                                 C
                                                                                                              N is still dependent
                                                                                                          K
                  Rev                                                                                         N’s subgraph is
                                                      Rev
                                                                                    M                         monoconnected
          L                                                                                         Rev
                           E
                                                                  F
                                                                                                              If N has a
                                                                             Rev
     ?-A                       Rev                                                                            dependent set we
                                                                                                J
                                                                                                              run the algorithm in
    N         G                                                                                               that set using N as
                                            H                                I                                root.




 Uni.lu           © 2012 Cisco and/or its affiliates. All rights reserved.       Unclassified                                    37
Original Graph and Classical rev-SPF
                                                                                                                                   R
                                             R

                                                                                                                       A                       B
                         A                                             B

                                                                                                               D               C
                 D               C
                                                                                                                                                   K
                                                                                        K
                                                                                                                                           M
                                                            M
                                                                                                L                  E
    L                E                                                                                                             F
                                          F
                                                                                                                                               J
                                                                         J
                                                                                            N             G
N            G                                                                                                             H
                             H                                                                                                         I
                                                       I



    Uni.lu                   © 2012 Cisco and/or its affiliates. All rights reserved.           Unclassified                                           38
Original Graph and SPF-based DAG
                                                                                                                                   R
                                             R

                                                                                                                       A                       B
                         A                                             B

                                                                                                               D               C
                 D               C
                                                                                                                                                   K
                                                                                        K
                                                                                                                                           M
                                                            M
                                                                                                L                  E
    L                E                                                                                                             F
                                          F
                                                                                                                                               J
                                                                         J
                                                                                            N             G
N            G                                                                                                             H
                             H                                                                                                         I
                                                       I

Only 3 nodes are Safe but in all cases packet end in Single point of failure
waterbasins
    Uni.lu                   © 2012 Cisco and/or its affiliates. All rights reserved.           Unclassified                                           39
Original Graph and resulting construct
                                                                                                                                     R
                                             R

                                                                                                                       A                         B
                         A                                             B
                                                                                                                       Rev
                                                                                                                                                 Rev
                                                                                                               D               C
                 D               C
                                                                                                                                                       K
                                                                                        K                      Rev
                                                                                                                               Rev
                                                                                                                                             M
                                                            M                                                                                        Rev
                                                                                                L                  E
    L                E                                                                                                             F
                                          F
                                                                                                                                         Rev
                                                                                                                   Rev                           J
                                                                         J
                                                                                            N             G
N            G                                                                                                             H
                             H                                                                                                           I
                                                       I



    Uni.lu                   © 2012 Cisco and/or its affiliates. All rights reserved.           Unclassified                                               40
Constructed ARCs
                                                                          R


                                                                                                    B
              D                                      A


                                                   C
                                                                                                        K
                                                                                        M
          L
                               E
                                                                        F
                                                                                                    J

    N             G                               H
                                                                                 I



 Uni.lu               © 2012 Cisco and/or its affiliates. All rights reserved.       Unclassified           41
Bicasting




BRKEWN-3012   © 2010 Cisco and/or its affiliates. All rights reserved.   Unclassified   42
Adding Bicasting to ARCs



                                                     Re                 C      Re
                  Re                                  v                         v          Re
                   v                                                                        v




          A concept of Left and Right is introduced.


 Uni.lu      © 2012 Cisco and/or its affiliates. All rights reserved.       Unclassified        43
Building L/R indicators

        When an ARC is formed, each end is associated to a side.
        At least one Right (green) and one Left (orange) per ARC

                                                        cursor

                   cursor                                               cursor
                                                                              cursor

                                                                                  cursor

                                            cursor
                     cursor                cursor



H1            H2       H3                                                 H4                     H5   H6
                                                                                                           Omega
     Uni.lu            © 2012 Cisco and/or its affiliates. All rights reserved.   Unclassified                     44
Building L/R indicators (cont’d)

Nodes between cursor and edge are associated to the edge side
For an edge ending at Omega, the association is free form

                                                        cursor

                   cursor                                               cursor
                                                                              cursor

                                                                                  cursor

                                            cursor
                     cursor                cursor



H1            H2       H3                                                 H4                     H5   H6
                                                                                                           Omega
     Uni.lu            © 2012 Cisco and/or its affiliates. All rights reserved.   Unclassified                     45
Building L/R indicators (cont’d)
     For and ARC ending in another ARC, the end is associated to
     the same heir as the node the ARC exits into. This keeps ARC
     bicasting routes close to shortest path.
                                                        cursor

                   cursor                                               cursor
                                                                              cursor

                                                                                  cursor

                                            cursor
                     cursor                cursor



H1            H2       H3                                                 H4                     H5   H6
                                                                                                           Omega
     Uni.lu            © 2012 Cisco and/or its affiliates. All rights reserved.   Unclassified                     46
Building L/R indicators (cont’d)
 In case of collision (both ends of an ARC select the same heir)
 • One end picks that heir (shortest path)
 • The other picks the heir of the other end of the ARC it falls into
                                                        cursor

                   cursor                                               cursor
                                                                              cursor

                                                                                  cursor

                                            cursor
                     cursor                cursor



H1            H2       H3                                                 H4                     H5   H6
                                                                                                           Omega
     Uni.lu            © 2012 Cisco and/or its affiliates. All rights reserved.   Unclassified                     47
Bicasted routing (ex)
   2 packet copies are colored by the colors of the ARC through which
   the original packet is injected
   Packet copies exit ARCs by the the edge corresponding to their color.
   Below, the black path is shortest whereas the
   orange and green paths are Left and Right paths (via H2 and H6)
                                                   cursor

              cursor                            A                  cursor
                                                                         cursor
                                                                      B
                                                                          cursor

                                       cursor
                cursor                cursor


         H2                                                                                 H6
                                                                                                 Omega
Uni.lu            © 2012 Cisco and/or its affiliates. All rights reserved.   Unclassified                48
Bicasted routing (2nd ex)
   L/R Packets are routed away along there E/W tag,
   => independent of the cursor.
   L/R tagging is used to prevent re-U-turning in a same ARC.


                                                   cursor

              cursor                            A                  cursor
                                                                         cursor
                                                                      B
                                                                          cursor

                                       cursor
                cursor                cursor


         H2                                                                                 H5
                                                                                                 Omega
Uni.lu            © 2012 Cisco and/or its affiliates. All rights reserved.   Unclassified                49
Bicasted routing (2nd, with breakage)
   E/W Packets are routed away along there E/W tag,
   => independent of the cursor.
   E/W tagging is used to prevent re-U-turning in a same ARC.


                                                cursor

           cursor                            A                  cursor
                                                                      cursor
                                                                   B
                                                                       cursor

                                    cursor
             cursor                cursor




                                                                                         Omega
Uni.lu         © 2012 Cisco and/or its affiliates. All rights reserved.   Unclassified           50
Bicasted reservation (ex)
   Reservation Packets are routed away along there E/W tag,
   For traffic coming back from root (bi-casted, in red)
   Collisions are identified and resolved (next slides)


                                               cursor

          cursor                            A                  cursor
                                                                     cursor
                                                                  B
                                                                      cursor

                                   cursor
            cursor                cursor




                                                                                        Omega
Uni.lu        © 2012 Cisco and/or its affiliates. All rights reserved.   Unclassified           51
Collision type 1
   Reservation Packets cross in a same arc from different entry points
   Resolution is to prune cross-forwarding along the ARC




Uni.lu         © 2012 Cisco and/or its affiliates. All rights reserved.   Unclassified   52
Collision type 2
    Reservation Packets enter a same arc at a same entry point
    This means an incoming ARC faced a coloring collision (orange
    below)
    Resolution is to return the second reservation packet along its ARC
    And prune the u-turn path. Say orange arrived first; green is sent
    back.            Coloring collision: ends in
                                   orange but cannot be
                                         orange

         cursor




Uni.lu            © 2012 Cisco and/or its affiliates. All rights reserved.   Unclassified   53
Collision type 2 (cont’d)
    The returned reservation packet arrives on the other end with the
    wrong color for that end, which is also the color of the other end.
    If the packet cannot be forwarded with its original color it is recolored
    to any color but that of its copy. Returning the packet for a collision is
    equivalent to a breakage or a missing link if the graph is not
    biconnected.

                                                                            cursor

                                             cursor
                                                                                             cursor




Uni.lu           © 2012 Cisco and/or its affiliates. All rights reserved.     Unclassified            54
Collision type 2 (alt)
    Resolution is still to return the second reservation along its ARC
    And prune the u-turn path. Say orange arrived last and is sent back.
    In this example the orange packet does not need to be recolored at
    the other end since that terminates in an ARC that has an orange
    end.




         cursor




Uni.lu            © 2012 Cisco and/or its affiliates. All rights reserved.   Unclassified   55
Collision type 2 (alt cont’d)
    Now we are back to a collision of type 1 which is resolved by pruning
    opposite paths along the ARC




Uni.lu          © 2012 Cisco and/or its affiliates. All rights reserved.   Unclassified   56
fArctals




BRKEWN-3012   © 2010 Cisco and/or its affiliates. All rights reserved.   Unclassified   57
Laying labels.
We lay omega ( labels for a destination at the level of the DODAG of
ARCs
Within an ARC, the omega label is encapsulated in a lambda ( label
path that describes the ARC and is independant of the destination. The
lambda label is semected and pushed at the ARC ingress and popped
                                                             Lambda
at the ARC egress                                             labels
                                                                                         switched
                                                                                        path along
                                                                                        an ARC in
                                                                                         both dir.
                                                                                           Inner omega
                                                                                          label pops for
                                                                                          DODAG level
                                                                                             switching


                                                                                          Destination

  Uni.lu      © 2012 Cisco and/or its affiliates. All rights reserved.   Unclassified                58
Main labels along an ARC
                                                     Cursor Junction
 edge Junction                                                 3                                                               Exit node
                                                                                                      2
                              4
                                                                Re                 C      Re                           1

                             Re                B                 v                         v              C
                                                                                                                  Re
                              v                                        2                      3
                                                                                                                   v
                   A                                                                                                       D
              13                       1                                                                      4
                                                                                                                                     21

                   12                                     Intermediate Junction


                We build to Label switch paths along an arc
            Left to Right (dark blue) and Right to Left (dark red)
                       labels are classical MPLS labels
Note the A edge node is selecting one of its exit to build a LSP, this selection
                   could be balanced upon Omega labels
     Uni.lu             © 2012 Cisco and/or its affiliates. All rights reserved.       Unclassified                                        59
Backup labels along an ARC
                                                   Cursor Junction
edge Junction                                                3bis                                                            Exit node
                                                                                                    2bis
                            4bis
                                                              Re                 C      Re                        1bis

                           Re                B                 v                         v           C
                                                                                                            Re
                            v                                        2bis                   3bis
                                                                                                             v
                 A                                                                                                       D
            13                       1bis                                                                  4bis
                                                                                                                                   21

                 12                                     Intermediate Junction


           We build to backup Label switch paths along an arc
   Left to Right (light red, backup of red) and Right to Left (light blue)
                       labels are classical MPLS labels
    The light label paths are fast reroute backup for the dark labels
                   The light labels do not have back ups
   Uni.lu             © 2012 Cisco and/or its affiliates. All rights reserved.       Unclassified                                        60
Hierachical Drawing of ARCs in a Ring
topology




Uni.lu   © 2012 Cisco and/or its affiliates. All rights reserved.   Unclassified   61
Drawing ARCs between rings




We start with a ring topology where rings are interconnected at intersections
     points (themselves maybe quite complex inside for redundancy)
    Uni.lu       © 2012 Cisco and/or its affiliates. All rights reserved.   Unclassified   62
Hierarchical ARC computation in rings
(cont’d)




 The Interconnection type (simple, double or more intersections) does not
matter at this level of the hierarchy. All that counts is whether rings connect
  Uni.lu        © 2012 Cisco and/or its affiliates. All rights reserved.   Unclassified   63
Hierarchical ARC computation in rings (cont’d)




Each ring is abstracted as a virtual supernode and a ring connection is
               abstracted as a link in the super topology.
   Complex connection points can be itemized at that level as well
  Uni.lu       © 2012 Cisco and/or its affiliates. All rights reserved.   Unclassified   64
Computing the Omega label Path
                                                                         R                             destination

                                      A                                                            B

                                                                                                                       ring
                     D                                 C
                                                                                                            K
                                                                                       M
             L                E                                                                                      connection
                                                                     F                                                between
                                                                                                                       rings
                                                                                                   J

      M          G
                                               H                                I

To reach a destination R we compute an ARC set over the super topology.
    Uni.lu           © 2012 Cisco and/or its affiliates. All rights reserved.       Unclassified                                  65
Result of the OLAF algorithm:
                                                R                                                                                      R

                           A                                              B                                                A                       B
                               Rev
                                                                              Rev
                     D             C                                                                               D               C
                                                                                            K                                                          K
                                   Rev
                                                               M                                                                               M
    L       Rev E                                                               Rev
                                                                                                    L                  E
                                             F                                                                                         F
                                                      Rev
                                                                            J                                                                      J
N                G       Rev                                                                    N            G
                               H                         I                                                                     H           I

                         DAG visualization                                                  ==                         ARC visualization

        Uni.lu                   © 2012 Cisco and/or its affiliates. All rights reserved.           Unclassified                                       66
(Alt) Result of the COMB algorithm:
                                    R                                                                                   R

                     A                                         B                                                A                   B
                     Rev
                                                                   Rev
        D                    C                                                                            D
                                                                                                                    C
                                                                              K                                                              K
        Rev
                             Rev                    M                                                                           M
L                                                                    Rev                     L
                 E
                                 F                                                                         E            F
                                           Rev
                 Rev                                             J                                                                  J

N   G                                                                                N              G                       I
                         H       Rev I                                                                          H


    Buttressing ARC links                                                                         Comb vizualization

        Uni.lu                    © 2012 Cisco and/or its affiliates. All rights reserved.       Unclassified                           67
Computing Omega Labels
Now we have computed an omega                                                                       R
ARC set to destination R. In a Ring,
this determines the egresses and the
                                                                                            A                   B
cursor location

Again we can lay 4 Omega Labels                                                       D
per Omega ARC. Omega labels are                                                                 C
per destination but not processed                                                                                        K
within the rings
                                                                                                            M
Note that for Combs, the labels follow L                                               E            F
the labyrinth logic (Combs and comb
path are discussed in another paper)                                                                            J
Omega Labels are switched at the N                                              G                       I
connection points. They are invisible                                                       H
within the Rings (they are
encapsulated in lambda labels).

    Uni.lu        © 2012 Cisco and/or its affiliates. All rights reserved.   Unclassified                           68
Omega level ARC (in ARC set of rings)


                                                                       C                           D

                                                                                             Cbis                   E
                             B                                     Bbis


                               Abis                                                                              Dbis




                                                                       B                       C
                                         A                                                                 D
             a
                                                                             Cbis                  Dbis                 f
                 b                                Bbis
                                                                                                          Ebis
a                    c
                                                                                                                            f
             b       c




    Uni.lu               © 2012 Cisco and/or its affiliates. All rights reserved.   Unclassified                                69
Drawing ARCs within a ring (simple
     connection)




When a Ring has a simple connection to another we draw a single ARC that
  goes around this ring to reach the other on both side of the connection
     Uni.lu      © 2012 Cisco and/or its affiliates. All rights reserved.   Unclassified   70
Olympic style rings




Olympic style rings have a two intersection to one another so we draw a pair of
    ARCs that interconnect the connection points that lead to the next ring
      Uni.lu       © 2012 Cisco and/or its affiliates. All rights reserved.   Unclassified   71
Multiple interconnections




We draw ARCs between contiguous intersection with another ring.
        Each ARC is a redundant path to that next ring
Uni.lu      © 2012 Cisco and/or its affiliates. All rights reserved.   Unclassified   72
Label encapsulation
                When a packet to is injected in a ring ARC,
          A MPLS label is added to allow forwarding along the ARC
          In ARC, is the destination node in which FEC are defined

   ARC label          FEC label
                                                                                            packet
     ( )                ( )



 A table indicates the preferred and the backup labels along the ARC
       The preferred is the one that goes away from the cursor
                                                                  Incoming label
                                                                  Preferred switched                 L
                                                                  label
                                                                  Backup switched label Rbis

 Uni.lu           © 2012 Cisco and/or its affiliates. All rights reserved.   Unclassified                73
In infrastructure Junction e.g. B




                     B
          A
                              Cbis
              Bbis



Incoming label                                                                 B         Bbis    Bbis   B


Preferred switch label                                                         A         Abis    Cbis   B

Encapsulating ARC
Alternate label                                                                Bbis     N/A     N/A     Bbis



Uni.lu        © 2012 Cisco and/or its affiliates. All rights reserved.   Unclassified                          74
Operation in infra junction ring

    Incoming label                                                               B           Bbis    Bbis   B


    Preferred switch label                                                       A           Abis    Cbis   B

    Encapsulating ARC
    Alternate label                                                              Bbis       N/A     N/A     Bbis


•   Packet incoming Ring with label B.
•   Table indicates to encaps in ARC           towards A’s intersections
•   A Label is added to forward the packet away from cursor
•   Say the           ARC is broken in that direction
•     is switch to bis to follow the backup label path towards the other edge
•   Say the ARC is broken there too. bis has no backup so it is popped
•   Thus forwarding over to A is broken. A is switched to alternate Bbis
•   Packet now follows ARC             towards ring C over the backup LSP
     Uni.lu       © 2012 Cisco and/or its affiliates. All rights reserved.   Unclassified                          75
In edge Junction e.g. A



          a       c
              b




  Incoming label                                                                       A        abis   bbis   cbis


  Preferred switch label                                                               a        b      c      Abis

  Encapsulating ARC
  Alternate label                                                                      abis     bbis   cbis   Bbis



 Uni.lu               © 2012 Cisco and/or its affiliates. All rights reserved.   Unclassified                        76
Operation in edge Junction
     Incoming label                                                                 A        abis   bbis   cbis


     Preferred switch label                                                         a        b      c      Abis

     Encapsulating ARC
     Alternate label                                                                abis     bbis   cbis   Bbis


•   Packet incoming Ring with label A.
•   Table indicates to encaps in ARC                 towards a’s intersections
•   A Label is added to forward the packet away from cursor
•   Say the            ARC is broken in that direction
•     is switch to bis to follow the backup label path towards the other edge
•   Say the ARC is broken there too. bis has no backup so it is popped
•   Thus forwarding over to a is broken. a is switched to alternate abis
•   Packet now follows ARC                towards ring b over
•   All possible exits a, b, c are tried and if all fail packet goes back to B
    Uni.lu                                                                    Unclassified
                   © 2012 Cisco and/or its affiliates. All rights reserved.                                       77
Parallel rings


                                                           B                           A   B

                                        A
                                                                    D                  C   D
                                                C
                                                                                       E   F
                                        E
             H                                             F                               G
                                            G
              I                                                                        H   I




Uni.lu   © 2012 Cisco and/or its affiliates. All rights reserved.       Unclassified           78
Parallel rings (cont’d)


A            B                        A                          B                         A   B   A


C            D                        C                          D                         C   D


E            F                        E                          F                         E   F   E


             G                                                   G                             G


H            I                        H                           I                        H   I   H




    Uni.lu       © 2012 Cisco and/or its affiliates. All rights reserved.   Unclassified               79
Label encapsulation

                When a packet to is injected in a ring ARC,
          A MPLS label is added to allow forwarding along the ARC
          In ARC, is the destination node in which FEC are defined

 intra label           ring label                            interring label
                                                                                            packet
     ()                    ( )                                     ( )




 ARC to reach the next hop in a Ring
 ARC to reach the next ring
 ARC to reach the destination

 Uni.lu           © 2012 Cisco and/or its affiliates. All rights reserved.   Unclassified            80
Questions?




  Uni.lu   © 2012 Cisco and/or its affiliates. All rights reserved.   Unclassified   81
ARCs and oLAF Algorithm

More Related Content

Recently uploaded

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 

Recently uploaded (20)

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 

Featured

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

ARCs and oLAF Algorithm

  • 1. ARCs Uni.lu, December 2012 Pascal Thubert (Cisco Systems)
  • 2. Agenda ARCs Concept oLAF algorithm Bicasting fArctals Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 2
  • 3. Available Routing Constructs BRKEWN-3012 © 2010 Cisco and/or its affiliates. All rights reserved. Unclassified 3
  • 4. Arc concept Cursor Edge Re C Re Re v v Re v v An Arc is a 2 ended reversible path Edges are directed outwards; links within are reversible An arc is resilient to any link or Junction break by returning links Links are oriented from cursor to edges and returned by moving the cursor. We build Arcs between Safe Nodes Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 4
  • 5. ARC topology ARCs form dual or multi-ended structures • An ARC stitches 2 SPF subpaths together • ARCs + buttressing ARCs = Comb • One cursor per ARC / Comb as the water separation line cursor cursor cursor cursor cursor cursor cursor cursor Omega Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 5
  • 6. Forwarding In normal operations, traffic flows away from the cursor and cascades from ARC to ARC along shortest path cursor cursor cursor cursor cursor cursor cursor cursor Omega Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 6
  • 7. Forwarding errors Are Addressed inside an ARC by returning the incoming link, In order to exit via the other edge of this ARC In control plane, this means that the Cursor is placed at the failure location cursor cursor A cursor cursor B cursor cursor cursor cursor Omega Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 7
  • 8. Double breakage Each ARC is its own domain of fault recovery cursor cursor A cursor cursor B cursor cursor cursor cursor Omega Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 8
  • 9. oLAF BRKEWN-3012 © 2010 Cisco and/or its affiliates. All rights reserved. Unclassified 9
  • 10. Notations for Link types A B A is SPF successor of B A B A is non shortest path successor of B A ?-S B B -> A is unresolved for Safe Node S A Rev B B is standby alternate on A isolation A B Non SPF Link used to join an ARC Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 10
  • 11. LAF (Lowest ARC First) LAF is a SPF variation that creates ARCs by connecting SPF paths - The ARCs include the SPF tree - The algorithm identifies the mono-connected zones - and provides redundancy inside such zones R B D A C K M M L E F J N G H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 11
  • 12. oLAF Example: Initial topology R A B D C K M L E F J N G H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 12
  • 13. Running the modified Algo, Start from R: R o R(A) o R(B) A and B are Heir ?-A t A B Since we have a single root we create virtual roots D C R(A) and R(B) K We note the set dependent on R(A) L as ?-A for E F convenience J N G H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 13
  • 14. Picking A (closest to root), and D, and C: R Then pick ?-A Pick D, A B Pick C, Each time place in ?-A ?-A the parent set D C K L E F J N G H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 14
  • 15. Picking B: R(A) R(B) Pick K, start ?-A ?-B building up B’s A B dependent set ?-A ?-A ?-B D C K M L E F J N G H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 15
  • 16. Picking M and J: R(A) R(B) ?-A ?-B A B ?-A ?-A ?-B D C - The dependent sets grow. K ?-B M L ?-B E F J N G H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 16
  • 17. Running the Algo Picking L and then E: R(A) R(B) ?-A ?-B A B ?-A ?-A ?-B D C K ?-A ?-A ?-B M L ?-B E F J N G H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 17
  • 18. Picking G: R(A) R(B) ?-A ?-B A B ?-A ?-A ?-B D C K ?-A ?-A ?-B M L ?-B E F ?-A J N G H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 18
  • 19. Picking F; F is a Safe node! R(A) R(B) Examining F’s ?-A ?-B neighbors we find J A B that is B-dependent ?-A ?-A ?-B F has 2 non D C congruent path to 2 K Safe Nodes, though ?-A ?-A ?-B virtual this time ?-A M since they are R(A) L ?-B E and R(B) F ?-A J N G H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 19
  • 20. We can form the first infrastructure ARC! R ?-A ?-B We can use F-J to A B tie F’s shortest path to R(A) with J’s ?-A ?-A ?-B shortest path to D C R(B) K ?-A ?-A ?-B ?-A M L ?-B E F ?-A J G H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 20
  • 21. All nodes along the ARC are Safe R A B Nodes along the Rev ARC are placed Rev D C alone in there own dependent set K (not represented) Rev M Rev All other nodes are L E F returned to the Rev original set J N G H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 21
  • 22. Next is D R A B - D depends on A ?-A Rev - D can reach C Rev D C which is in another set K Rev M L Rev E F Rev J N G H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 22
  • 23. D is a collapsed ARC R A B D’s parent A and Rev D’s preferred Rev D C neighbor C are both Safe Nodes K Rev M L Rev E F Rev J N G H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 23
  • 24. Next is M R A B - Same goes for M Rev Rev D C K Rev ?-K M L Rev E F Rev J N G H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 24
  • 25. M is a collapsed ARC R A B Rev Rev D C K Rev M L Rev E F Rev J N G H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 25
  • 26. Picking L R A B All depend on D at Rev this point Rev D C K ?-D Rev M L Rev E F Rev J N G H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 26
  • 27. Picking E R A B All depend on D at Rev this point Rev D C K ?-D ?-D Rev M L Rev E F Rev J N G H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 27
  • 28. E has links to C and F R A B E has links that end Rev deeper than D’s Rev D C collapsed ARC K ?-D ?-D Rev M L Rev E F Rev J N G H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 28
  • 29. E adds a buttressing ARC R A B We can form a Rev buttressing ARC Rev D C keeping E’s links that end deeper K than D’s collapsed Rev Rev ARC M L Rev E E->D becomes this F Rev reversible J L returns to the set N G H I D being the Cursor of the origin ARC is cursor for the Comb Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 29
  • 30. Picking L R A B L forms its own Rev collapsed ARC Rev D C K ?-D Rev Rev M L Rev E F Rev J N G H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 30
  • 31. Picking N R A B Rev Rev D C K Rev Rev M L Rev E F Rev ?-A J N G H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 31
  • 32. Picking G R A B Rev Rev D C K Rev Rev M L Rev E F Rev ?-A ?-E J N G H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 32
  • 33. Picking H R A B Rev Rev D C K Rev Rev M L Rev E F Rev ?-A ?-E ?-E J N G H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 33
  • 34. H adds a buttressing ARC R A B Rev Rev D C K Rev Rev M L Rev E F Rev Rev J N G H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 34
  • 35. Picking N and G again R A B Rev Rev D C K Rev Rev M L Rev E F Rev ?-A ?-E Rev J N G H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 35
  • 36. Picking N again R A B Rev Rev D C K Rev Rev M L Rev E F Rev ?-A Rev J N G H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 36
  • 37. Picking N again and then I R A B We’re done with the Rev set Rev D C N is still dependent K Rev N’s subgraph is Rev M monoconnected L Rev E F If N has a Rev ?-A Rev dependent set we J run the algorithm in N G that set using N as H I root. Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 37
  • 38. Original Graph and Classical rev-SPF R R A B A B D C D C K K M M L E L E F F J J N G N G H H I I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 38
  • 39. Original Graph and SPF-based DAG R R A B A B D C D C K K M M L E L E F F J J N G N G H H I I Only 3 nodes are Safe but in all cases packet end in Single point of failure waterbasins Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 39
  • 40. Original Graph and resulting construct R R A B A B Rev Rev D C D C K K Rev Rev M M Rev L E L E F F Rev Rev J J N G N G H H I I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 40
  • 41. Constructed ARCs R B D A C K M L E F J N G H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 41
  • 42. Bicasting BRKEWN-3012 © 2010 Cisco and/or its affiliates. All rights reserved. Unclassified 42
  • 43. Adding Bicasting to ARCs Re C Re Re v v Re v v A concept of Left and Right is introduced. Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 43
  • 44. Building L/R indicators When an ARC is formed, each end is associated to a side. At least one Right (green) and one Left (orange) per ARC cursor cursor cursor cursor cursor cursor cursor cursor H1 H2 H3 H4 H5 H6 Omega Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 44
  • 45. Building L/R indicators (cont’d) Nodes between cursor and edge are associated to the edge side For an edge ending at Omega, the association is free form cursor cursor cursor cursor cursor cursor cursor cursor H1 H2 H3 H4 H5 H6 Omega Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 45
  • 46. Building L/R indicators (cont’d) For and ARC ending in another ARC, the end is associated to the same heir as the node the ARC exits into. This keeps ARC bicasting routes close to shortest path. cursor cursor cursor cursor cursor cursor cursor cursor H1 H2 H3 H4 H5 H6 Omega Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 46
  • 47. Building L/R indicators (cont’d) In case of collision (both ends of an ARC select the same heir) • One end picks that heir (shortest path) • The other picks the heir of the other end of the ARC it falls into cursor cursor cursor cursor cursor cursor cursor cursor H1 H2 H3 H4 H5 H6 Omega Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 47
  • 48. Bicasted routing (ex) 2 packet copies are colored by the colors of the ARC through which the original packet is injected Packet copies exit ARCs by the the edge corresponding to their color. Below, the black path is shortest whereas the orange and green paths are Left and Right paths (via H2 and H6) cursor cursor A cursor cursor B cursor cursor cursor cursor H2 H6 Omega Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 48
  • 49. Bicasted routing (2nd ex) L/R Packets are routed away along there E/W tag, => independent of the cursor. L/R tagging is used to prevent re-U-turning in a same ARC. cursor cursor A cursor cursor B cursor cursor cursor cursor H2 H5 Omega Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 49
  • 50. Bicasted routing (2nd, with breakage) E/W Packets are routed away along there E/W tag, => independent of the cursor. E/W tagging is used to prevent re-U-turning in a same ARC. cursor cursor A cursor cursor B cursor cursor cursor cursor Omega Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 50
  • 51. Bicasted reservation (ex) Reservation Packets are routed away along there E/W tag, For traffic coming back from root (bi-casted, in red) Collisions are identified and resolved (next slides) cursor cursor A cursor cursor B cursor cursor cursor cursor Omega Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 51
  • 52. Collision type 1 Reservation Packets cross in a same arc from different entry points Resolution is to prune cross-forwarding along the ARC Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 52
  • 53. Collision type 2 Reservation Packets enter a same arc at a same entry point This means an incoming ARC faced a coloring collision (orange below) Resolution is to return the second reservation packet along its ARC And prune the u-turn path. Say orange arrived first; green is sent back. Coloring collision: ends in orange but cannot be orange cursor Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 53
  • 54. Collision type 2 (cont’d) The returned reservation packet arrives on the other end with the wrong color for that end, which is also the color of the other end. If the packet cannot be forwarded with its original color it is recolored to any color but that of its copy. Returning the packet for a collision is equivalent to a breakage or a missing link if the graph is not biconnected. cursor cursor cursor Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 54
  • 55. Collision type 2 (alt) Resolution is still to return the second reservation along its ARC And prune the u-turn path. Say orange arrived last and is sent back. In this example the orange packet does not need to be recolored at the other end since that terminates in an ARC that has an orange end. cursor Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 55
  • 56. Collision type 2 (alt cont’d) Now we are back to a collision of type 1 which is resolved by pruning opposite paths along the ARC Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 56
  • 57. fArctals BRKEWN-3012 © 2010 Cisco and/or its affiliates. All rights reserved. Unclassified 57
  • 58. Laying labels. We lay omega ( labels for a destination at the level of the DODAG of ARCs Within an ARC, the omega label is encapsulated in a lambda ( label path that describes the ARC and is independant of the destination. The lambda label is semected and pushed at the ARC ingress and popped Lambda at the ARC egress labels switched path along an ARC in both dir. Inner omega label pops for DODAG level switching Destination Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 58
  • 59. Main labels along an ARC Cursor Junction edge Junction 3 Exit node 2 4 Re C Re 1 Re B v v C Re v 2 3 v A D 13 1 4 21 12 Intermediate Junction We build to Label switch paths along an arc Left to Right (dark blue) and Right to Left (dark red) labels are classical MPLS labels Note the A edge node is selecting one of its exit to build a LSP, this selection could be balanced upon Omega labels Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 59
  • 60. Backup labels along an ARC Cursor Junction edge Junction 3bis Exit node 2bis 4bis Re C Re 1bis Re B v v C Re v 2bis 3bis v A D 13 1bis 4bis 21 12 Intermediate Junction We build to backup Label switch paths along an arc Left to Right (light red, backup of red) and Right to Left (light blue) labels are classical MPLS labels The light label paths are fast reroute backup for the dark labels The light labels do not have back ups Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 60
  • 61. Hierachical Drawing of ARCs in a Ring topology Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 61
  • 62. Drawing ARCs between rings We start with a ring topology where rings are interconnected at intersections points (themselves maybe quite complex inside for redundancy) Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 62
  • 63. Hierarchical ARC computation in rings (cont’d) The Interconnection type (simple, double or more intersections) does not matter at this level of the hierarchy. All that counts is whether rings connect Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 63
  • 64. Hierarchical ARC computation in rings (cont’d) Each ring is abstracted as a virtual supernode and a ring connection is abstracted as a link in the super topology. Complex connection points can be itemized at that level as well Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 64
  • 65. Computing the Omega label Path R destination A B ring D C K M L E connection F between rings J M G H I To reach a destination R we compute an ARC set over the super topology. Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 65
  • 66. Result of the OLAF algorithm: R R A B A B Rev Rev D C D C K K Rev M M L Rev E Rev L E F F Rev J J N G Rev N G H I H I DAG visualization == ARC visualization Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 66
  • 67. (Alt) Result of the COMB algorithm: R R A B A B Rev Rev D C D C K K Rev Rev M M L Rev L E F E F Rev Rev J J N G N G I H Rev I H Buttressing ARC links  Comb vizualization Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 67
  • 68. Computing Omega Labels Now we have computed an omega R ARC set to destination R. In a Ring, this determines the egresses and the A B cursor location Again we can lay 4 Omega Labels D per Omega ARC. Omega labels are C per destination but not processed K within the rings M Note that for Combs, the labels follow L E F the labyrinth logic (Combs and comb path are discussed in another paper) J Omega Labels are switched at the N G I connection points. They are invisible H within the Rings (they are encapsulated in lambda labels). Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 68
  • 69. Omega level ARC (in ARC set of rings) C D Cbis E B Bbis Abis Dbis B C A D a Cbis Dbis f b Bbis Ebis a c f b c Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 69
  • 70. Drawing ARCs within a ring (simple connection) When a Ring has a simple connection to another we draw a single ARC that goes around this ring to reach the other on both side of the connection Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 70
  • 71. Olympic style rings Olympic style rings have a two intersection to one another so we draw a pair of ARCs that interconnect the connection points that lead to the next ring Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 71
  • 72. Multiple interconnections We draw ARCs between contiguous intersection with another ring. Each ARC is a redundant path to that next ring Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 72
  • 73. Label encapsulation When a packet to is injected in a ring ARC, A MPLS label is added to allow forwarding along the ARC In ARC, is the destination node in which FEC are defined ARC label FEC label packet ( ) ( ) A table indicates the preferred and the backup labels along the ARC The preferred is the one that goes away from the cursor Incoming label Preferred switched L label Backup switched label Rbis Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 73
  • 74. In infrastructure Junction e.g. B B A Cbis Bbis Incoming label B Bbis Bbis B Preferred switch label A Abis Cbis B Encapsulating ARC Alternate label Bbis N/A N/A Bbis Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 74
  • 75. Operation in infra junction ring Incoming label B Bbis Bbis B Preferred switch label A Abis Cbis B Encapsulating ARC Alternate label Bbis N/A N/A Bbis • Packet incoming Ring with label B. • Table indicates to encaps in ARC towards A’s intersections • A Label is added to forward the packet away from cursor • Say the ARC is broken in that direction • is switch to bis to follow the backup label path towards the other edge • Say the ARC is broken there too. bis has no backup so it is popped • Thus forwarding over to A is broken. A is switched to alternate Bbis • Packet now follows ARC towards ring C over the backup LSP Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 75
  • 76. In edge Junction e.g. A a c b Incoming label A abis bbis cbis Preferred switch label a b c Abis Encapsulating ARC Alternate label abis bbis cbis Bbis Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 76
  • 77. Operation in edge Junction Incoming label A abis bbis cbis Preferred switch label a b c Abis Encapsulating ARC Alternate label abis bbis cbis Bbis • Packet incoming Ring with label A. • Table indicates to encaps in ARC towards a’s intersections • A Label is added to forward the packet away from cursor • Say the ARC is broken in that direction • is switch to bis to follow the backup label path towards the other edge • Say the ARC is broken there too. bis has no backup so it is popped • Thus forwarding over to a is broken. a is switched to alternate abis • Packet now follows ARC towards ring b over • All possible exits a, b, c are tried and if all fail packet goes back to B Uni.lu Unclassified © 2012 Cisco and/or its affiliates. All rights reserved. 77
  • 78. Parallel rings B A B A D C D C E F E H F G G I H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 78
  • 79. Parallel rings (cont’d) A B A B A B A C D C D C D E F E F E F E G G G H I H I H I H Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 79
  • 80. Label encapsulation When a packet to is injected in a ring ARC, A MPLS label is added to allow forwarding along the ARC In ARC, is the destination node in which FEC are defined intra label ring label interring label packet () ( ) ( ) ARC to reach the next hop in a Ring ARC to reach the next ring ARC to reach the destination Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 80
  • 81. Questions? Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 81