csis 6251 csis 625 week 11 sonet/sdh networking & internetworking copyright 2001 - dan oelke for...
Post on 21-Dec-2015
213 Views
Preview:
TRANSCRIPT
CSIS 625 1
CSIS 625 Week 11
SONET/SDH
Networking & Internetworking
Copyright 2001 - Dan Oelke
For use by students of CSIS 625 for purposes of this class only.
CSIS 625 2
Overview
• SONET/SDH– Line, Section, Path– STS, STM, OC
• Networking and Internetworking– Moving to layer 3– Routing types– Routing algorithms– Multicast
• Transport Layer– Up to layer 4
CSIS 625 3
SONET & SDH
• SONET - Synchronous Optical NETwork– ANSI/Bellcore standard
• SDH - Synchronous Digital Hierarchy – ITU (European) standard
• Both standards are practically identical• Standards for a synchronous digital
transmission system of TDM traffic over fiber networks.
• Standards based system for data rates above a T3.
CSIS 625 4
SONET/SDH Hierarchy
• STS - Synchronous Transport Signals – 51.84Mbps - base level of SONET hierarchy
• STM - Synchronous Transport Module– 155.52Mbps - base level of SDH hierarchy– Exactly equal to STS-3
STS OC STMBit Rate (Mbps)
STS-1 OC-1 51.84STS-3 OC-3 STM-1 155.52STS-12 OC-12 STM-4 622.08STS-48 OC-48 STM-16 2488.32STS-192 OC-192 STM-64 9953.28STS-768 OC-768 STM-256 39813.12
CSIS 625 5
STS/OC/STM
• STS-n and OC-n are identical - – OC-n names are used for optical interconnects– STS-n names are used for electrical
interconnects
• OC-n is exactly n times the rate of an OC-1 signal.
• STM-1 signal is exactly 3 times the rate of an STS-1 signal
• STM-n is exactly n times the rate of an STM-1 signal
CSIS 625 6
STS frame format
• An STS-1 frame consists of 810 bytes (octets) sent in 125µs. – 810 * 8 * 8000 = 51.84Mbps
• The 810 bytes are arranged as 90 columns x 9 rows– 3 columns are overhead – 87 columns are actual data
CSIS 625 7
ADM, Terminal, Repeater
• SONET/SDH terminal - a mux/demux that creates a SONET signal and terminates paths.
• SONET/SDH ADM (Add/Drop Multiplexer) - a mux/demux that can separate individual STS-n signals from a higher level signal.
• SONET/SDH repeater- a physical level regenerator that also terminates section level overhead to allow section level management.
CSIS 625 8
SONET/SDH - Path/Section/Line
• In Sonet/SDH systems a strong designation of levels of overhead are kept.
• Section is lowest level – Repeater to repeater
• Line is middle layer
• Path is top/longest layer– from entrance to SONET system to exit of
SONET system
CSIS 625 9
SONET/SDH - Path/Section/Line
Repeater
Add/DropMultiplexer
Add/DropMultiplexer
TerminalMultiplexer
TerminalMultiplexer
Repeater
Section Section Section Section Section
Line Line Line
Path
T3
T3
T3
T3
OC-n OC-n OC-n OC-n OC-n
CSIS 625 10
SONET/SDH - Section & Line Overhead
• The section overhead is the first 3 rows of the first 3 columns (9 bytes) per frame.
• The line overhead is the lower 6 rows of the first 3 columns (18 bytes) per frame.
STS-1 Payload
87 columnsA1 A2 C1
B1 E1 F1
D1 D2 D3
H1 H2 H3
B2 K1 K2
D4 D5 D6
D7 D8 D9
D10 D11 D12
Z1 Z2 Z3
SectionOverhead
LineOverhead
CSIS 625 11
SONET/SDH Physical layer
• Fiber optic link, using NRZ encoding
– light present is a 1
– no light is a 0• To keep enough transitions, a scrambling
mechanism is used.
CSIS 625 12
SONET/SDH Virtual Tributaries
• Virtual Tributaries are a method to map a lower speed signal (like a T1or E1) into a portion of an STS-n payload.
• VT1.5 - 27 bytes/frame => 1.728Mbps– Used for T1s
• VT2 - 36 bytes/frame => 2.304Mbps
• VT3 - 54 bytes/frame => 3.456Mbps
• VT6 - 108 bytes/frame => 6.912Mbps
CSIS 625 13
STS concatenated signals
• Multiple STS-1s can be grouped together into a single higher bit rate facility.
• Extra overhead bytes are ignored.• Technically, any number of STS-1s can be grouped,
but the only groupings normally supported are:– STS-3C, STS-12C, STS-48C
• Generally a grouping must fall on a boundary of the same size inside of the OC-n carrier– A STS-3C must fall on a boundary of 3– STS-12C must fall on a boundary of 12
• Typically used for situations where ATM or Packets are sent over a SONET network.
CSIS 625 14
Network Layer Vocabulary
• internet - a collection of networks connected by bridges or routers
• Internet - THE world wide collection of networks using TCP/IP as their network protocol that people use for communicating.
• End System (ES) - a node on one of the networks in an internet that supports end-user services (OSI model terminology)
• Intermediate System (IS) - a node that connects two networks to permit communications between end systems on the different networks. (OSI model terminology)
• IP - Internet Protocol - the network layer protocol used on the Internet.
CSIS 625 15
Vocabulary
• Router - a device that uses the network layer information for forwarding packets from one network to another.
• Bridge - a device that uses data link layer information for forwarding packets from one network to another.
• Gateway is kind of like a router in that it connects multiple networks - but it does so at the application layer, instead of at the network layer.
• Repeater - a device that connects multiple network segments at the physical layer – Converts analog to digital, retimes & reshapes signal, convert back
to physical layer transmission scheme
• Amplifier - A device that increases the amplitude of a analog signal fed into it.
CSIS 625 16
Network Layer
• Provide a link between networks– These networks may be of different data link
and/or physical layers
• Provide routing and delivery of data between nodes on different networks
• When there are many networks connected in multiple ways, the algorithms to determine how a packet gets from end to end get “interesting”
CSIS 625 17
Connection oriented vs. connectionless
• Connection Oriented– Assumed that all networks provide a connection
oriented form of service
– May be virtual circuits on the networks
– IS systems splice together connections between the networks.
– This system is rarely used in real systems
• Connectionless – packet-switching instead of virtual circuits
– At each router a forwarding decision is made independently for each packet
CSIS 625 18
Routing Characteristics
• Routing algorithms and protocols are supposed to get packets from one node to another. How well they do this is judged on a number of factors– Correctness – packets get where they are supposed to– Simplicity – Able to implement this (simple makes
equipment cheaper)– Robustness – Being able to deal with network problems– Stability – Making sure that things don’t change too
rapidly causing more problems– Fairness – everyone gets the same amount (or what they
paid for)– Optimality – bandwidth of links is well used.– Efficiency – make sure that processing is minimal so that
delay is minimal
CSIS 625 19
Least Cost Routing
• The goal of most routing protocols is to get information between two points in the “best” way.
• Best may be defined by a number of things– Number of network hops (easy to measure)– Amount of delay from various links
• Can be physical delay from transmission rate and distance
• Can add in congestion (queuing time)
– Cost in $ to send packets over a given link– Usually is not physical distance
CSIS 625 20
Adaptive vs. Non-adaptive routing
• Adaptive Routing – Each router as it processes each packet makes a
decision about how to send the packet to its destination
– This can change when the network changes• Link failures
• Congestion
• Non-Adaptive routing– Once a pathway is established, all packets for a
destination go along that one route.
CSIS 625 21
Fragmentation and Reassembly
• Network layer (as well as other layers sometimes) provides segmentation and reassembly.
• Makes bigger packets of data into smaller ones that the underlying layer can handle.
• Each header has fields– Length– Offset value– “More” flag
• Example:
CSIS 625 22
Packet Time to Live
• Packets may end up in a routing loop going around and around– May be just bounced between two nodes
• To keep packets from using network bandwidth forever, most network protocols have a packet lifetime specified by the originator.
• TTL – Time to live. - A number set by the packet originator and decremented by each hop along a path.– When this counter reaches 0, the packet is discarded
– Used to limit the damage of routing loops.
CSIS 625 23
Gateway
• A gateway is kind of like a router in that it connects multiple networks - but it does so at the application layer, instead of at the network layer.
• A special kind of application that transfers information from one application format to another.
CSIS 625 24
Routing algorithms – in abstract
• There are many different ways to determine the best path for a packet to take through a network.
• Routing algorithms are the steps taken to find the best path
• Routing protocols are a description of how this routing information is discovered and disseminated in the network.
• Type of Routing Algorithms– Fixed Routing– Flooding – Random Routing– Distance Vector Routing– Link State Routing
CSIS 625 25
Fixed Routing
• A simple method where a human goes to each router and programs it with tables that tell it where every packet goes.– May have a central network controller that
disseminates the information
• Very simple and stable.• Does not react well to network congestion
or link failures.– May have alternate paths for each destination to
accommodate link failures.
CSIS 625 26
Flooding Routing
• Very simple method where every node sends packets to every other node it is connected to.
• Must have a mechanism to kill off packets– Nodes could remember every packet it has sent– A TTL counter in the packet can be
implemented
• Multiple copies will be received by the recipient so packet must have unique tag that allows duplicates to be discarded.
CSIS 625 27
Flooding
• Advantages:– Requires no central authority.– All links are tried – packets will get through if there is any way
possible.• Very robust – good for emergency messages in a military network.
– At least one packet will have used minimum hop count• May be used to find path for virtual circuit
– All nodes receive the packet• May be used to disseminate important information (like route
updates)
• Disadvantage– Very high network load for the traffic given
• Actually used in some routing protocols and in the peer-to-peer application Gnutella.
CSIS 625 28
Random Routing
• Send a packet to one random outgoing path for retransmission.
• Same idea as flooding, but with less traffic load on the network.
• Advantages– No central authority– Relatively robust– Less traffic than flooding
• Disadvantages– Still a heavy traffic load – Most packets do not use the least hop path.
CSIS 625 29
Distance Vector Routing
• A type of adaptive routing• Each router periodically shares its knowledge
about the entire network.– This is sent only to the router’s direct neighbors.
– This information is shared at a regular basis
• When a router receives information from its neighbor, it updates its routing table.– The routing table has Network ID, cost, next hop.
– When a lower cost path is found, the old route is discarded and the new route added.
CSIS 625 30
Link State Routing
• A type of adaptive routing• Each router shares its knowledge about it’s
neighbors (not the entire routing table) • Information about it’s neighbors is sent to all
routers – Uses a flooding technique
• Information is sent out when there is a change (not periodically)
• When a router receives information, it uses it to update its routing table– The routing table has Network ID, cost, next hop.
CSIS 625 31
Dijkstra Algorithm
• To calculate the the lowest cost path between two nodes, the routers use Dijkstra’s algorithm.
• The algorithm builds a tree structure of the network using itself as the root.– All nodes that can be reached from the root are attached
(all neighbors) – temporarily.– The node are sorted by order of cost to reach them.– Starting with lowest cost temporarily attached node,
make it permanent part of the tree.– Consider all nodes attached from the chosen node and
add them temporarily.– Repeat last two steps until all nodes are attached
permanently • Example:
CSIS 625 32
Routing algorithms – in practice
• Vocabulary– Autonomous system
• A group of networks and routers where all the routers exchange information using a common routing protocol.
• All of these routers are managed by a single organization• Except where there is a failure, all routers are “connected”
– IRP – Interior Router Protocol – A routing protocol used within a single autonomous system.
• Also known as Intra-Domain Routing protocol– ERP – Exterior router protocol – A routing protocol used for
exchanging routing information outside of an autonomous system.• Also known as Inter-Domain Routing Protocol
• Typically an ERP is simpler than an IRP– Exchanges only summary information of reachability– IRP has more detailed information on least-cost path to reach any
given node.
CSIS 625 33
BGP – Border Gateway Protocol
• An Exterior router protocol.• Designed to allow routers (“gateways” in the
standard) of different autonomous systems to exchange information.
• BGP-4 Defined in RFC 1771• 3 major functions/procedures
– Neighbor acquisition– Neighbor reachability– Network reachability
• Distributes information for each neighbor– List of routers needed to get to the neighbor– IP address of the router that is the next hop– List of networks served by this router
CSIS 625 34
RIP – Routing Information Protocol
• An early TCP/IP routing protocol.• Now used as an Interior routing protocol only• Depreciated in use for the most part
– Since it was one of the first, it still shows up in a lot of systems.
• Each router broadcasts it’s entire route table.• A Distance Vector routing protocol• Has problem’s scaling as the number of routers
and links grows very large
CSIS 625 35
OSPF – Open Shortest Path First
• An upgrade from RIP• An Interior routing protocol• Based on Link State Routing• Cost to traverse a link may be set to
anything that the network administrator desires.– May be delay, data rate, $, etc.– Some “costs” may be artificially inflated, or
reduced to help steer traffic down a certain path.
CSIS 625 36
IS-IS Routing
• An OSI stack based system – now adopted for TCP/IP networks
top related