Submit Search
Upload
ARCs and oLAF Algorithm
•
Download as PPTX, PDF
•
0 likes
•
350 views
AI-enhanced title
Pascal Thubert
Follow
Presentation on ARC at University of Luxembourg
Read less
Read more
Technology
Report
Share
Report
Share
1 of 82
Download now
Recommended
Rpl telecom bretagne
Rpl telecom bretagne
Pascal Thubert
Luxbg fringe
Luxbg fringe
Pascal Thubert
6TiSCH @Telecom Bretagne 2015
6TiSCH @Telecom Bretagne 2015
Pascal Thubert
6 tsch orlando
6 tsch orlando
Pascal Thubert
Carte mentale structure d'un rapport pfe v2
Carte mentale structure d'un rapport pfe v2
Dr, Noureddine IDBOUFKER
6TiSCH + RPL @ Telecom Bretagne 2014
6TiSCH + RPL @ Telecom Bretagne 2014
Pascal Thubert
Carte mentale du cours qualité de servie ip
Carte mentale du cours qualité de servie ip
Dr, Noureddine IDBOUFKER
Slide RPL- Routing Protocol for Loossy and Low-power LLNs
Slide RPL- Routing Protocol for Loossy and Low-power LLNs
Quang Do
Recommended
Rpl telecom bretagne
Rpl telecom bretagne
Pascal Thubert
Luxbg fringe
Luxbg fringe
Pascal Thubert
6TiSCH @Telecom Bretagne 2015
6TiSCH @Telecom Bretagne 2015
Pascal Thubert
6 tsch orlando
6 tsch orlando
Pascal Thubert
Carte mentale structure d'un rapport pfe v2
Carte mentale structure d'un rapport pfe v2
Dr, Noureddine IDBOUFKER
6TiSCH + RPL @ Telecom Bretagne 2014
6TiSCH + RPL @ Telecom Bretagne 2014
Pascal Thubert
Carte mentale du cours qualité de servie ip
Carte mentale du cours qualité de servie ip
Dr, Noureddine IDBOUFKER
Slide RPL- Routing Protocol for Loossy and Low-power LLNs
Slide RPL- Routing Protocol for Loossy and Low-power LLNs
Quang Do
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
Hervé Boutemy
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
gvaughan
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
2toLead Limited
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
Nicole Novielli
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
Stephanie Beckett
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
BookNet Canada
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
Fwdays
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
ScyllaDB
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
Alan Dix
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
Rick Flair
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
MounikaPolabathina
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
UiPathCommunity
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
BkGupta21
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
Fwdays
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Mark Simos
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
LoriGlavin3
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
hariprasad279825
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
LoriGlavin3
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
Lonnie McRorey
2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
Marius Sescu
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
Expeed Software
More Related Content
Recently uploaded
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
Hervé Boutemy
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
gvaughan
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
2toLead Limited
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
Nicole Novielli
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
Stephanie Beckett
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
BookNet Canada
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
Fwdays
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
ScyllaDB
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
Alan Dix
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
Rick Flair
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
MounikaPolabathina
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
UiPathCommunity
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
BkGupta21
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
Fwdays
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Mark Simos
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
LoriGlavin3
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
hariprasad279825
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
LoriGlavin3
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
Lonnie McRorey
Recently uploaded
(20)
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
Featured
2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
Marius Sescu
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
Expeed Software
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
Pixeldarts
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
marketingartwork
Skeleton Culture Code
Skeleton Culture Code
Skeleton Technologies
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
Neil Kimberley
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
contently
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
Albert Qian
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
Search Engine Journal
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
SpeakerHub
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
Clark Boyd
Getting into the tech field. what next
Getting into the tech field. what next
Tessa Mero
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Lily Ray
How to have difficult conversations
How to have difficult conversations
Rajiv Jayarajah, MAppComm, ACC
Introduction to Data Science
Introduction to Data Science
Christy Abraham Joy
Time Management & Productivity - Best Practices
Time Management & Productivity - Best Practices
Vit Horky
The six step guide to practical project management
The six step guide to practical project management
MindGenius
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
RachelPearson36
Featured
(20)
2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
Skeleton Culture Code
Skeleton Culture Code
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
Getting into the tech field. what next
Getting into the tech field. what next
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
How to have difficult conversations
How to have difficult conversations
Introduction to Data Science
Introduction to Data Science
Time Management & Productivity - Best Practices
Time Management & Productivity - Best Practices
The six step guide to practical project management
The six step guide to practical project management
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
ARCs and oLAF Algorithm
1.
ARCs Uni.lu, December 2012
Pascal Thubert (Cisco Systems)
2.
Agenda ARCs Concept oLAF algorithm Bicasting fArctals
Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 2
3.
Available Routing Constructs BRKEWN-3012
© 2010 Cisco and/or its affiliates. All rights reserved. Unclassified 3
4.
Arc concept
Cursor Edge Re C Re Re v v Re v v An Arc is a 2 ended reversible path Edges are directed outwards; links within are reversible An arc is resilient to any link or Junction break by returning links Links are oriented from cursor to edges and returned by moving the cursor. We build Arcs between Safe Nodes Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 4
5.
ARC topology
ARCs form dual or multi-ended structures • An ARC stitches 2 SPF subpaths together • ARCs + buttressing ARCs = Comb • One cursor per ARC / Comb as the water separation line cursor cursor cursor cursor cursor cursor cursor cursor Omega Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 5
6.
Forwarding
In normal operations, traffic flows away from the cursor and cascades from ARC to ARC along shortest path cursor cursor cursor cursor cursor cursor cursor cursor Omega Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 6
7.
Forwarding errors Are Addressed
inside an ARC by returning the incoming link, In order to exit via the other edge of this ARC In control plane, this means that the Cursor is placed at the failure location cursor cursor A cursor cursor B cursor cursor cursor cursor Omega Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 7
8.
Double breakage Each ARC
is its own domain of fault recovery cursor cursor A cursor cursor B cursor cursor cursor cursor Omega Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 8
9.
oLAF BRKEWN-3012
© 2010 Cisco and/or its affiliates. All rights reserved. Unclassified 9
10.
Notations for Link
types A B A is SPF successor of B A B A is non shortest path successor of B A ?-S B B -> A is unresolved for Safe Node S A Rev B B is standby alternate on A isolation A B Non SPF Link used to join an ARC Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 10
11.
LAF (Lowest ARC
First) LAF is a SPF variation that creates ARCs by connecting SPF paths - The ARCs include the SPF tree - The algorithm identifies the mono-connected zones - and provides redundancy inside such zones R B D A C K M M L E F J N G H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 11
12.
oLAF Example: Initial
topology R A B D C K M L E F J N G H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 12
13.
Running the modified
Algo, Start from R: R o R(A) o R(B) A and B are Heir ?-A t A B Since we have a single root we create virtual roots D C R(A) and R(B) K We note the set dependent on R(A) L as ?-A for E F convenience J N G H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 13
14.
Picking A (closest
to root), and D, and C: R Then pick ?-A Pick D, A B Pick C, Each time place in ?-A ?-A the parent set D C K L E F J N G H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 14
15.
Picking B:
R(A) R(B) Pick K, start ?-A ?-B building up B’s A B dependent set ?-A ?-A ?-B D C K M L E F J N G H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 15
16.
Picking M and
J: R(A) R(B) ?-A ?-B A B ?-A ?-A ?-B D C - The dependent sets grow. K ?-B M L ?-B E F J N G H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 16
17.
Running the Algo Picking
L and then E: R(A) R(B) ?-A ?-B A B ?-A ?-A ?-B D C K ?-A ?-A ?-B M L ?-B E F J N G H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 17
18.
Picking G:
R(A) R(B) ?-A ?-B A B ?-A ?-A ?-B D C K ?-A ?-A ?-B M L ?-B E F ?-A J N G H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 18
19.
Picking F; F
is a Safe node! R(A) R(B) Examining F’s ?-A ?-B neighbors we find J A B that is B-dependent ?-A ?-A ?-B F has 2 non D C congruent path to 2 K Safe Nodes, though ?-A ?-A ?-B virtual this time ?-A M since they are R(A) L ?-B E and R(B) F ?-A J N G H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 19
20.
We can form
the first infrastructure ARC! R ?-A ?-B We can use F-J to A B tie F’s shortest path to R(A) with J’s ?-A ?-A ?-B shortest path to D C R(B) K ?-A ?-A ?-B ?-A M L ?-B E F ?-A J G H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 20
21.
All nodes along
the ARC are Safe R A B Nodes along the Rev ARC are placed Rev D C alone in there own dependent set K (not represented) Rev M Rev All other nodes are L E F returned to the Rev original set J N G H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 21
22.
Next is D
R A B - D depends on A ?-A Rev - D can reach C Rev D C which is in another set K Rev M L Rev E F Rev J N G H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 22
23.
D is a
collapsed ARC R A B D’s parent A and Rev D’s preferred Rev D C neighbor C are both Safe Nodes K Rev M L Rev E F Rev J N G H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 23
24.
Next is M
R A B - Same goes for M Rev Rev D C K Rev ?-K M L Rev E F Rev J N G H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 24
25.
M is a
collapsed ARC R A B Rev Rev D C K Rev M L Rev E F Rev J N G H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 25
26.
Picking L
R A B All depend on D at Rev this point Rev D C K ?-D Rev M L Rev E F Rev J N G H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 26
27.
Picking E
R A B All depend on D at Rev this point Rev D C K ?-D ?-D Rev M L Rev E F Rev J N G H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 27
28.
E has links
to C and F R A B E has links that end Rev deeper than D’s Rev D C collapsed ARC K ?-D ?-D Rev M L Rev E F Rev J N G H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 28
29.
E adds a
buttressing ARC R A B We can form a Rev buttressing ARC Rev D C keeping E’s links that end deeper K than D’s collapsed Rev Rev ARC M L Rev E E->D becomes this F Rev reversible J L returns to the set N G H I D being the Cursor of the origin ARC is cursor for the Comb Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 29
30.
Picking L
R A B L forms its own Rev collapsed ARC Rev D C K ?-D Rev Rev M L Rev E F Rev J N G H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 30
31.
Picking N
R A B Rev Rev D C K Rev Rev M L Rev E F Rev ?-A J N G H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 31
32.
Picking G
R A B Rev Rev D C K Rev Rev M L Rev E F Rev ?-A ?-E J N G H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 32
33.
Picking H
R A B Rev Rev D C K Rev Rev M L Rev E F Rev ?-A ?-E ?-E J N G H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 33
34.
H adds a
buttressing ARC R A B Rev Rev D C K Rev Rev M L Rev E F Rev Rev J N G H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 34
35.
Picking N and
G again R A B Rev Rev D C K Rev Rev M L Rev E F Rev ?-A ?-E Rev J N G H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 35
36.
Picking N again
R A B Rev Rev D C K Rev Rev M L Rev E F Rev ?-A Rev J N G H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 36
37.
Picking N again
and then I R A B We’re done with the Rev set Rev D C N is still dependent K Rev N’s subgraph is Rev M monoconnected L Rev E F If N has a Rev ?-A Rev dependent set we J run the algorithm in N G that set using N as H I root. Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 37
38.
Original Graph and
Classical rev-SPF R R A B A B D C D C K K M M L E L E F F J J N G N G H H I I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 38
39.
Original Graph and
SPF-based DAG R R A B A B D C D C K K M M L E L E F F J J N G N G H H I I Only 3 nodes are Safe but in all cases packet end in Single point of failure waterbasins Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 39
40.
Original Graph and
resulting construct R R A B A B Rev Rev D C D C K K Rev Rev M M Rev L E L E F F Rev Rev J J N G N G H H I I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 40
41.
Constructed ARCs
R B D A C K M L E F J N G H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 41
42.
Bicasting BRKEWN-3012
© 2010 Cisco and/or its affiliates. All rights reserved. Unclassified 42
43.
Adding Bicasting to
ARCs Re C Re Re v v Re v v A concept of Left and Right is introduced. Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 43
44.
Building L/R indicators
When an ARC is formed, each end is associated to a side. At least one Right (green) and one Left (orange) per ARC cursor cursor cursor cursor cursor cursor cursor cursor H1 H2 H3 H4 H5 H6 Omega Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 44
45.
Building L/R indicators
(cont’d) Nodes between cursor and edge are associated to the edge side For an edge ending at Omega, the association is free form cursor cursor cursor cursor cursor cursor cursor cursor H1 H2 H3 H4 H5 H6 Omega Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 45
46.
Building L/R indicators
(cont’d) For and ARC ending in another ARC, the end is associated to the same heir as the node the ARC exits into. This keeps ARC bicasting routes close to shortest path. cursor cursor cursor cursor cursor cursor cursor cursor H1 H2 H3 H4 H5 H6 Omega Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 46
47.
Building L/R indicators
(cont’d) In case of collision (both ends of an ARC select the same heir) • One end picks that heir (shortest path) • The other picks the heir of the other end of the ARC it falls into cursor cursor cursor cursor cursor cursor cursor cursor H1 H2 H3 H4 H5 H6 Omega Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 47
48.
Bicasted routing (ex)
2 packet copies are colored by the colors of the ARC through which the original packet is injected Packet copies exit ARCs by the the edge corresponding to their color. Below, the black path is shortest whereas the orange and green paths are Left and Right paths (via H2 and H6) cursor cursor A cursor cursor B cursor cursor cursor cursor H2 H6 Omega Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 48
49.
Bicasted routing (2nd
ex) L/R Packets are routed away along there E/W tag, => independent of the cursor. L/R tagging is used to prevent re-U-turning in a same ARC. cursor cursor A cursor cursor B cursor cursor cursor cursor H2 H5 Omega Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 49
50.
Bicasted routing (2nd,
with breakage) E/W Packets are routed away along there E/W tag, => independent of the cursor. E/W tagging is used to prevent re-U-turning in a same ARC. cursor cursor A cursor cursor B cursor cursor cursor cursor Omega Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 50
51.
Bicasted reservation (ex)
Reservation Packets are routed away along there E/W tag, For traffic coming back from root (bi-casted, in red) Collisions are identified and resolved (next slides) cursor cursor A cursor cursor B cursor cursor cursor cursor Omega Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 51
52.
Collision type 1
Reservation Packets cross in a same arc from different entry points Resolution is to prune cross-forwarding along the ARC Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 52
53.
Collision type 2
Reservation Packets enter a same arc at a same entry point This means an incoming ARC faced a coloring collision (orange below) Resolution is to return the second reservation packet along its ARC And prune the u-turn path. Say orange arrived first; green is sent back. Coloring collision: ends in orange but cannot be orange cursor Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 53
54.
Collision type 2
(cont’d) The returned reservation packet arrives on the other end with the wrong color for that end, which is also the color of the other end. If the packet cannot be forwarded with its original color it is recolored to any color but that of its copy. Returning the packet for a collision is equivalent to a breakage or a missing link if the graph is not biconnected. cursor cursor cursor Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 54
55.
Collision type 2
(alt) Resolution is still to return the second reservation along its ARC And prune the u-turn path. Say orange arrived last and is sent back. In this example the orange packet does not need to be recolored at the other end since that terminates in an ARC that has an orange end. cursor Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 55
56.
Collision type 2
(alt cont’d) Now we are back to a collision of type 1 which is resolved by pruning opposite paths along the ARC Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 56
57.
fArctals BRKEWN-3012
© 2010 Cisco and/or its affiliates. All rights reserved. Unclassified 57
58.
Laying labels. We lay
omega ( labels for a destination at the level of the DODAG of ARCs Within an ARC, the omega label is encapsulated in a lambda ( label path that describes the ARC and is independant of the destination. The lambda label is semected and pushed at the ARC ingress and popped Lambda at the ARC egress labels switched path along an ARC in both dir. Inner omega label pops for DODAG level switching Destination Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 58
59.
Main labels along
an ARC Cursor Junction edge Junction 3 Exit node 2 4 Re C Re 1 Re B v v C Re v 2 3 v A D 13 1 4 21 12 Intermediate Junction We build to Label switch paths along an arc Left to Right (dark blue) and Right to Left (dark red) labels are classical MPLS labels Note the A edge node is selecting one of its exit to build a LSP, this selection could be balanced upon Omega labels Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 59
60.
Backup labels along
an ARC Cursor Junction edge Junction 3bis Exit node 2bis 4bis Re C Re 1bis Re B v v C Re v 2bis 3bis v A D 13 1bis 4bis 21 12 Intermediate Junction We build to backup Label switch paths along an arc Left to Right (light red, backup of red) and Right to Left (light blue) labels are classical MPLS labels The light label paths are fast reroute backup for the dark labels The light labels do not have back ups Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 60
61.
Hierachical Drawing of
ARCs in a Ring topology Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 61
62.
Drawing ARCs between
rings We start with a ring topology where rings are interconnected at intersections points (themselves maybe quite complex inside for redundancy) Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 62
63.
Hierarchical ARC computation
in rings (cont’d) The Interconnection type (simple, double or more intersections) does not matter at this level of the hierarchy. All that counts is whether rings connect Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 63
64.
Hierarchical ARC computation
in rings (cont’d) Each ring is abstracted as a virtual supernode and a ring connection is abstracted as a link in the super topology. Complex connection points can be itemized at that level as well Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 64
65.
Computing the Omega
label Path R destination A B ring D C K M L E connection F between rings J M G H I To reach a destination R we compute an ARC set over the super topology. Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 65
66.
Result of the
OLAF algorithm: R R A B A B Rev Rev D C D C K K Rev M M L Rev E Rev L E F F Rev J J N G Rev N G H I H I DAG visualization == ARC visualization Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 66
67.
(Alt) Result of
the COMB algorithm: R R A B A B Rev Rev D C D C K K Rev Rev M M L Rev L E F E F Rev Rev J J N G N G I H Rev I H Buttressing ARC links Comb vizualization Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 67
68.
Computing Omega Labels Now
we have computed an omega R ARC set to destination R. In a Ring, this determines the egresses and the A B cursor location Again we can lay 4 Omega Labels D per Omega ARC. Omega labels are C per destination but not processed K within the rings M Note that for Combs, the labels follow L E F the labyrinth logic (Combs and comb path are discussed in another paper) J Omega Labels are switched at the N G I connection points. They are invisible H within the Rings (they are encapsulated in lambda labels). Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 68
69.
Omega level ARC
(in ARC set of rings) C D Cbis E B Bbis Abis Dbis B C A D a Cbis Dbis f b Bbis Ebis a c f b c Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 69
70.
Drawing ARCs within
a ring (simple connection) When a Ring has a simple connection to another we draw a single ARC that goes around this ring to reach the other on both side of the connection Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 70
71.
Olympic style rings Olympic
style rings have a two intersection to one another so we draw a pair of ARCs that interconnect the connection points that lead to the next ring Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 71
72.
Multiple interconnections We draw
ARCs between contiguous intersection with another ring. Each ARC is a redundant path to that next ring Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 72
73.
Label encapsulation
When a packet to is injected in a ring ARC, A MPLS label is added to allow forwarding along the ARC In ARC, is the destination node in which FEC are defined ARC label FEC label packet ( ) ( ) A table indicates the preferred and the backup labels along the ARC The preferred is the one that goes away from the cursor Incoming label Preferred switched L label Backup switched label Rbis Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 73
74.
In infrastructure Junction
e.g. B B A Cbis Bbis Incoming label B Bbis Bbis B Preferred switch label A Abis Cbis B Encapsulating ARC Alternate label Bbis N/A N/A Bbis Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 74
75.
Operation in infra
junction ring Incoming label B Bbis Bbis B Preferred switch label A Abis Cbis B Encapsulating ARC Alternate label Bbis N/A N/A Bbis • Packet incoming Ring with label B. • Table indicates to encaps in ARC towards A’s intersections • A Label is added to forward the packet away from cursor • Say the ARC is broken in that direction • is switch to bis to follow the backup label path towards the other edge • Say the ARC is broken there too. bis has no backup so it is popped • Thus forwarding over to A is broken. A is switched to alternate Bbis • Packet now follows ARC towards ring C over the backup LSP Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 75
76.
In edge Junction
e.g. A a c b Incoming label A abis bbis cbis Preferred switch label a b c Abis Encapsulating ARC Alternate label abis bbis cbis Bbis Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 76
77.
Operation in edge
Junction Incoming label A abis bbis cbis Preferred switch label a b c Abis Encapsulating ARC Alternate label abis bbis cbis Bbis • Packet incoming Ring with label A. • Table indicates to encaps in ARC towards a’s intersections • A Label is added to forward the packet away from cursor • Say the ARC is broken in that direction • is switch to bis to follow the backup label path towards the other edge • Say the ARC is broken there too. bis has no backup so it is popped • Thus forwarding over to a is broken. a is switched to alternate abis • Packet now follows ARC towards ring b over • All possible exits a, b, c are tried and if all fail packet goes back to B Uni.lu Unclassified © 2012 Cisco and/or its affiliates. All rights reserved. 77
78.
Parallel rings
B A B A D C D C E F E H F G G I H I Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 78
79.
Parallel rings (cont’d) A
B A B A B A C D C D C D E F E F E F E G G G H I H I H I H Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 79
80.
Label encapsulation
When a packet to is injected in a ring ARC, A MPLS label is added to allow forwarding along the ARC In ARC, is the destination node in which FEC are defined intra label ring label interring label packet () ( ) ( ) ARC to reach the next hop in a Ring ARC to reach the next ring ARC to reach the destination Uni.lu © 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 80
81.
Questions? Uni.lu
© 2012 Cisco and/or its affiliates. All rights reserved. Unclassified 81
Download now