分享
 
 
 

RFC2098 - Toshibas Router Architecture Extensions for ATM : Overview

王朝other·作者佚名  2008-05-31
窄屏简体版  字體: |||超大  

Network Working Group Y. Katsube

Request for Comments: 2098 K. Nagami

Category: Informational H. Esaki

Toshiba R&D Center

February 1997

Toshiba's Router Architecture Extensions for ATM : Overview

Status of this Memo

This memo provides information for the Internet community. This memo

does not specify an Internet standard of any kind. Distribution of

this memo is unlimited.

Abstract

This memo describes a new internetworking architecture which makes

better use of the property of ATM. IP datagrams are transferred

along hop-by-hop path via routers, but datagram assembly/disassembly

and IP header processing are not necessarily carried out at

individual routers in the proposed architecture. A concept of "Cell

Switch Router (CSR)" is introdUCed as a new internetworking

equipment, which has ATM cell switching capabilities in addition to

conventional IP datagram forwarding. Proposed architecture can

provide applications with high-throughput and low-latency ATM pipes

while retaining current router-based internetworking concept. It

also provides applications with specific QoS/bandwidth by cooperating

with internetworking level resource reservation protocols such as

RSVP.

1. Introduction

The Internet is growing both in its size and its traffic volume. In

addition, recent applications often require guaranteed bandwidth and

QoS rather than best effort. Such changes make the current hop-by-

hop datagram forwarding paradigm inadequate, then accelerate

investigations on new internetworking architectures.

Roughly two distinct approaches can be seen as possible solutions;

the use of ATM to convey IP datagrams, and the revision of IP to

support flow concept and resource reservation. Integration or

interworking of these approaches will be necessary to provide end

hosts with high throughput and QoS guaranteed internetworking

services over any datalink platforms as well as ATM.

New internetworking architecture proposed in this draft is based on

"Cell Switch Router (CSR)" which has the following properties.

- It makes the best use of ATM's property while retaining current

router-based internetworking and routing architecture.

- It takes into account interoperability with future IP that

supports flow concept and resource reservations.

Section 2 of this draft eXPlains background and motivations of our

proposal. Section 3 describes an overview of the proposed

internetworking architecture and its several remarkable features.

Section 4 discusses control architectures for CSR, which will need to

be further investigated.

2. Background and Motivation

It is considered that the current hop-by-hop best effort datagram

forwarding paradigm will not be adequate to support future large

scale Internet which accommodates huge amount of traffic with certain

QoS requirements. Two major schools of investigations can be seen in

IETF whose main purpose is to improve ability of the Internet with

regard to its throughput and QoS. One is to utilize ATM technology

as much as possible, and the other is to introduce the concept of

resource reservation and flow into IP.

1) Utilization of ATM

Although basic properties of ATM; necessity of connection setup,

necessity of traffic contract, etc.; is not necessarily suited to

conventional IP datagram transmission, its Excellent throughput and

delay characteristics let us to investigate the realization of IP

datagram transmission over ATM.

A typical internetworking architecture is the "Classical IP Model"

[RFC1577]. This model allows direct ATM connectivities only between

nodes that share the same IP address prefix. IP datagrams should

traverse routers whenever they go beyond IP subnet boundaries even

though their source and destination are accommodated in the same ATM

cloud. Although an ATMARP is introduced which is not based on legacy

datalink broadcast but on centralized ATMARP servers, this model does

not require drastic changes to the legacy internetworking

architectures with regard to the IP datagram forwarding process.

This model still has problems of limited throughput and large

latency, compared with the ability of ATM, due to IP header

processing at every router. It will become more critical when

multimedia applications that require much larger bandwidth and lower

latency become dominant in the near future.

Another internetworking architecture is "NHRP (Next Hop Resolution

Protocol) Model" [NHRP09]. This model aims at resolving throughput

and latency problems in the Classical IP Model and making the best

use of ATM. ATM connections can be directly established from an

ingress point to an egress point of an ATM cloud even when they do

not share the same IP address prefix. In order to enable it, the

Next Hop Server [KAT95] is introduced which can find an egress point

of the ATM cloud nearest to the given destination and resolves its

ATM address. A sort of query/response protocols between the

server(s) and clients and possibly server and server are specified.

After the ATM address of a desired egress point is resolved, the

client establishes a direct ATM connection to that point through ATM

signaling procedures [ATM3.1]. Once a direct ATM connection has been

set up through this procedure, IP datagrams do not have to experience

hop-by-hop IP processing but can be transmitted over the direct ATM

connection. Therefore, high throughput and low latency

communications become possible even if they go beyond IP subnet

boundaries. It should be noted that the provision of such direct ATM

connections does not mean disappearance of legacy routers which

interconnect distinct ATM-based IP subnets. For example, hop-by-hop

IP datagram forwarding function would still be required in the

following cases:

- When you want to transmit IP datagrams before direct ATM connection

from an ingress point to an egress point of the ATM cloud is

established

- When you neither require a certain QoS nor transmit large amount of

IP datagrams for some communication

- When the direct ATM connection is not allowed by security or policy

reasons

2) IP level resource reservation and flow support

Apart from investigation on specific datalink technology such as ATM,

resource reservation technologies for desired IP level flows have

been studied and are still under discussion. Their typical examples

are RSVP [RSVP13] and STII [RFC1819].

RSVP itself is not a connection oriented technology since datagrams

can be transmitted regardless of the result of the resource

reservation process. After a resource reservation process from a

receiver (or receivers) to a sender (or senders) is successfully

completed, RSVP-capable routers along the path of the flow reserve

their resources for datagram forwarding according to the requested

flow spec.

STII is regarded as a connection oriented IP which requires

connection setup process from a sender to a receiver (or receivers)

before transmitting datagrams. STII-capable routers along the path

of the requested connection reserve their resources for datagram

forwarding according to the flow spec.

Neither RSVP nor STII restrict underlying datalink networks since

their primary purpose is to let routers provide each IP flow with

desired forwarding quality (by controlling their datagram scheduling

rules). Since various datalink networks will coexist as well as ATM

in the future, these IP level resource reservation technologies would

be necessary in order to provide end-to-end IP flow with desired

bandwidth and QoS.

aking this background into consideration, we should be aware of

several issues which motivate our proposal.

- As of the time of writing, the ATM specific internetworking

architecture proposed does not take into account interoperability

with IP level resource reservation or connection setup protocols.

In particular, operating RSVP in the NHRP-based ATM cloud seems to

require much effort since RSVP is a soft-state receiver-oriented

protocol with multicast capability as a default, while ATM with

NHRP is a hard-state sender-oriented protocol which does not

support multicast yet.

- Although RSVP or STII-based routers will provide each IP flow with

a desired bandwidth and QoS, they have some native throughput

limitations due to the processor-based IP forwarding mechanism

compared with the hardware switching mechanism of ATM.

The main objective of our proposal is to resolve the above issues.

The proposed internetworking architecture makes the best use of the

property of ATM by extending legacy routers to handle future IP

features such as flow support and resource reservation with the help

of ATM's cell switching capabilities.

3. Internetworking Architecture Based On the Cell Switch Router (CSR)

3.1 Overview

The Cell Switch Router (CSR) is a key network element of the proposed

internetworking architecture. The CSR provides cell switching

functionality in addition to conventional IP datagram forwarding.

Communications with high throughput and low latency, that are native

properties of ATM, become possible by using this cell switching

functionality even when the communications pass through IP subnetwork

boundaries. In an ATM internet composed of CSRs, VPI/VCI-based cell

switching which bypasses datagram assembly/disassembly and IP header

processing is possible at every CSR for communications which lend

themselves to such (e.g., communications which require certain amount

of bandwidth and QoS), while conventional hop-by-hop datagram

forwarding based on the IP header is also possible at every CSR for

other conventional communications.

By using such cell-level switching capabilities, the CSR is able to

concatenate incoming and outgoing ATM VCs, although the concatenation

in this case is controlled outside the ATM cloud (ATM's control/

management-plane) unlike conventional ATM switch nodes. That is, the

CSR is attached to ATM networks via an ATM-UNI instead of NNI. By

carrying out such VPI/VCI concatenations at multiple CSRs

consecutively, ATM level connectivity composed of multiple ATM VCs,

each of which connects adjacent CSRs (or CSR and hosts/routers), can

be provided. We call such an ATM pipe "ATM Bypass-pipe" to

differentiate it from "ATM VCC (VC connection)" provided by a single

ATM datalink cloud through ATM signaling.

Example network configurations based on CSRs are shown in figure 1.

An ATM datalink network may be a large cloud which accommodates

multiple IP subnets X, Y and Z. Or several distinct ATM datalinks

may accommodate single IP subnet X, Y and Z respectively. The latter

configuration would be straightforward in discussing the CSR, but the

CSR is also applicable to the former configuration as well. In

addition, the CSR would be applicable as a router which interconnects

multiple NHRP-based ATM clouds.

Two different kinds of ATM VCs are defined between adjacent CSRs or

between CSR and ATM-attached hosts/routers.

1) Default-VC

It is a general purpose VC used by any communications which select

conventional hop-by-hop IP routed paths. All incoming cells received

from this VC are assembled to IP datagrams and handled based on their

IP headers. VCs set up in the Classical IP Model are classified into

this category.

2) Dedicated-VC

It is used by specific communications (IP flows) which are specified

by, for example, any combination of the destination IP address/port,

the source IP address/port or IPv6 flow label. It can be

concatenated with other Dedicated-VCs which accommodate the same IP

flow as it, and can constitute an ATM Bypass-pipe for those IP flows.

Ingress/egress nodes of the Bypass-pipe can be either CSRs or ATM-

attached routers/hosts both of which speak a Bypass-pipe control

protocol. (we call that "Bypass-capable nodes") On the other hand,

intermediate nodes of the Bypass-pipe should be CSRs since they need

to have cell switching capabilities as well as to speak the Bypass-

pipe control protocol.

The route for a Bypass-pipe follows IP routing information in each

CSR. In figure 1, IP datagrams from a source host or router X.1 to a

destination host or router Z.1 are transferred over the route X.1 ->

CSR1 -> CSR2 -> Z.1 regardless of whether the communication is on a

hop-by-hop basis or Bypass-pipe basis. Routes for individual

Dedicated-VCs which constitutes the Bypass-pipe X.1 --> Z.1 (X.1 ->

CSR1, CSR1 -> CSR2, CSR2 -> Z.1) would be determined based on ATM

routing protocols such as PNNI [PNNI1.0], and would be independent of

IP level routing.

An example of IP datagram transmission mechanism is as follows.

o The host/router X.1 checks an identifier of each IP datagram,

which may be the "destination IP address (prefix)",

"source/destination IP address (prefix) pair", "destination IP

address and port", "source IP address and Flow label (in IPv6)",

and so on. Based on either of those identifiers, it determines

over which VC the datagram should be transmitted.

o The CSR1/2 checks the VPI/VCI value of each incoming cell. When

the mapping from the incoming interface/VPI/VCI to outgoing

interface/VPI/VCI is found in an ATM routing table, it is directly

forwarded to the specified interface through an ATM switch module.

When the mapping in not found in the ATM routing table (or the

table shows an IP module as an output interface), the cell is

assembled to an IP datagram and then forwarded to an appropriate

outgoing interface/VPI/VCI based on an identifier of the datagram.

IP subnet X IP subnet Y IP subnet Z

<---------------------> <-----------------> <--------------------->

+-------+ Default +-------+ Default +-------+ Default +-------+

-VC CSR 1 -VC CSR 2 -VC

Host +=============+ +===============+ +=============+ Host

X.1 +-------------+++++---------------+++++-------------+ Z.1

+-------------+++++---------------+++++-------------+

+-------------+++++---------------+++++-------------+

Dedicated Dedicated Dedicated

+-------+ -VCs +-------+ -VCs +-------+ -VCs +-------+

<--------------------------------------------------->

Bypass-pipe

Figure 1 Internetworking Architecture based on CSR

3.2 Features

The main feature of the CSR-based internetworking architecture is the

same as that of the NHRP-based architecture in the sense that they

both provide direct ATM level connectivity beyond IP subnet

boundaries. There are, however, several notable differences in the

CSR-based architecture compared with the NHRP-based one as follows.

1) Relationship between IP routing and ATM routing

In the NHRP model, an egress point of the ATM network is first

determined in the next hop resolution phase based on IP level routing

information. Then the actual route for an ATM-VC to the oBTained

egress point is determined in the ATM connection setup phase based on

ATM level routing information. Both kinds of routing information

would be calculated according to factors such as network topology and

available bandwidth for the large ATM cloud. The ATM routing will be

based on PNNI phase1 [PNNI1.0] while the IP routing will be based on

OSPF, BGP, IS-IS, etc. We need to manage two different routing

protocols over the large ATM cloud until Integtrated-PNNI [IPNNI96]

which takes both ATM level metric and IP level metric into account

will be phased in in the future.

In the CSR model, IP level routing determines an egress point of the

ATM cloud as well as determines inter-subnet level path to the point

that shows which CSRs it should pass through. ATM level routing

determines an intra-subnet level path for ATM-VCs (both Dedicated-VC

and Default-VC) only between adjacent nodes (CSRs or ATM-attached

hosts/routers). Since the roles of routing are hierarchically

subdivided into inter-subnet level (router level) and intra-subnet

level (ATM SW level), ATM routing does not have to operate all over

the ATM cloud but only in individual IP subnets independent from each

other. This will decrease the amount of information for ATM routing

protocol handling. But an end-to-end ATM path may not be optimal

compared with the NHRP model since the path should go through routers

at subnet boundaries in the CSR model.

2) Dynamic routing and redundancy support

A CSR-based network can dynamically change routes for Bypass-pipes

when related IP level routing information changes. Bypass-pipes

related to the routing changes do not have to be torn down nor

established from scratch since intermediate CSRs related to IP

routing changes can follow them and change routes for related

Bypass-pipes by themselves.

The same things apply when some error or outage happens in any ATM

nodes/links/routers on the route of a Bypass-pipe. CSRs that have

noticed such errors or outages would change routes for related

Bypass-pipes by themselves.

3) Interoperability with IP level resource reservation protocols in

multicast environments

As current NHRP specification assumes application of NHRP to unicast

environments only, multicast IP flows should still be carried based

on a hop-by-hop manner with multicast routers. In addition,

realization of IP level resource reservation protocols such as RSVP

over NHRP environments requires further investigation.

The CSR-based internetworking architecture which keeps subnet-by-

subnet internetworking with regard to any control protocol sequence

can provide multicast Bypass-pipes without requiring any

modifications in IP multicast over ATM [IPMC96] or multicast routing

techniques. In addition, since the CSR can handle RSVP messages

which are transmitted in a hop-by-hop manner, it can provide Bypass-

pipes which satisfy QoS requirements by the cooperation of the RSVP

and the Bypass-pipe control protocol.

4. Control Architecture for CSR

Several issues with regard to a control architecture for the CSR are

discussed in this section.

4.1 Network Reference Model

In order to help understanding discussions in this section, the

following network reference model is assumed. Source hosts S1, S2,

and destination hosts D1, D2 are attached to Ethernets, while S3 and

D3 are attached to the ATM. Routers R1 and R5 are attached to

Ethernets only, while R2, R3 and R4 are attached to the ATM. The ATM

datalink for subnet #3 and subnet #4 can either be physically

separated datalinks or be the same datalink. In other Words, R3 can

be either one-port or multi-port router.

Ether Ether ATM ATM Ether Ether

+-----+ +-----+

S1-- S2--- S3--- ---D3 ---D2 --D1

---R1------R2--- --R3-- ---R4------R5---

+-----+ +-----+

subnet subnet subnet subnet subnet subnet

#1 #2 #3 #4 #5 #6

Figure 2 Network Reference Model

Bypass-pipes can be configured [S3 or R2]-->R3-->[D3 or R4]. That

means that S3, D3, R2, R3 and R4 need to speak Bypass-pipe control

protocol, and means that R3 needs to be the CSR. We use term

"Bypass-capable nodes" for hosts/routers which can speak Bypass-pipe

control protocol but are not necessarily CSRs.

As shown in this reference model, Bypass-pipe can be configured from

host to host (S3-->R3-->D3), router to host (R2-->R3-->D3), host to

router (S3-->R3-->R4), and router to router (R2-->R3-->R4).

4.2 Possible Use of Bypass-pipe

Possible use (or purposes) of Bypass-pipe provided by CSRs, in other

words, possible triggers that initiate Bypass-pipe setup procedure,

is discussed in this subsection.

Following two purposes for Bypass-pipe setup are assumed at present;

a) Provision of low latency path

This indicates cases in which end hosts or routers initiate a

Bypass-pipe setup procedure when they will transmit large amount of

datagrams toward a specific destination. For instance,

- End hosts or routers initiate Bypass-pipe setup procedures based

on the measurement of IP datagrams transmitted toward a certain

destination.

- End hosts or routers initiate Bypass-pipe setup procedures when

it detects datagrams with certain higher layer protocols such as

FTP, nntp, http, etc.

Other triggers may be possible depending on the policy in each

network. In any case, the purpose of Bypass-pipe setup in each of

these cases is to reduce IP processing burden at intermediate routers

as well as to provide a communication path with low latency for burst

data transfer, rather than to provide end host applications with

specific bandwidth/QoS.

There would be no rule for determining bandwidth for such kinds of

Bypass-pipes since no explicit information about bandwidth/QoS

requirement by end hosts is available without IP-level resource

reservation protocols such as RSVP. Using UBR VCs as components of

the Bypass-pipe would be the easiest choice although there is no

guarantees for cell loss quality, while using other services such as

CBR/VBR/ABR with an adequate parameter tuning would be possible.

b) Provision of specific bandwidth/QoS requested by hosts

This indicates cases in which routers or end hosts initiate a

Bypass-pipe setup procedure by triggers related to IP-level

bandwidth/QoS request from end hosts. The "resource management

entity" in the host or router, which has received bandwidth/QoS

requests from applications or adjacent nodes may choose to

accommodate the requested IP flow to an existing VC or choose to

allocate a new Dedicated-VC for the requested IP flow. Selecting the

latter choice at each router can correspond to the trigger for

constituting a Bypass-pipe. When both an incoming VC and an outgoing

VC (or VCs) are dedicated to the same IP flow(s), those VCs can be

concatenated at the CSR (ATM cut-through) to constitute a Bypass-

pipe. Bandwidth for the Bypass-pipe (namely, individual VCs

constituting the Bypass-pipe) in this case would be determined based

on the bandwidth/QoS requirements by the end host which is conveyed

by, e.g., RSVP messages. The ATM service classes; e.g., CBR/VBR/ABR;

that would be selected depends on the IP-level service classes

requested by the end hosts.

Bypass-pipe provision for the purpose of b) will surely be beneficial

in the near future when related IP-level resource reservation

protocol will become available as well as when definitions of

individual service classes and flow specs offered to applications

become clear. On the other hand, Bypass-pipe setup for the purpose

of a) may be beneficial right now since it does not require

availability of IP-level resource reservation protocols. In that

sense, a) can be regarded as a kind of short-term use while b) is a

long-term use.

4.3 Variations of Bypass-pipe Control Architecture

A number of variations regarding Bypass-pipe control architecture are

introduced. Items which are related to architectural variations are;

o Ways of providing Dedicated-VCs

o Channels for Bypass-pipe control message transfer

o Bypass-pipe control procedures

Each of these items are discussed below.

4.3.1 Ways of Providing Dedicated-VCs

There are roughly three alternatives regarding the way of providing

Dedicated-VCs in individual IP subnets as components of a Bypass-

pipe.

a) On-demand SVC setup

Dedicated-VCs are set up in individual IP subnets each time you want

to set up a Bypass-pipe through the ATM signaling procedure.

b) Picking up one from a bunch of (semi-)PVCs

Several VCs are set up beforehand between CSR and CSR, or CSR and

other ATM-attached nodes (hosts/router) in each IP subnet. Unused VC

is picked up as a Dedicated-VC from these PVCs in each IP subnet when

a Bypass-pipe is set up.

c) Picking up one VCI in PVP/SVP

PVPs or SVPs are set up between CSR and CSR, or CSR and other ATM-

attached nodes (hosts/routers) in each IP subnet. PVPs would be set

up as a router/host initialization procedure, while SVPs, on the

other hand, would be set up through ATM signaling when the first VC

(either Default- or Dedicated-) setup request is initiated by either

of some peer nodes. Then, Unused VCI value is picked up as a

Dedicated-VC in the PVP/SVP in each IP subnet when a Bypass-pipe is

set up. The SVP can be released through ATM signaling when no VCI

value is in active state.

The best choice will be a) with regard to efficient network resource

usage. However, you may go through three steps, ATMARP (for unicast

[RFC1577] or multicast [IPMC96] in each IP subnet), SVC setup (in

each IP subnet) and exchange of Bypass-pipe control message in this

case. Whether a) is practical choice or not will depend on whether

you can allow larger Bypass-pipe setup time due to three-step

procedure mentioned above, or whether you can send datagrams over

Default-VCs in a hop-by-hop manner while waiting for the Bypass-pipe

set up.

In the case of b) or c), the issue of Bypass-pipe setup time will be

improved since SVC setup step can be skipped. In b), each node (CSR

or ATM-attached host/router) should specify some traffic descriptors

even for unused VCs, and the ATM datalink should reserve its desired

resource (such as VCI value and bandwidth) for them. In addition,

the ATM datalink may have to carry out UPC functions for those unused

VCs. Such burden would be reduced when you use UBR-PVCs and set peak

cell rate for each of them equal to link rate, but bandwidth/QoS for

the Bypass-pipe is not provided in this case. In c), on the other

hand, traffic descriptors which should be specified by each node for

the ATM datalink is not each VC's but VP's only. Resource

reservations for individual VCs will be carried out not as a

functionality of the ATM datalink but of each CSR or ATM-attached

host/router if necessary. A functionality which need to be provided

by the ATM datalink is control of VPs' bandwidth only such as UPC and

dynamic bandwidth negotiation if it would be widely available.

4.3.2 Channels for Bypass-pipe Control Message Transfer

There are several alternatives regarding the channels for managing

(setting up, releasing, and possibly changing the route of) a

Bypass-pipe. This subsection explains these alternatives and

discusses their properties.

Three alternatives are discussed, Inband control message, Outband

control message, and use of ATM signaling.

i) Inband Control Message

When setting up a Bypass-pipe, control messages are transmitted over

a Dedicated-VC which will eventually be used as a component of the

Bypass-pipe. These messages are handled at each CSR, and similar

messages are transmitted to the next-hop node over a Dedicated-VC

along the selected route (based on IP routing table). Unlike outband

message protocol described in ii), each message does not have to

indicate a Dedicated-VC which will be used since the message itself

is carried over "that" VC.

The inband control message can be either "datagram dedicated for

Bypass-pipe control" or "actual IP datagram" sent by user

application. Actual IP datagrams can be transmitted over Bypass-pipe

after it has been set up in the former case. In the latter case, on

the other hand, the first (or several) IP datagram(s) received from

an unused Dedicated-VC are analyzed at IP level and transmitted

toward adequate next hop over an unused Dedicated-VC. Then incoming

Dedicated-VC and outgoing Dedicated-VC are concatenated to construct

a Bypass-pipe.

In inband control, Bypass-pipe control messages transmitted after a

Bypass-pipe has been set up cannot be identified at intermediate CSRs

since those messages are forwarded at cell level there. As a

possible solution for this issue, intermediate CSRs can identify

Bypass-pipe control messages by marking cell headers, e.g., PTI bit

which indicates F5 OAM cell. With regard to Bypass-pipe release,

explicit release message may not be necessary if individual CSRs

administer the amount of traffic over each Dedicated-VC and deletes

concatenation information for an inactive Bypass-pipe with their own

decision.

ii) Outband Control Message

When a Bypass-pipe is set up or released, control messages are

transmitted over VCs which are different from Dedicated-VCs used as

components of the Bypass-pipe. Unlike inband message protocol

described in i), each message has to indicate which Dedicated-VCs the

message would like to control. Therefore, an identifier that

uniquely discriminates a VC, which is not a VPI/VCI that is not

identical at both endpoints of the VC, need to be defined and be

given at VC initiation phase. However, an issue of control message

transmission after a Bypass-pipe has been set up in inband case does

not exist.

Four alternatives are possible regarding how to convey Bypass-pipe

control messages hop-by-hop over ATM datalink networks.

1) Defines VC for Bypass-pipe control messages only.

2) Uses Default-VC and discriminates Bypass-pipe control messages

from user datagrams by an LLC/SANP value in RFC1483 encapsulation.

3) Uses Default-VC and discriminates Bypass-pipe control messages

from user datagrams by a protocol field value in IP header.

4) Uses Default-VC and discriminates Bypass-pipe control messages

from user datagrams by a port ID in the UDP frame.

When we take into account interoperability with Bypass-incapable

routers, 1) will not be a good choice. Whether we select 2) or 3) 4)

depends on whether we should consider multiprotocol rather than IP

only.

In the case of IP multicast, point-to-multipoint VCs in individual

subnets are concatenated at CSRs consecutively in order to constitute

end-to-end multicast tree. Above four alternatives may require the

same number of point-to-multipoint Defalut-VCs as the number of

requested point-to-multipoint Dedicated-VCs in multicast case. The

fifth alternative which can reduce the necessary number of VCs to

convey control messages in a multicast environment is;

5) Defines point-to-multipoint VC whose leaves are members of

multicast group 224.0.0.1. All nodes which are members of at

least one of active multicast group would become leaves of this

point-to-multipoint VC.

Each upstream node may become a root of the point-to-multipoint VC,

or a sort of multicast server to which each upstream node transmits

cells over a point-to-point VC may become a root of that. In any

case, Bypass-pipe control messages for every multicast group are

transmitted to all nodes which are members of either of the group.

When a downstream node has received control messages which are not

related to a multicast group it belongs, it should discard them by

referring to a destination group address on their IP header.

Donwstream node would still need to use point-to-point VC to send

control messages toward upstream.

iii) Use of ATM Signaling Message

Supposing that ATM signaling messages can convey IP addresses (and

possibly port IDs) of source and destination, it may be possible that

ATM signaling messages be used as Bypass-pipe control messages also.

In that case, an ATM connection setup message indicates a setup of a

Dedicated-VC to an ATM address of a desirable next-hop IP node, and

also indicates a setup of a Bypass-pipe to an IP address (and

possibly port ID) of a target destination node. Information elements

for the Dedicated-VC setup (ATM address of a next-hop node,

bandwidth, QoS, etc.) are handled at ATM nodes, while information

elements for the Bypass-pipe setup (source and destination IP

addresses, possibly their port IDs, or flow label for IPv6, etc.) are

transparently transferred to the next-hop IP node. The next-hop IP

node accepts Dedicated-VC setup and handles such IP level information

elements.

ATM signaling messages can be transferred from receiver to sender as

well as sender to receiver when you set zero Forward Cell Rate and

non-zero Backward Cell Rate as an ATM traffic descriptor information

element in unicast case, or when Leaf Initiated Join capabilities

will become available in multicast case.

Issues in this method are,

- Information elements which specify IP level (and port level)

information need to be defined, e.g., B-HLI or B-UUI, as an ATM

signaling specification.

- It would be difficult to support soft-state Bypass-pipe control

which transmits control messages periodically since ATM signaling

is a hard-state protocol.

4.3.3 Bypass-pipe Control Procedures

This subsection discusses several items with regard to actual

procedures for Bypass-pipe control.

a) Distributed trigger vs. Centralized (restricted) trigger

The first item to be discussed is whether the functionality of

detecting a trigger of Dedicated-VC/Bypass-pipe control is

distributed to all the nodes (including CSRs and hosts/edge devices)

or restricted to specific nodes.

In the case of the distributed trigger, every node is regarded as

having a capability of detecting a trigger of Bypass-pipe setup or

termination. For example, every node detects datagrams for ftp, and

sets up (or fetches) a Dedicated-VC individually to construct a

Bypass-pipe. After setting up or fetching the Dedicated-VCs,

messages which informs (or requests) the transmission of the IP flow

over the Dedicated-VC are exchanged between adjacent nodes. That

enables peer nodes to share the same knowledge about the mapping

relationship between the IP flow and the Dedicated-VC. There is no

end-to-end message transmission in the Bypass-pipe control procedure

itself, but transmission between adjacent nodes only.

In the case of the centralized (or restricted) trigger, capability of

detecting a trigger of Bypass-pipe setup or termination is restricted

to nodes which are located at "the boundary of the CSR-cloud". The

boundary of the CSR-cloud signifies, for individual IP flows, the

node which is the first-hop or the last-hop CSR-capable node. For

example, a node which detects datagrams for ftp can initiate Bypass-

pipe setup procedure only when its previous hop is non-ATM or CSR-

incapable. In this case, Bypass-pipe control messages are originated

at the boundary of the CSR-cloud, and forwarded hop-by-hop toward

another side of the boundary, which is similar to ATM signaling

messages. The semantics of the messages may be the request of end-

to-end Bypass-pipe setup as well as notification or request of

mapping relationship between the IP flow and the Dedicated-VC.

b) Upstream-initiated control vs. Downstream-initiated control

The second item to be discussed is whether the setup of a Dedicated-

VC and the control procedure for constructing a Bypass-pipe are

initiated by upstream side or downstream side.

In the case of the upstream-initiated control, the upstream node

takes the initiative when setting up a Dedicated-VC for a specific IP

flow and creating the mapping relationship between the IP flow and

the Dedicated-VC. For example, a CSR which detects datagrams for ftp

sets up (or fetches) a Dedicated-VC toward its downstream neighbor

and notifies its downstream neighbor that it will transmit a specific

IP flow over the Dedicated-VC. This means that the downstream node

is requested to receive datagrams from the Dedicated-VC.

In the case of the downstream-initiated control, the downstream node

takes the initiative when setting up a Dedicated-VC for a specific IP

flow and creating the mapping relationship between the IP flow and

the Dedicated-VC. For example, a CSR which detects datagrams for ftp

sets up (or fetches) a Dedicated-VC toward its upstream neighbor and

requests its upstream neighbor to transmit a specific IP flow over

the Dedicated-VC. This means that the upstream node is requested to

transmit the IP flow over the Dedicated-VC.

c) Hard-state management vs. Soft-state management

The third item to be discussed is whether the control (setup,

maintain, and release) of the Bypass-pipe is based on hard-state or

soft-state.

In hard-state management, individual nodes transmit Bypass-pipe

control messages only when they want to notify or request any change

in their neighbors' state. They should wait for an acknowledgement

of the message before they change their internal state. For example,

after setting up a Bypass-pipe, it is maintained until either of a

peer nodes transmits a message to release the Bypass-pipe.

In soft-state management, individual nodes periodically transmit

Bypass-pipe control messages in order to maintain their neighbors'

state. They do not have to wait for an acknowledgement of the

message before they changes its internal state. For example, even

after setting up a Bypass-pipe, either of a peer nodes is required to

periodically transmit refresh messages to its neighbor in order to

maintain the Bypass-pipe.

5. Security Considerations

Security issues are not discussed in this memo.

6. Summary

Basic concept of Cell Switch Router (CSR) are clarified and control

architecture for CSR is discussed. A number of methods to control

Bypass-pipe will be possible each of which has its own advantages and

disadvantages. Further investigation and discussion will be

necessary to design control protocol which may depend on the

requirements by users.

7. References

[IPMC96] Armitage, G., "Support for Multicast over UNI 3.0/3.1 based

ATM Networks", RFC2022, November 1996.

[ATM3.1] The ATM-Forum, "ATM User-Network Interface Specification,

v.3.1", Sept. 1994.

[RSVP13] Braden, R., et al., "Resource ReSerVation Protocol (RSVP),

Version 1 Functional Specification", Work in Progress.

[IPNNI96] R. Callon, et al., "Issues and Approaches for Integrated

PNNI", The ATM Forum Contribution No. 96-0355, April 1996.

[NHRP09] Luciani, J., et al., "NBMA Next Hop Resolution Protocol

(NHRP)", Work in Progress.

[PNNI1.0] The ATM-Forum, "P-NNI Specification Version 1.0", March

1996.

[RFC1483] Heinanen, J., "Multiprotocol Encapsulation over ATM

Adaptation Layer 5", RFC1483, July 1993.

[RFC1577] Laubach, M., "Classical IP and ARP over ATM", RFC1577,

October 1993.

[RFC1819] Delgrossi, L, and L. Berger, "Internet STream Protocol

Version 2 (STII) Protocol Specification Version ST2+", RFC1819,

August 1995.

8. Authors' Addresses

Yasuhiro Katsube

R&D Center, Toshiba

1 Komukai Toshiba-cho, Saiwai-ku, Kawasaki 210

Japan

Phone : +81-44-549-2238

EMail : katsube@isl.rdc.toshiba.co.jp

Ken-ichi Nagami

R&D Center, Toshiba

1 Komukai Toshiba-cho, Saiwai-ku, Kawasaki 210

Japan

Phone : +81-44-549-2238

EMail : nagami@isl.rdc.toshiba.co.jp

Hiroshi Esaki

R&D Center, Toshiba

1 Komukai Toshiba-cho, Saiwai-ku, Kawasaki 210

Japan

Phone : +81-44-549-2238

EMail : hiroshi@isl.rdc.toshiba.co.jp

 
 
 
免责声明:本文为网络用户发布,其观点仅代表作者个人观点,与本站无关,本站仅提供信息存储服务。文中陈述内容未经本站证实,其真实性、完整性、及时性本站不作任何保证或承诺,请读者仅作参考,并请自行核实相关内容。
2023年上半年GDP全球前十五强
 百态   2023-10-24
美众议院议长启动对拜登的弹劾调查
 百态   2023-09-13
上海、济南、武汉等多地出现不明坠落物
 探索   2023-09-06
印度或要将国名改为“巴拉特”
 百态   2023-09-06
男子为女友送行,买票不登机被捕
 百态   2023-08-20
手机地震预警功能怎么开?
 干货   2023-08-06
女子4年卖2套房花700多万做美容:不但没变美脸,面部还出现变形
 百态   2023-08-04
住户一楼被水淹 还冲来8头猪
 百态   2023-07-31
女子体内爬出大量瓜子状活虫
 百态   2023-07-25
地球连续35年收到神秘规律性信号,网友:不要回答!
 探索   2023-07-21
全球镓价格本周大涨27%
 探索   2023-07-09
钱都流向了那些不缺钱的人,苦都留给了能吃苦的人
 探索   2023-07-02
倩女手游刀客魅者强控制(强混乱强眩晕强睡眠)和对应控制抗性的关系
 百态   2020-08-20
美国5月9日最新疫情:美国确诊人数突破131万
 百态   2020-05-09
荷兰政府宣布将集体辞职
 干货   2020-04-30
倩女幽魂手游师徒任务情义春秋猜成语答案逍遥观:鹏程万里
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案神机营:射石饮羽
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案昆仑山:拔刀相助
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案天工阁:鬼斧神工
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案丝路古道:单枪匹马
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:与虎谋皮
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:李代桃僵
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:指鹿为马
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案金陵:小鸟依人
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案金陵:千金买邻
 干货   2019-11-12
 
推荐阅读
 
 
 
>>返回首頁<<
 
靜靜地坐在廢墟上,四周的荒凉一望無際,忽然覺得,淒涼也很美
© 2005- 王朝網路 版權所有