OpenRFC.org Requests For Comments ... for the community
Welcome to OpenRFC
Home Full RFC index RFC humour Our technology
 
RFC 3186
MAPOS/PPP Tunneling mode.
S. Shimizu, T. Kawano, K. Murakami, E. Beier. December 2001.

 
[Direct link][Download PDF version][Download text version]
 

Network Working Group S. Shimizu Request for Comments: 3186 T. Kawano Category: Informational K. Murakami NTT Network Innovation Labs. E. Beier DeTeSystem December 2001 MAPOS/PPP Tunneling mode Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (2001). All Rights Reserved. IESG Note This memo documents a way of tunneling PPP over Sonet over MAPOS networks. This document is NOT the product of an IETF working group nor is it a standards track document. It has not necessarily benefited from the widespread and in depth community review that standards track documents receive. Abstract This document specifies tunneling configuration over MAPOS (Multiple Access Protocol over SONET/SDH) networks. Using this mode, a MAPOS network can provide transparent point-to-point link for PPP over SONET/SDH (Packet over SONET/SDH, POS) without any additional overhead. 1. Introduction MAPOS [1][2] frame is designed to be similar to PPP over SONET/SDH (Packet over SONET/SDH, POS)[3][4] frame (Figure 1). Shimizu, et al. Informational [Page 1]
RFC 3186 MAPOS/PPP Tunneling mode December 2001 a) MAPOS frame header (version 1) +-----------+-----------+-----------+-----------+ | Address | Control | Protocol | | 8 bits | fixed,0x03| 16 bits | +-----------+-----------+-----------+-----------+ b) MAPOS frame header (MAPOS 16) +-----------+-----------+-----------+-----------+ | Address | Protocol | | 16bits | 16 bits | +-----------+-----------+-----------+-----------+ c) PPP frame header +-----------+-----------+-----------+-----------+ | Address | Control | Protocol | | fixed,0xFF| fixed,0x03| 16 bits | +-----------+-----------+-----------+-----------+ Figure 1. Header similarity of MAPOS frame and POS frame This means that a MAPOS network can easily carry POS frames with no additional header overhead by rewriting only 1 or 2 octets. PPP tunneling configuration over MAPOS networks (MAPOS/PPP tunneling mode) provides for efficient L2 multiplexing by which users can share the cost of high speed long-haul links. This document specifies MAPOS/PPP tunneling mode. In this mode, a MAPOS network provides a point-to-point link for those who intend to connect POS equipment. Such link is established within a MAPOS switch, or between a pair of MAPOS switches that converts between POS header and MAPOS header for each L2 frame. Chapter 2 describes the specification in two parts. First part is user network interface (UNI) specification and the second part is operation, administration, management and provisioning (OAM&P) description. Other issues such as congestion avoidance, end-to-end fairness control are out of scope of this document. Implementation issues are discussed in Chapter 3. Security considerations are noted in Chapter 4. Shimizu, et al. Informational [Page 2]
RFC 3186 MAPOS/PPP Tunneling mode December 2001 2. MAPOS/PPP tunneling mode 2.1 Overview MAPOS/PPP tunneling mode is based on header rewriting. Figure 2. shows an example of MAPOS/PPP tunneling mode. The MAPOS network uses MAPOS 16 [2] in this example. Consider a tunneling path between customer premise equipment (CPE) A and CPE B which are industry standard POS equipment. The ingress/egress MAPOS switches A/B assigns unique MAPOS addresses (0x0203 and 0x0403) to the CPEs. These MAPOS addresses are used in the MAPOS network, for frame forwarding between CPE A and CPE B. NSP [5] will not be running between the CPEs and the switches in this case. MAPOS switch A rewrites the first 2 octets of every frame from CPE A, which are fixed as 0xFF and 0x03, to the MAPOS address of its peer, which is 0x0403. Frames are forwarded by the MAPOS network and arrives at the egress MAPOS switch B which rewrites the first 2 octets to their original values. If MAPOS v1 [1] is used in the MAPOS network, only the first octet is rewritten. +-----+ POS/0x0203 +--------+ +--------+ |CPE A|<---------->|MAPOS | MAPOS |MAPOS |<--- +-----+ --->|switch A|------------------|switch |<--- +--------+\__ Network __/ +--------+ \__ __/ +--------+ +-|-----|-+ POS/0x0403 +-----+ --->|MAPOS |----|MAPOS |<---------->|CPE B| --->|switch | |switch B |<--- +-----+ +--------+ +---------+ Figure 2. MAPOS/PPP tunneling mode The tunneling path between the two CPEs is managed by the ingress/egress MAPOS switches. 2.2 User-Network Interface(UNI) 2.2.1 Physical Layer For transport media between border MAPOS switch and CPE, SONET/SDH signal is utilized. Signal speed, path signal label, light power budget and all physical requirements are the same as those of PPP over SONET/SDH [3]. Shimizu, et al. Informational [Page 3]
RFC 3186 MAPOS/PPP Tunneling mode December 2001 SONET/SDH overheads are terminated at the ingress/egress switches. SONET/SDH performance monitors and alarms are used for the link management between a CPE and the switch. Inter-switch links are similarly managed by SONET/SDH monitors and alarms. A CPE should synchronize to the clock of the border MAPOS switch. The corresponding port of the MAPOS switch uses its internal clock. When the CPE is connected to the MAPOS switch through SONET/SDH transmission equipment, both should synchronize to the clock of the SONET/SDH transmission equipment. 2.2.2 Link layer Link layer framing between CPE and MAPOS switch also follows the specification of PPP over SONET/SDH [3]. HDLC operation including byte stuffing, scrambling, FCS generation is terminated at the ingress/egress switch. In a MAPOS switch, HDLC frame [4] is picked up from a SONET/SDH payload and the first octet (HDLC address) for MAPOS v1 [1], or the first two octets (HDLC address and control field) for MAPOS 16 [2] are rewritten. The operation inside the border switch is as follows: From CPE (Ingress Switch receiving): SONET/SDH framing -> X^43+1 De-scrambling -> HDLC Byte de-stuffing -> HDLC FCS detection (if error, silently discard) -> L2 HDLC address/control rewriting (0xFF -> MAPOS v1 destination address, or 0xFF03 -> MAPOS 16 destination address) -> MAPOS-FCS generation -> HDLC Byte stuffing -> X^43+1 Scrambling -> SONET/SDH framing To CPE (Egress Switch transmitting): SONET/SDH framing -> X^43+1 De-scrambling -> HDLC Byte de-stuffing -> MAPOS-FCS detection (if error, silently discard) -> L2 HDLC address/control rewriting (MAPOS v1 address -> 0xFF, or MAPOS 16 address -> 0xFF03) -> HDLC FCS generation -> HDLC Byte stuffing -> X^43+1 Scrambling -> SONET/SDH framing Shimizu, et al. Informational [Page 4]
RFC 3186 MAPOS/PPP Tunneling mode December 2001 For STS-3c-SPE/VC-4, non-scrambled frame can be used for compatibility with RFC 1619. However, the use of 32bit-CRC and X^43+1 scrambling is recommended in RFC2615 [3] and for MAPOS networks. Maximum transmission unit (MTU) of the link must not be negotiated larger than MAPOS-MTU which is 65280 octets. Figure 3 shows a CPE-side L2 frame and the converted frame in the ingress/egress MAPOS switches. Note that the MAPOS/PPP tunneling mode is not a piggy-back encapsulation, but it is a transparent link with no additional header overhead. <--- Transmission +----------+----------+----------+----------+ | Flag | Address | Control | Protocol | | 01111110 | 11111111 | 00000011 | 16 bits | +----------+----------+----------+----------+ +-------------+---------+----------+----------+----------------- | Information | Padding |HDLC FCS | Flag | Inter-frame Fill | * | * |16/32 bits| 01111110 | or next Address +-------------+---------+----------+----------+----------------- (a) HDLC frame from/to CPE <--- Transmission +----------+----------+----------+----------+ | Flag | MAPOS Destination | Protocol | | 01111110 | 0xxxxxx0 | xxxxxxx1 | 16 bits | +----------+----------+----------+----------+ +-------------+---------+----------+----------+----------------- | Information | Padding |MAPOS FCS | Flag | Inter-frame Fill | * | * |16/32 bits| 01111110 | or next Address +-------------+---------+----------+----------+----------------- (b) Converted MAPOS 16 frame, forwarded in MAPOS networks Figure 3. HDLC frame from/to CPE and its conversion 2.3 Operation, Administration, Management and Provisioning (OAM&P) 2.3.1 MAPOS/PPP mode transition When a port of MAPOS switch is configured to PPP tunneling mode, at least the following operations are performed in the switch. a) Disable NSP [5] and SSP [6] (for the port, same below) b) Disable MAPOS broadcast and multicast forwarding Shimizu, et al. Informational [Page 5]
RFC 3186 MAPOS/PPP Tunneling mode December 2001 c) Reset the Path Signal Label (C2) to 0x16 if X^43+1 scrambling is used. The value 0xCF is used for non-scrambled OC3c signal. d) Enable header rewriting function to specified destination address When the port is configured back to MAPOS mode, reverse order of the operations above are performed. That means; a) Disable header rewriting function (for the port, same below) b) Reset the Path Signal Label (C2) to MAPOS default (0x8d) c) Enable MAPOS broadcast and multicast forwarding d) Enable NSP and SSP SONET/SDH alarms (B1/B2/B3 error exceeding, SLOF, SLOS, etc.) should not affect this transition. Figure 4 shows mode transition described above. [MAPOS mode] <----------------------------+ | | (Disable NSP) (Enable NSP) (Disable SSP) (Enable SSP) (Disable Broadcast/ (Enable Broadcast/ Multicast forwarding) Multicast forwarding) (C2-byte setting to 0x16 or 0xcf) (C2-byte setting to 0x8d) (Enable Header Rewriting function) (Disable Header Rewriting | | function) v | [PPP mode] --------------------------------+ Figure 4. MAPOS/PPP tunneling mode state transition diagram 2.3.2 Path Establishment A MAPOS/PPP tunneling path is established by following steps. a) Choose MAPOS address pair on both ingress/egress switches and configure their ports to PPP tunneling mode (see 2.3.1). b) When the routes for both directions become stable, the tunneling path is established. The link between the CPEs may be set up at that moment; PPP LCP controls are transparently exchanged by the CPEs. To add a new path, operators should pick unused MAPOS address-pair. They may be determined simply by choosing switches and ports for each CPE, because there is one-to-one correspondence between MAPOS addresses and switch ports. Shimizu, et al. Informational [Page 6]
RFC 3186 MAPOS/PPP Tunneling mode December 2001 Then, those ports should be configured to MAPOS/PPP tunneling mode on both of the switches. Frame reachability is provided by SSP [6] in the MAPOS network. When the frame forwarding for each direction are stable, the path is established and frame forwarding is started. Until then, the link between border switches and CPE should be down. A MAPOS/PPP tunneling path should be managed by the pair of MAPOS addresses. It should be carefully handled to avoid misconfiguration such as path duplication. For convenient management, path database can be used to keep information about pairs of MAPOS addresses. Note that the path database is not used for frame forwarding. It is for OAM&P use only. 2.3.3 Failure detection and indication When any link or node failure is detected, it should be indicated to each peer of the path. This is done by PPP [7] keep-alive (LCP Echo request/reply) for end-to-end detection. Consideration is required to handle SONET/SDH alarms. When a link between CPE and the MAPOS switch fails, it is detected by both the MAPOS switch and the CPE seeing SONET/SDH alarms. However, far-side link remains up and no SONET/SDH error is found; SONET/SDH alarms are not transferred to the far end because each optical path is terminated in MAPOS network. In this case, the far end will see 'link up, line protocol down' status due to keep-alive expiration. For example, Figure 5 shows a tunneling path. When link 1 goes down, MAPOS sw A and CPE A detects SONET/SDH alarms but MAPOS sw B and CPE A' do not see this failure. When PPP keep-alive expires, CPE A' detects the failure and stops the packet transmission. The same mechanism is used for failure within the MAPOS cloud (link 2). When a MAPOS switch is down, SSP handles it as a topology change. 1 2 3 CPE A <-x-> MAPOS sw A ---(MAPOS cloud)--- MAPOS sw B <---> CPE A' Figure 5. Link failure 2.3.4 Path removal A MAPOS/PPP tunneling path is removed by following steps. a) Choose the path to remove, configure MAPOS switches on both ends of the path to disable the ports connected to the CPEs. b) Path database may be updated that the path is removed. Shimizu, et al. Informational [Page 7]
RFC 3186 MAPOS/PPP Tunneling mode December 2001 c) When CPE is detached, port may be reset to MAPOS default configurations. Frames arriving after the destination port was disabled should be silently discarded and should not be forwarded to the port. 2.3.5 Provisioning and Design Consideration Because MAPOS does not have any QoS control at its protocol level, and POS does not have flow-control feature, it is difficult to guarantee end-end throughput. Sufficient bandwidth for inter-switch link should be prepared to support all paths on the link. Switches are recommended to ensure per-port fairness using any appropriate queuing algorithm. This is especially important for over-subscribed configuration, for example to have more than 16 OC12c paths on one OC192c inter-switch link. Although MAPOS v1 can be applied to the MAPOS/PPP tunneling mode, MAPOS 16 is recommended for ease of address management. Automatic switch address negotiation mechanism is not suitable for the MAPOS/PPP tunneling mode, because the path management mechanism becomes much more complex. 3. Implementation 3.1 Service example Figure 6 shows an example of MAPOS network with four switches. Inter-switch links are provided at OC192c and OC48c rate, customer links are either OC3c or OC12c rate. Some links are optically protected. Path database is used for path management. Using MAPOS-netmask with 8 bits, this topology can be extended up to 64 MAPOS switches, each equipped with up to 127 CPE ports. Switch addresses are fixed to pre-assigned values. The cost of optical protection (< 50ms) can be shared among paths. Unprotected link can also be coupled for more redundancy in case of link failure. SSP provides restoration path within few seconds. Shimizu, et al. Informational [Page 8]
RFC 3186 MAPOS/PPP Tunneling mode December 2001 0x2003+---------+ +---------+ 0x2203 A----->| MAPOS | OC192c(protected) | MAPOS |<-------A' 0x2005| Switch 1|=======================| Switch 2| 0x2205 B----->| 0x2000/8| _________| 0x2200/8|<-------C' +---------+ / +---------+ OC192c| / | / OC48c(backup) +---------+ / +---------+ 0x2603 | MAPOS |_________/ | MAPOS |<-------B' 0x2405| Switch 3|=======================| Switch 4| C----->| 0x2400/8| OC192c(protected) | 0x2600/8| +---------+ +---------+ Path database entries: ----------------------------------------------------------- User : Speed : Mode : Address pair : Status ----------------------------------------------------------- A-A' : OC3c : CRC32, scramble : 0x2003-0x2203 : Up and running B-B' : OC12c : CRC32, scramble : 0x2005-0x2603 : B Down C-C' : OC3c : CRC16, no-scram : 0x2405-0x2205 : C' Down ----------------------------------------------------------- Figure 6. Example Topology and its Path Management 3.2 Evaluation of latency of reference implementation Figure 7 shows evaluation platforms in terms of latency measurement of MAPOS/PPP tunneling mode. Shimizu, et al. Informational [Page 9]
RFC 3186 MAPOS/PPP Tunneling mode December 2001 Case 1: Base latency measurement Measurement Equipment +---------+ POS Unidirectional Flow, OC12c 30%, FCS 32bits, | IXIA 400| payload-scrambling on (same for all cases) | POS-LM |<--+ | OC12c x2|---+ Loopback +---------+ (Using IxSoftware v3.1.148/SP1d) Case 2: Router latency measurement Measurement Device Under Test +---------+ POS +------------+ | IXIA 400| Unidirectional Flow | Cisco GSR | | POS-LM |<---------------------| 12008/1port| | OC12c x2|--------------------->| OC12cLC x2 | +---------+ +------------+ (Using IOS 12.0(15)S1) Case 3: MAPOS/PPP tunneling switch latency measurement Measurement Device Under Test +---------+ POS +-------------+ | IXIA 400| Unidirectional Flow | CSR MAPOS | | POS-LM |<---------------------| CORESwitch80| | OC12c x2|--------------------->| OC12c x2 | +---------+ +-------------+ Figure 7. Latency measurement of reference platform for MAPOS/PPP tunneling mode There is a PPP connection between port 1 and 2 of the measurement equipment. Traffic comes from measurement equipment (IXIA 400) and forwarded by a device under test back to the equipment. Timestamping and latency calculation are performed by IXIA 400 automatically. Traffic Load is set to 30% of OC12c for offloading router. Results are shown in Table 1. Measurements were taken according to the RFC2544 requirements [8]. We measured 25 trials of 150 seconds duration for each frame size. Results are averaged and rounded to the 20 ns resolution of IXIA. 95% confidence interval (C.I.) value are also rounded. Shimizu, et al. Informational [Page 10]
RFC 3186 MAPOS/PPP Tunneling mode December 2001 -------------------------------------------------------------------- Frame size (bytes) 64 128 256 512 1024 1280 1518 -------------------------------------------------------------------- Latency(ns) -------------------------------------------------------------------- Case 1: Baseline 4060 5640 6940 9840 16420 20700 23340 95% C.I.(+/-) 20 80 60 180 80 100 120 -------------------------------------------------------------------- Case 2: Router 26560 28760 33860 44600 68280 80500 91160 95% C.I.(+/-) 200 100 160 220 100 100 200 -------------------------------------------------------------------- Case 3: Switch 11100 13480 16620 22920 36380 43900 49920 95% C.I.(+/-) 120 120 120 200 100 160 120 -------------------------------------------------------------------- Table 1. Results of Latency (ns) - Frame size (bytes) This results shows that MAPOS/PPP tunneling mode does not cause any performance degradation in terms of latency view. A POS L2 switch was reasonably faster than a L3 router. 4. Security Considerations There is no way to control or attack a MAPOS network from CPE side under PPP tunneling mode. It is quite difficult to inject other stream because it is completely transparent from the viewpoint of the CPE. However, operators must carefully avoid misconfiguration such as path duplication. Per-path isolation is extremely important; switches are recommended to implement this feature (like VLAN mechanism). In addition, potential vulnerability still exists in a mixed environment where PPP tunneling mode and MAPOS native mode coexists in the same network. Use of such environment is not recommended, until an isolation feature is implemented in all MAPOS switches in the network. Note that there is no source address field in the MAPOS framing, which may make path isolation difficult in a mixed MAPOS/PPP environment. Shimizu, et al. Informational [Page 11]
RFC 3186 MAPOS/PPP Tunneling mode December 2001 5. References [1] Murakami, K. and M. Maruyama, "MAPOS - Multiple Access Protocol over SONET/SDH Version 1", RFC 2171, June 1997. [2] Murakami, K. and M. Maruyama, "MAPOS 16 - Multiple Access Protocol over SONET/SDH with 16 Bit Addressing", RFC 2175, June 1997. [3] Malis, A. and W. Simpson, "PPP over SONET/SDH", RFC 2615, June 1999. [4] Simpson, W., "PPP in HDLC-like Framing", STD 51, RFC 1662, July 1994. [5] Murakami, K. and M. Maruyama, "A MAPOS version 1 Extension - Node Switch Protocol," RFC 2173, June 1997. [6] Murakami, K. and M. Maruyama, "A MAPOS version 1 Extension - Switch-Switch Protocol", RFC 2174, June 1997. [7] Simpson, W., "The Point-to-Point Protocol (PPP)", STD 51, RFC 1661, July 1994. [8] Bradner, S. and J. McQuaid, "Benchmarking Methodology for Network Interconnect Devices", RFC 2544, March 1999. 6. Acknowledgments The authors would like to acknowledge the contributions and thoughtful suggestions of Takahiro Sajima. Shimizu, et al. Informational [Page 12]
RFC 3186 MAPOS/PPP Tunneling mode December 2001 7. Author's Address Susumu Shimizu NTT Network Innovation Laboratories, 3-9-11, Midori-cho Musashino-shi Tokyo 180-8585 Japan Phone: +81 422 59 3323 Fax: +81 422 59 3765 EMail: shimizu@ntt-20.ecl.net Tetsuo Kawano NTT Network Innovation Laboratories, 3-9-11, Midori-cho Musashino-shi Tokyo 180-8585 Japan Phone: +81 422 59 7145 Fax: +81 422 59 4584 EMail: kawano@core.ecl.net Ken Murakami NTT Network Innovation Laboratories, 3-9-11, Midori-cho Musashino-shi Tokyo 180-8585 Japan Phone: +81 422 59 4650 Fax: +81 422 59 3765 EMail: murakami@ntt-20.ecl.net Eduard Beier DeTeSystem GmbH Merianstrasse 32 D-90409 Nuremberg, Germany EMail: Beier@bina.de Shimizu, et al. Informational [Page 13]
RFC 3186 MAPOS/PPP Tunneling mode December 2001 8. Full Copyright Statement Copyright (C) The Internet Society (2001). All Rights Reserved. This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist in its implementation may be prepared, copied, published and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this paragraph are included on all such copies and derivative works. However, this document itself may not be modified in any way, such as by removing the copyright notice or references to the Internet Society or other Internet organizations, except as needed for the purpose of developing Internet standards in which case the procedures for copyrights defined in the Internet Standards process must be followed, or as required to translate it into languages other than English. The limited permissions granted above are perpetual and will not be revoked by the Internet Society or its successors or assigns. This document and the information contained herein is provided on an "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Acknowledgement Funding for the RFC Editor function is currently provided by the Internet Society. Shimizu, et al. Informational [Page 14]

   

[Home] [Full RFC index] [RFC humour] [Our technology]

Copyright © Inter-Corporate Computer & Network Services, Inc.  All rights reserved.
All trademarks and RFC contents are the property of their respective owners.