40 research outputs found

    NETWORK PROGRAMMING FOR PERFORMANCE AND LIVENESS MONITORING IN SEGMENT ROUTING NETWORKS

    Get PDF
    Techniques are described herein to define network programming functions for performance and liveness monitoring in Segment Routing (SR) and SRv6 networks. The network programming functions enable probe messages to run at significantly faster rates as punting probe messages to the control plane (slow path processing) and re-injecting them are not required. This enables hardware offloading for Performance Measurement (PM) sessions as well with liveness and PM probes combined. Network programming labels may be allocated from the global SR Global Block (SRGB) for SR Multiprotocol Label Switching (SR-MPLS) by a Software Defined Networking (SDN) controller. END functions are defined for SRv6 for performance delay, loss and liveness monitoring

    ASIC-FRIENDLY SRV6-BASED SD-WAN SERVICE THEFT PREVENTION MECHANISM

    Get PDF
    Presented herein is a security mechanism that prevents service theft with software-defined networking in a wide area network (SD-WAN) services provided with Segment Routing over IPv6 dataplane (SRv6). The security mechanism described herein is valid in SRv6 deployments, but also provides line-rate security at PEs that do not have dedicated crypto-hardware

    SDN Architecture and Southbound APIs for IPv6 Segment Routing Enabled Wide Area Networks

    Full text link
    The SRv6 architecture (Segment Routing based on IPv6 data plane) is a promising solution to support services like Traffic Engineering, Service Function Chaining and Virtual Private Networks in IPv6 backbones and datacenters. The SRv6 architecture has interesting scalability properties as it reduces the amount of state information that needs to be configured in the nodes to support the network services. In this paper, we describe the advantages of complementing the SRv6 technology with an SDN based approach in backbone networks. We discuss the architecture of a SRv6 enabled network based on Linux nodes. In addition, we present the design and implementation of the Southbound API between the SDN controller and the SRv6 device. We have defined a data-model and four different implementations of the API, respectively based on gRPC, REST, NETCONF and remote Command Line Interface (CLI). Since it is important to support both the development and testing aspects we have realized an Intent based emulation system to build realistic and reproducible experiments. This collection of tools automate most of the configuration aspects relieving the experimenter from a significant effort. Finally, we have realized an evaluation of some performance aspects of our architecture and of the different variants of the Southbound APIs and we have analyzed the effects of the configuration updates in the SRv6 enabled nodes

    AN ADOPTIVE AND RESILIENT SEGMENT ROUTING VERSION 6 POLICY TO ADDRESS TIGHT SERVICE LEVEL AGREEMENT REQUIREMENTS IN 5G NETWORKS

    Get PDF
    There is ongoing work positioning Segment Routing version 6 (SRv6) as a replacement to General Packet Radio Service (GPRS) Tunneling Protocol User Plane (GTP-U). The main benefits of using SRv6 include coupling of the mobility overlay with the underlay (transport Traffic Engineering (TE)) and service chaining (GiLAN) and reusing high performance routers with SRv6 capabilities as User Plane Functions (UPFs). Techniques are described herein for enabling the creation of specific network slices where in the underlay a high resiliency is achieved with zero packet loss for tight Service Level Agreement (SLA) enterprise premium traffic. This same mechanism may be reused for path monitoring (e.g., latency, jitter, etc.) using in-band mechanisms for Ultra-Reliable Low Latency Communications (URLLC)

    STRUCTURED FLOW LABEL

    Get PDF
    This proposal provides a technique to restructure a Flow Label into 4-bits of per‑flow flags and 16-bits of entropy within controlled domains. In various implementations, the flags may be used for performance information, Operations, Administration, and Maintenance (OAM), or the like. This proposal may allow providing a premium service on top of Internet Protocol version 6 (IPv6)

    BORDER GATEWAY PROTOCOL NETWORK LAYER REACHABILITY INFORMATION NON-KEY DATA EXCHANGE

    Get PDF
    Techniques are described herein for encoding non-key data along with each Network Layer Reachability Information (NLRI) packed in a Border Gateway Protocol (BGP) Update message. This may be useful to increase the NLRI packing efficiency of the Update message when the NLRIs have unique path information associated therewith, or when only a subset of NLRIs have some path information associated therewith. A number of use cases may be employed to take advantage of this mechanism

    Segment Routing: a Comprehensive Survey of Research Activities, Standardization Efforts and Implementation Results

    Full text link
    Fixed and mobile telecom operators, enterprise network operators and cloud providers strive to face the challenging demands coming from the evolution of IP networks (e.g. huge bandwidth requirements, integration of billions of devices and millions of services in the cloud). Proposed in the early 2010s, Segment Routing (SR) architecture helps face these challenging demands, and it is currently being adopted and deployed. SR architecture is based on the concept of source routing and has interesting scalability properties, as it dramatically reduces the amount of state information to be configured in the core nodes to support complex services. SR architecture was first implemented with the MPLS dataplane and then, quite recently, with the IPv6 dataplane (SRv6). IPv6 SR architecture (SRv6) has been extended from the simple steering of packets across nodes to a general network programming approach, making it very suitable for use cases such as Service Function Chaining and Network Function Virtualization. In this paper we present a tutorial and a comprehensive survey on SR technology, analyzing standardization efforts, patents, research activities and implementation results. We start with an introduction on the motivations for Segment Routing and an overview of its evolution and standardization. Then, we provide a tutorial on Segment Routing technology, with a focus on the novel SRv6 solution. We discuss the standardization efforts and the patents providing details on the most important documents and mentioning other ongoing activities. We then thoroughly analyze research activities according to a taxonomy. We have identified 8 main categories during our analysis of the current state of play: Monitoring, Traffic Engineering, Failure Recovery, Centrally Controlled Architectures, Path Encoding, Network Programming, Performance Evaluation and Miscellaneous...Comment: SUBMITTED TO IEEE COMMUNICATIONS SURVEYS & TUTORIAL

    SEGMENT ROUTING POLICIES WITH BUILT-IN RESILIENCY

    Get PDF
    Techniques are described herein to establish hierarchical Segment Routing (SR) policies with built-in resiliency. These techniques increase the scalability of the SR Path Computation Element (PCE) and SR network. Specifically, once such policies are installed by the SR PCE, the SR PCE does not have to take any action in the event of failure. This is an improvement over current approaches, which employ the SR head-end node as a single point of failure

    A Local Approach to Fast Failure Recovery of LISP Ingress Tunnel Routers

    Get PDF
    Part 8: LISP and Multi-domain RoutingInternational audienceLISP (Locator/ID Separation Protocol) has been proposed as a future Internet architecture in order to solve the scalability issues the current architecture is facing. LISP tunnels packets between border routers, which are the locators of the non-globally routable identifiers associated to end-hosts. In this context, the encapsulating routers, which are called Ingress Tunnel Routers (ITR) and learn dynamically identifier-to-locators mappings needed for the encapsulation, can cause severe and long lasting traffic disruption upon failure. In this paper, thanks to real traffic traces, we first explore the impact of ITR failures on ongoing traffic. Our measurements confirm that the failure of an ITR can have severe impact on traffic. We then propose and evaluate an ITR synchronization mechanism to locally protect ITRs, achieving disruptionless traffic redirection. We finally explore how to minimize the number of ITRs to synchronize in large networks
    corecore