1 / 17

Tag Switching Architecture Overview

Tag Switching Architecture Overview. Qingfeng Zhuge Fangxia Li Xin Jiang. Topic Organization. Part I Tag Switching Architecture -- Qingfeng Zhuge Part II Tag Switching with Multicast, QoS and Flexible Routing -- Xin Jiang Part III Tag Switching Application (ATM) -- Fangxia Li.

favian
Télécharger la présentation

Tag Switching Architecture Overview

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Tag Switching Architecture Overview Qingfeng Zhuge Fangxia Li Xin Jiang

  2. Topic Organization • Part I Tag Switching Architecture -- Qingfeng Zhuge • Part II Tag Switching with Multicast, QoS and Flexible Routing -- Xin Jiang • Part III Tag Switching Application (ATM) -- Fangxia Li

  3. Switching • Data packet forwarding • Resource competition, allocation and release along the data flow path

  4. Why Tag Switching • Higher forwarding performance • Scaling properties of internet routing system • Flexible traffic control • Support evolution to accommodate new and emerging requirement

  5. Tag Switch– A Multi-Protocol Solution • Combine network-layer routing with label-swapping forwarding • Supply flexibility and rich functionality by routing • Supply simplicity and high performance by label-swapping forwarding • A multi-layer integration solution with routers, switches as peer network devices

  6. Tag Switching Architecture

  7. Two components:forwarding and control • Forwarding component -- forward packets based only on tags -- no redundant network-layer header analysis

  8. Cont. • Control component -- a set of software modules used to distribute and maintain the tag information inside a tagged network domain -- different module support different routing protocol

  9. Forwarding component-- a table look-up structure • FIB – a condensed form of routing table, reside in cache • TIB – tags allocated locally for each entry in FIB • TFIB – constructed by both FIB and TIB to implement tag binding

  10. Forwarding component mechanism • Table look-up • Replace the incoming packet’s tag by outgoing tag and interface information • Tag encapsulation

  11. Advantages of forwarding component • Compared to conventional longest match forwarding • Independent of forwarding granularity • Independent of network-layer protocols • A TFIB per switch or per interface or mix of both

  12. Control component • Create tags • Complete the binding between a tag and network-layer routes • Distribute the tag binding information among tag switches

  13. Control component implementation • Piggy-backing an existing control protocol • By special protocol, such as TDP in tag switching

  14. Advantages of control component • Simplify the overall system behavior • Reduce traffic load • Support multiple network-layer routing protocol • Support variety of forwarding granularities: unicast, multicast, flexible routing, QoS routing, RSVP session

  15. Tag distribution mechanisms • Downstream • Downstream on demand • Upstream

  16. Dependencies and constraints • FIB must be get from routing protocol, such as OSPF, BGP • Must support conventional network-layer routing protocol on edge and maybe also some fraction of the tagged network. • Must implement a mechanism for tag distribution

  17. Observation • Tags less than routes in FIB • Tag allocation is driven by control traffic rather and data traffic • Need header analysis and flow classification only on tagged network edge • Decrease the overall complexity and traffic load in the network

More Related