Free Essay

Ospf White Paper

In:

Submitted By stutheart
Words 6315
Pages 26
WHITE PAPER

BIDIRECTIONAL FORWARDING DETECTION FOR OSPF

Fast Failure Detection to Speed Network Convergence

OVERVIEW In both Enterprise and Service Provider networks, the convergence of business-critical applications onto a common IP infrastructure is becoming more common. Given the criticality of the data, these networks are typically constructed with a high degree of redundancy. While such redundancy is desirable, its effectiveness is dependant upon the ability of individual network devices to quickly detect failures and reroute traffic to an alternate path. This detection is now typically accomplished via hardware detection mechanisms. However, the signals from these mechanisms are not always conveyed directly to the upper protocol layers. When the hardware mechanisms do not exist (eg: Ethernet) or when the signaling does not reach the upper protocol layers, the protocols must rely on their much slower strategies to detect failures. The detection times in existing protocols are typically greater than one second, and sometimes much longer. For some applications, this is too long to be useful. Bi-directional Forwarding Detection (BFD) provides rapid failure detection times between forwarding engines, while maintaining low overhead. It also provides a single, standardized method of link/device/protocol failure detection at any protocol layer and over any media. THE PROBLEM WITH CONVERGENCE The process of network convergence can be broken up into a set of discreet events*: • Failure detection: the speed with which a device on the network can detect and react to a failure of one of its own components, or the failure of a component in a routing protocol peer. • Information dissemination: the speed with which the failure in the previous stage can be communicated to other devices in the network • Repair: the speed with which all devices on the network—having been notified of the failure—can calculate an alternate path through which data can flow. An improvement in any one of these stages provides an improvement in overall convergence. The first of these stages—failure detection—can be the most problematic and inconsistent. • Different routing protocols use varying methods and timers to detect the loss of a routing adjacency with a peer • Link-layer failure detection times can vary widely depending on the physical media and the Layer 2 encapsulation used • Intervening devices (eg: Ethernet switch) can hide link-layer failures from routing protocol peers Packet over SONET (POS) tends to have the best failure detection time amongst the different Layer 1/2 media choices. It can typically detect and react to media or protocol failures in ~50 milliseconds. This has become the benchmark against which other protocols are measured. BFD can provide fast failure detection times for all media types, encapsulations, topologies, and routing protocols. In the best-case scenario, it can provide fast failure detection similar to that found in POS.
* The stages of convergence listed here provide a high-level overview of the process. Each stage could be further subdivided into several sub-stages.

All contents are Copyright © 1992–2005 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 1 of 17

A secondary benefit of BFD, in addition to fast failure detection, is that it provides network administrators with a consistent method of detecting failures. Thus, one availability methodology could be used, irrespective of the Interior Gateway Protocol (IGP) or the topology of the target network. This eases network profiling and planning, because reconvergence time should be consistent and predictable. Common BFD applications include: • Control plane liveliness detection • Tunnel endpoint liveliness detection • A trigger mechanism for IP/MPLS Fast ReRoute • MPLS Label Switching Protocol date plane failure detection HOW BFD WORKS* BFD verifies connectivity between two systems. In the first phase of development, Cisco will support BFD Asynchronous mode, which depends on the transmission of BFD control packets between the two systems. BFD Packet Formats The Internet Draft for BFD does not specify a specific encapsulation type for BFD control packets; rather, it recommends the use of an encapsulation “appropriate to the medium and the network”. Because the first phase implementation from Cisco will focus on verifying IP connectivity, UDP encapsulation will be used. BFD payload control packets will be encapsulated in UDP packets, using destination port 3784 and a source port in the range of 49152 to 65535**. Even on shared media, like Ethernet, BFD control packets are always sent as unicast packets to the BFD peer. The payload of a BFD Control packet (defined in the BFD Internet Draft) is illustrated in Figure 1, with some additional comments relevant to the Cisco implementation. Figure 1. BFD Control Packet Payload

*

Cisco implementation of BFD is based on an Internet Engineering Task Force (IETF) draft. The complete text of the draft can be found at the IETF BFD Working Group page at http://www.ietf.org/html.charters/bfd-charter.html. Cisco implementation of BFD will be released in phases, with additional functionality and platform support added in each phase. The IETF draft describes some capabilities, which may not be implemented until subsequent phases.

** This conforms to another IETF Draft which specifies how BFD should be used in single-hop IPv4 or IPv6. For more information, see the IETF BFD Working Group page: http://www.ietf.org/html.charters/bfd-charter.html

© 2005 Cisco Systems, Inc. All rights reserved. Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com. Page 2 of 18

Field Vers Diag

Description

The version number of the protocol. The initial protocol version is 0. A diagnostic code specifying the local system's reason for the last transition of the session from Up to some other state. Possible values are: 0—No Diagnostic 1—Control Detection Time Expired 2—Echo Function Failed 3—Neighbor Signaled Session Down 4—Forwarding Plane Reset 5—Path Down 6—Concatenated Path Down 7—Administratively Down

H Bit

The “I Hear You” bit. This bit is set to 0 if the transmitting system either is not receiving BFD packets from the remote system, or is in the process of tearing down the BFD session for some reason. Otherwise, during normal operation, it is set to 1.

D Bit P Bit F Bit

The “Demand Mode” bit. If set, the transmitting system wishes to operate in Demand Mode*. The Poll bit. If set, the transmitting system requesting verification of connectivity, or of a parameter change. The Final bit. If set, the transmitting system is responding to a received BFD Control packet that had the Poll (P) bit set.

Rsvd Detect Mult

Reserved bits. These bits must be zero on transmit, and ignored on receipt. Detect time multiplier. The negotiated transmit interval, multiplied by this value, provides the detection time for the transmitting system in Asynchronous mode. If the reader is familiar with IGP HELLO protocol mechanisms, this is analogous to the hello-multiplier in ISIS, which can be used to determine the hold-timer. (hello-interval)* (hello-multiplier) = hold-timer. If a HELLO is not received within the hold-timer, a failure has occurred. Similarly in BFD – (transmit interval) * (detect multiplier) = detect-timer. If a BFD control packet is not received from the remote system within detect-timer, a failure has occurred.

Length My Discriminator

Length of the BFD Control packet, in bytes. A unique, nonzero discriminator value generated by the transmitting system, used to demultiplex multiple BFD sessions between the same pair of systems.

© 2005 Cisco Systems, Inc. All rights reserved. Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com. Page 3 of 18

Field Your Discriminator

Description

The discriminator received from the corresponding remote system. This field reflects back the received value of My Discriminator, or is zero if that value is unknown.

Desired Min TX Interval

This is the minimum interval, in microseconds, that the local system would like to use when transmitting BFD Control packets.

Required Min RX Interval

This is the minimum interval, in microseconds, between received BFD Control packets that this system is capable of supporting.

Required Min Echo RX Interval

This is the minimum interval, in microseconds, between received BFD Echo packets that this system is capable of supporting. If this value is zero, the transmitting system does not support the receipt of BFD Echo packets. The first phase of the Cisco BFD implementation does not support the use of Echo packets.

*

BFD has two different modes: Asynchronous and Demand. In the first phase of BFD development, Cisco will support Asynchronous mode. All subsequent discussion in this section will assume that Asynchronous mode is being used. See the previously referenced Internet Draft for more detail on the differences between these modes.

BFD Initial Session Setup To better understand how BFD is implemented, consider an example. Imagine two routers, each of which runs EIGRP, connected over a common medium. Both routers have just started up, so no BFD session has been established. In each router, EIGRP informs the BFD process of the IP address of the neighbor that it needs to monitor. It is important to note that BFD does not discover its peers dynamically. It relies on the configured routing protocols to tell it which IP addresses to use and which peer relationships to form. BFD on each router will form a BFD control packet. These packets are sent at a minimum of one-second intervals* until a BFD session is established. They may cross in transmission, although BFD is designed to adapt to this condition. The initial packets from either side will be very similar: Vers, Diag, the H, D, P, and F bits will all be set to zero. My Discriminator will be set to a value which is unique on the transmitting router; Your Discriminator is set to zero, because the BFD session has yet to be established**. The values of the TX and RX timers will be set to the values found in the configuration of the device. After the remote router receives a BFD control packet during the session initiation phase, it will copy the value of the “My Discriminator” field into its own “Your Discriminator” field and set the H (“I Hear You”) bit for any subsequent BFD control packets it transmits. Once both systems see their own Discriminators in each other’s control packets, the session is “officially” established. Both systems will continue to send at (at least) onesecond intervals until they see the appropriate Discriminators in each other’s BFD control packets. The Discriminator values can also be used to multiplex/demultiplex sessions if there are multiple BFD connections between a pair of BFD peers, or to allow the changing of an IP address on a BFD interface without causing the BFD session to be reset. Figure 2 illustrates the initial BFD session setup.
* This value is fixed at one second in the first phase. It may be configurable in later phases. It is also worth noting that the Internet draft for BFD defines two modes for session initiation, Active and Passive. An Active node sends BFD control packets in an effort to establish a BFD session. A Passive node does not send any BFD packets until it receives BFD packets from an Active node. In the first phase, Cisco devices implementing BFD will always be Active nodes.

** Although this example is good for illustrative purposes, it is actually rather unlikely—because it requires near-simultaneous transmission of the initial BFD packet by both systems. The more likely occurrence is that one system sends the initial BFD packet, and the receiving system responds back with the “I Hear You” bit set, the “My/Your Discriminator” and other relevant fields populated.

© 2005 Cisco Systems, Inc. All rights reserved. Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com. Page 4 of 18

Figure 2. BFD Session Setup

Concurrent with the exchange of control packets to establish the BFD session, BFD timers are also negotiated. The negotiation of the initial BFD timers is somewhat anomalous, because—unlike the subsequent timer changes—it occurs without the exchange of Poll and Final (P and F) bits. The P and F bits are used to ensure that the remote device received the packet requesting the timer change. However, this exchange is not required during initial session setup, as the fact that the remote device changed the value of “Your Discriminator” and set the H bit in subsequent packets is sufficient to ensure that it received the currently requested timer values. The next section of this document will discuss the details of timer negotiation. BFD Timer Negotiation The process of BFD timer negotiation between two BFD devices is a very simple one, and occurs in a few steps. A device needs to assure three things before it can negotiate a BFD timer: • That its peer device saw the packet containing the local device’s proposed timers • That it never sends BFD control packets faster than the peer is willing to receive them • That the peer never send BFD control packets faster than the local system is willing to receive them As mentioned earlier, the setting of “Your Discriminator” and the H bit are sufficient to allow the local device to know that the remote device has seen its packets during initial timer exchange. Once these timers have been negotiated, they can be renegotiated at any time during the session without causing a session reset. The existing timers are maintained during the negotiation period, and the new timers do not take effect until they are acknowledge via a Poll bit and Final bit exchange. The device that changed its timers will set the P bit on all subsequent BFD control packets, until it receives a BFD control packet with the F bit set from the remote system. This exchange of bits guards against packets that might otherwise be lost in transit. It is extremely important to note that the setting of the F bit by the remote system does not imply that it accepts the newly proposed timers. It merely indicates that the remote system has seen the packets in which the timers were changed. How, then, are the timers actually negotiated? Each system, upon receiving a BFD control packet will take the “Required Min RX Interval” and compare it to its own “Desired Min TX Interval” and take the greater (slower) of the two values and use it as the transmission rate for its BFD packets. Thus, the slower of the two systems determines the transmission rate.

© 2005 Cisco Systems, Inc. All rights reserved. Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com. Page 5 of 18

Because this comparison is performed independently by either peer, it is possible to have asynchronous transmission rates on the link. That is, one peer will be sending BFD control packets more frequently in one direction than the peer is sending in the other direction. Figure 3 illustrates both Poll/Final bit usage, and timer negotiation: Figure 3. BFD Timer Negotiation

Figure 3 represents the “worst-case scenario” for BFD because Router A proposes radically different timers than already exist; moreover, it loses a packet when it suggests the change. Here is what occurs during this scenario: • Router A and Router B both start in a steady state, with agreed upon timers of 50 ms in both directions • Router A wishes to change its timers to transmit at 25ms and receive at 150 ms. It sends a BFD control packet with the P bit set. Unfortunately this packet is lost in transit. • Router B would have continued to send BFD control packets at 50ms intervals during this exchange. This is not illustrated in Figure 3. • After another 50 ms, Router A resends its request to change the timers. Again it sets the Poll Bit. Remember, because the new timers are not in effect yet, Router A must continue to honor the existing timers. The retransmission thus occurs at the 50ms interval. • Router B sees the packet this time and compares the requested RX interval to its own TX interval. The requested RX interval is larger, so Router B throttles back to sending BFD control packets at 150ms intervals. • Router A receives the packet with the F bit set. The remote timers are still set at 50ms and 50ms. It compares the requested RX interval to its own Desired TX interval of 25ms. The requested RX interval is larger, so Router B continues to send at 50ms intervals • The timer negotiation is complete: Router A sends at 50ms intervals, while Router B sends at 150ms intervals. While the ability to negotiate timers does provide some configuration flexibility, it is anticipated that initial BFD deployments will use identical timer configurations on BFD peers sharing the same media types. Still, timer negotiation does provide some protection against misconfiguration. Even if one peer sets an absurdly low TX or RX timer, the value will be negotiated upwards by a correctly configured peer.
© 2005 Cisco Systems, Inc. All rights reserved. Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com. Page 6 of 18

It is also worth noting that—even though the timers have been negotiated to new values—the actual values in the BFD packets remain at the locallyconfigured settings. For example, although Router B is transmitting at 150ms, an inspection of Router B’s BFD control packet would show its Desired Min TX Interval still set to 50ms. Only an internal timer on the device has changed. The Detect Multiplier is also communicated in the BFD control packets, but is not negotiated, so it is possible to have different detect-timer values at either side of the BFD session. BFD Failure Detection Once the BFD session and appropriate timers have been negotiated, the BFD peers will send BFD control packets to each other at the negotiated interval. As previously mentioned, this assumes BFD Asynchronous mode; BFD Demand mode functions differently. These control packets function as a heartbeat, very similar to an IGP HELLO protocol, except at a more accelerated rate. As long as each BFD peer receives a BFD control packet within the detect-timer period, the BFD session remains up and any routing protocol associated with BFD maintains its adjacencies. If a BFD peer does not receive a control packet within the detect interval, it informs any clients of that BFD session (i.e. any routing protocols) about the failure. It is up to the routing protocol to determine the appropriate response to that information. The typical response will be to terminate the routing protocol peering session and reconverge, bypassing the failed peer. The preceding information brings up three important points: • BFD is a “liveliness” detection protocol, but does not—in itself—determine the correct reaction to a detected failure. • BFD can be used at any protocol layer. It could, for example, detect Physical or Data Link layers failures, if the existing mechanisms did not provide sufficiently speedy detection. However, in the first phase of Cisco BFD support, all BFD clients, particularly the Layer 3 routing protocols (OSPF, IS-IS, EIGRP, and BGP) are at the Network layer. • Although a single BFD session could, theoretically support multiple client protocols monitoring the same peer, Cisco devices will use one BFD session per client protocol in the first phase of BFD support. In other words, if a network is running OSPF and BGP across the same link to the same peer, it would have two discreet BFD sessions.

© 2005 Cisco Systems, Inc. All rights reserved. Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com. Page 7 of 18

If a BFD device fails to receive a BFD control packet within the detect-timer [(Required Minimum RX Interval) * (Detect Multiplier)], then it informs its client protocol that a failure has occurred. Each time a BFD successfully receives a BFD control packet on a BFD session, the detecttimer for that session is reset to zero. Thus, the failure detection is dependant upon received packets, and is independent of when the receiver last transmitted a packet. This is illustrated in Figure 4: Figure 4. BFD Failure Scenario

In its next BFD control packet, Router A will set the diagnostic field to a value which indicates why the session was taken down. In this case, the diagnostic will be 1: Control Detection Time Expired. Diagnostics are useful to differentiate between real failures, versus administrative actions. For example, if the network administrator disabled BFD for this session, the diagnostic would be 7: Administratively Down. See BFD Packet Formats above for a list of all possible diagnostics. CONFIGURING BFD BFD can be configured in two steps. The first step in configuring BFD is setting the baseline parameters for all BFD sessions on an interface. The configuration occurs at the interface level and the syntax is as follows: [no] bfd interval min_rx multiplier

interval: determines how frequently (in milliseconds) BFD packets will be sent to BFD peers. min_rx: determines how frequently (in milliseconds) BFD packets will be expected to be received from BFD peers

© 2005 Cisco Systems, Inc. All rights reserved. Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com. Page 8 of 18

multiplier: The number of consecutive BFD packets which must be missed from a BFD peer before declaring that peer unavailable, and informing the higher-layer protocols of the failure Once the baseline parameters have been set, individual protocols must be informed that they will be using BFD for failure detection. In the first release of BFD, the supported protocols are OSPF, IS-IS, EIGRP and BGP. This document focuses on EIGRP configuration. There are two different methods to inform EIGRP that it should use BFD for failure detection. BFD can be enabled at the router sub-mode if all EIGRP neighbors have implemented BFD, and it will be universally employed on all interfaces: ! router eigrp 123 bfd all-interfaces ! If the user does not wish to enable BFD on all interfaces, it can be enabled on a per-interface basis. This, again, is enabled in router sub-mode. ! router eigrp 123 bfd interface Gig1/0 ! BFD DEPLOYMENT Deployment Alternatives When deploying any protocol or IP functionality, it is appropriate to consider all the alternatives, and be aware of any trade-offs being made. The closest alternative to BFD in conventional EIGRP deployments is use of modified hello and hold timers. By setting EIGRP hello and hold timers to their absolute minimums, the EIGRP protocol to reduce its failure detection mechanism to within the 1-2 second range. There are several advantages to BFD over the reduced timer mechanism: • Because BFD is not tied to any particular routing protocol, it can me used as a generic and consistent failure detection mechanism for OSPF, ISIS, EIGRP, and BGP. • Because some parts of BFD can be distributed to the data plane, it can be less CPU-intensive than reduced timers, which exist wholly at the control plane. • Reduced EIGRP timers have an absolute minimum detection timer of 1-2 seconds; BFD can provide sub-second failure detection. BFD also shares some common caveats with reduced EIGRP timers: • BFD can potentially generate false alarms—signaling a link failure when one does not exist. Because the timers used for BFD are so tight, a brief interval of data corruption or queue congestion could potentially cause BFD to miss enough control packets to allow the detect-timer to expire. While the transmission of BFD control packets is managed by giving them the highest possible queue priority, little can be done about prioritizing incoming BFD control packets. • BFD will consume some CPU resources, although many optimizations have been made to ensure the CPU usage is minimal. On non-distributed platforms, in-house testing has shown a minor 2% CPU increase (above baseline) when supporting one hundred concurrent BFD sessions*. On distributed platforms, there is no impact on the main Route Processor CPU, except during BFD session setup and teardown. It is important to note that, because of this accelerated handling of BFD control packets, all output features are bypassed. Users cannot, for example, filter or apply Quality of Service (QoS) to transmitted BFD packets.
* As always, performance numbers will vary depending on configuration and traffic patterns. Customers are advised to do due-diligence lab testing before deploying BFD in a live environment.

© 2005 Cisco Systems, Inc. All rights reserved. Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com. Page 9 of 18

Releases, Hardware, and Interfaces The first release of BFD will be supported on two hardware products that run Cisco IOS Software Releases 12.0S and 12.2S: the Cisco 7600 Series Router and the Cisco 12000 Series Internet Router. The first release of Cisco IOS-XR Software on the Cisco CRS-1 will also support BFD. BFD will be supported on the Cisco 7600 Series Router in Release 12.2(18)SXE on the following hardware: Supervisor: • Sup720 (PFC3A) • Sup720-3BXL 10GE Modules: • WS-X6704-10GE GE Modules: • WS-X6816-GBIC • WS-X6724-SFP • WS-X6408A-GBIC Optics: • 10GE XENPAK (XENPAK-10GB-ER, XENPAK-10GB-LR) • 10GE DWDM ITU XENPAK (P/N TBD) • DWDM-GBIC-xx.xx DWDM GBIC • WS-G548x Standard GBIC • GLC-xx-xx Cisco SFP DFC Cards: • WS-F6700-DFC3A • WS-F6700-DFC3B • WS-F6K-DFC3 BFD support for OSPF, ISIS, and EIGRP will be available in the first phase release for the Cisco 7600 Series. For the Cisco 12000 Series Internet Router, the target release for BFD is Release 12.0(31)S. It will provide BFD support for the OSPF, ISIS and BGP protocols. Because BFD will run in distributed mode on the Cisco 12000 Series, it is important to verify that the appropriate line card is also supported. Release 12.0(31)S targets all OC3/OC12/OC48 Engine 3 Packet Over SONET line cards, as well as all Engine 3 Ethernet Cards and Engine 4+ Ethernet Cards. BFD for the Cisco access platforms is planned for the first release of 12.4T.
®

© 2005 Cisco Systems, Inc. All rights reserved. Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com. Page 10 of 18

Using BFD as Part of a Network Redundancy Plan BFD can be an important part of an overall network redundancy plan, including other Cisco innovations like Nonstop Forwarding (NSF) and the Hot Standby Router Protocol (HSRP). BFD should be deployed in those sections of the network where subsecond failure detection is required, but cannot be provided by traditional Layer 2 mechanisms. Figure 5 illustrates an example of BFD usage. Figure 5. BFD Deployment in a Mixed L2/L3 Environment

Even though there is an alternate path available between Routers A and F, a failure on Router E will be hidden from its neighbors (Routers C, D, and F) by the presence of the Layer 2 switches. The switches maintain Layer 2 connectivity for the neighbor routers, which causes them to fall back on using the timers in the Layer 3 HELLO protocol to detect the failure. At the EIGRP default timer settings, this could take up to 15 seconds. In contrast, if Routers C, D, E, and F were all running BFD, all of Router E’s neighbors could detect Router E’s failure in less than a second, and immediately begin the reconvergence to the A->B->D->F path. Although BFD can be used in other deployment scenarios, the L2 switch example is one of the most common and difficult to solve without BFD. It is worth noting that EIGRP can provide nearly instantaneous convergence through the use of feasible successor routes—which are essentially precomputed backup routes. However, this solves a different problem from the initial failure detection provided by BFD. So, while EIGRP is the fastest converging of all the IGP protocols, BFD still provides significant value. BFD Deployment Notes • Although it may be self-evident, it should be stated that BFD provides its primary benefit in dual-homed environment. Once a failure is detected by BFD, traffic needs an alternate path along which it can flow. Although there is no restriction against using BFD in a singly-homed environment, the benefits are few. It does, however, alert the network administrator more quickly to a problem requiring manual intervention. • As an added layer or protection, the network administrator should consider running BFD in conjunction with Cisco IP Event Dampening http://www.cisco.com/en/US/products/sw/iosswrel/ps1838/products_feature_guide09186a0080134a41.html. If link failures are caused by an intermittent fluctuation at the physical layer initiated by a dirty fiber, loose connector, misbehaving GBIC, or some other cause, BFD will faithfully detect all of these failures. However, it cannot distinguish that a particular link has been bouncing up and down. Cisco IP Event Dampening was intended to mitigate precisely this problem. • Although some protocols like HSRP and Multicast are not currently BFD-enabled, they can obtain some incremental benefit from BFD deployment. Because these protocols rely on the underlying IGP to determine their reactions to failure, the ability of BFD to help the IGP converge more quickly benefits all upper layer protocols.

© 2005 Cisco Systems, Inc. All rights reserved. Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com. Page 11 of 18

• Some care should be used when using BFD in conjunction with other High Availability strategies. Cisco NSF, for example, can provide nearly instantaneous failover between an active and a standby Route Processor in the case of control plane forwarding. However, depending on the platform, there may be enough of a traffic outage during the switchover to cause BFD to prematurely signal a link failure. • Dual-ring SONET using Automatic Protection Switching (APS) is another deployment scenario where BFD may be inappropriate. SONET with APS should already supply ~50ms switchover protection, and BFD should not be required. The same rule should apply to Spatial Reuse Protocol (SRP) links—either Dynamic Packet Transport (DPT) or Resilient Packet Ring (RPR). • While all interface types supported in the first phase of Cisco BFD support are high-speed, some care should be taken once BFD becomes more generally available on other platforms with lower-speed links. In particular, the Desired TX Interval and Required Min RX Interval should be set to values appropriate for the link type. While a 50ms heartbeat will be almost unnoticeable on a 10Gbps link, it will have a more significant effect on a 64Kbps link. Performing a PING to the remote BFD peer will estimate the correct timer setting. The timers must be set to at least the measured response time, although a value several orders of magnitude larger would be preferred. BFD TROUBLESHOOTING The Cisco BFD implementation offers a wide variety of tools for determining the status of BFD peerings, as well as for debugging the BFD protocol itself. BFD Status and Debugging The following commands are implemented to help troubleshoot BFD: show bfd neighbors [details]

The show bfd neighbors command provides a line-by-line listing of existing BFD adjacencies. If the option details keyword is included, the output will also show BFD protocol parameters and timers per neighbor.

© 2005 Cisco Systems, Inc. All rights reserved. Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com. Page 12 of 18

Figure 6. sh bfd neighbors details

The information contained in Figure 6 can be interpreted by inspecting the fields in the BFD Packet Formats section of this document. debug bfd packet [neighbor address]

The debug bfd packet command prints debugging information about BFD packets sent and received. The optional [neighbor address] is used to filter output based on neighbor IP address. Because BFD is designed to send and receive packets at a very high rate, some care should be used before enabling this command, especially if there are a large number of BFD peers. It should only be enabled on a live network at the direction of Cisco Technical Assistance Center personnel.

© 2005 Cisco Systems, Inc. All rights reserved. Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com. Page 13 of 18

Figure 7. BFD Debugging Output

Figure 7 shows the initial setup of a BFD session. As mentioned before, initial timers are set to 1 second until the session is initialized. Then the timers change to their locally configured values—in this case, 50 milliseconds*. debug bfd event

This command prints debugging information about BFD state transitions. There are four main states for a BFD Session: • Init: the initial state of a BFD session. No BFD packets have yet been received from the peer of the session. • Up: a BFD Control packet with the “I Hear You” (IHY) bit set to 1 has been received. • Failing: a transitional state from the UP state. Either the detection timer is in the process of expiring, or a BFD Control packet with the “I Hear You” bit set to 0 has been received. • Down: a BFD Control packet with the “I Hear You” bit set to 0 has been received. As an example of state transition, if a BFD session is in the UP state, and the peer begins sending BFD packets with IHY=0, the state transition is as follows: UP->FAILING->DOWN->INIT

*

Remember that timers are configured in milliseconds, but their values are transmitted in BFD packets as microseconds. Thus, 50 milliseconds equates to 50,000 microseconds. This explains why we see 50000 as the tx and rx timers.

© 2005 Cisco Systems, Inc. All rights reserved. Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com. Page 14 of 18

The following figure shows the transition when OSPF is cleared then restarted: Figure 8. Debugging BFD Events

OSPF BFD Status and Debugging As mentioned previously, BFD is only useful if it is associated with a specific upper layer protocol, and can quickly inform that protocol about changes in Layer 2 state. Therefore, a necessary part of troubleshooting BFD is being able to monitor the interaction between BFD and the upper layer protocol. In the case of OSPF, several extensions to existing commands have been implemented. show ip ospf interface will now show if an interface is enabled for BFD. Figure 9. show ip ospf interface

show ip ospf will also include a change to indicate if BFD had been enabled at the router-wide level: Figure 10. show ip ospf

© 2005 Cisco Systems, Inc. All rights reserved. Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com. Page 15 of 18

show ip ospf neighbor detail has been enhanced to display if a particular neighbor is being monitored by BFD: Figure 11. debug isis adj-packets

debug ip ospf adjacency will incorporate some additional output to show when OSPF registers or de-registers with BFD. Figure 12. debug ip ospf adjacency

Finally, if log-adjacency-changes is enabled in the OSPF router process, there will be a log message with a unique “BFD node down” string to signify that the neighbor has gone down due to a BFD notification. CONCLUSION Bidirectional Forwarding Detection provides a method for network administrators to configure sub-second Layer 2 failure detection between adjacent network nodes. Furthermore, they can configure their routing protocols to respond to BFD notifications, and begin Layer 3 route convergence almost immediately. Provided that the appropriate caveats mentioned in this document are followed, BFD can be a powerful tool and an important part of a network-wide availability plan.

© 2005 Cisco Systems, Inc. All rights reserved. Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com. Page 16 of 18

Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 526-4100

European Headquarters Cisco Systems International BV Haarlerbergpark Haarlerbergweg 13-19 1101 CH Amsterdam The Netherlands www-europe.cisco.com Tel: 31 0 20 357 1000 Fax: 31 0 20 357 1100

Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA www.cisco.com Tel: 408 526-7660 Fax: 408 527-0883

Asia Pacific Headquarters Cisco Systems, Inc. 168 Robinson Road #28-01 Capital Tower Singapore 068912 www.cisco.com Tel: +65 6317 7777 Fax: +65 6317 7799

Cisco Systems has more than 200 offices in the following countries and regions. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at www.cisco.com/go/offices. Argentina • Australia • Austria • Belgium • Brazil • Bulgaria • Canada • Chile • China PRC • Colombia • Costa Rica • Croatia • Cyprus Czech Republic • Denmark • Dubai, UAE • Finland • France • Germany • Greece • Hong Kong SAR • Hungary • India • Indonesia • Ireland • Israel Italy • Japan • Korea • Luxembourg • Malaysia • Mexico • The Netherlands • New Zealand • Norway • Peru • Philippines • Poland • Portugal Puerto Rico • Romania • Russia • Saudi Arabia • Scotland • Singapore • Slovakia • Slovenia • South Africa • Spain • Sweden • Switzerland • Taiwan Thailand • Turkey • Ukraine • United Kingdom • United States • Venezuela • Vietnam • Zimbabwe
Copyright  2005 Cisco Systems, Inc. All rights reserved. Cisco, Cisco IOS, Cisco Systems, and the Cisco Systems logo are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries. All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0501R) 204170.e_ETMG_AE_2.05 Printed in the USA

© 2005 Cisco Systems, Inc. All rights reserved. Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com. Page 17 of 18

© 2005 Cisco Systems, Inc. All rights reserved. Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com. Page 18 of 18

Similar Documents

Free Essay

Assignment Layouts

...Sample Formats LS Business Publishing LS Education Group Sample Formats & Guidelines Contents 1.0 2.0 3.0 4.0 5.0 6.0 7.0 8.0 9.0 Format of a Report ............................................................................................................................ 2 Format of a Briefing paper ................................................................................................................ 3 Format of Newsletter ........................................................................................................................ 4 Format of Leaflet............................................................................................................................... 6 Format of Presentation ..................................................................................................................... 7 Format of a Questionnaire ................................................................................................................ 8 Format of a Discussion paper ........................................................................................................... 9 Format a White paper ..................................................................................................................... 10 Format of Articles............................................................................................................................ 11 1.0 Format of a Report 1.0 Executive Summary This needs to be at...

Words: 1455 - Pages: 6

Free Essay

Art of Whitepaper

...The Art of the White Paper July 2003 Executive Summary...................................................................1 What is a White Paper? .............................................................2 White Papers Come in Many Flavors..........................................3 Why Write a White Paper? ........................................................3 Industry Standards for White Papers ........................................4 Who Reads White Papers?.........................................................5 Who Writes White Papers? ........................................................6 Success Factors for White Papers..............................................7 A Gordon & Gordon Success Story.............................................8 Copies of this white paper can be obtained from www.gordonandgordon.com/downloads.html © 2001-2003 by Manuel Gordon and Gordon Graham Executive Summary High-tech companies produce a lot of white papers, and many IT managers use them—even if no one can clearly explain what they are. This paper begins by describing the various kinds of white papers, and the various purposes for which they are needed. Although no industry standards exist for white papers, we can make some generalizations. Most white papers are around 10 letter-sized pages with black & white illustrations. They are written with an authoritative, neutral tone. Most are distributed through the Web as PDFs. They can take from 4 to 10 weeks and cost from...

Words: 2701 - Pages: 11

Premium Essay

Academic Exclence

...There is nothing more important to the Government than raising the standards children achieve in our schools. The White Paper Excellence in schools committed us to exacting targets, and proposed a challenging programme to achieve them. Our vision is of excellence for all. This inclusive vision encompasses children with special educational needs (SEN). Schools currently identify 18% of children as having special educational needs of differing kinds. Almost 3% have individual statements showing the additional special educational provision they require. This Green Paper asks some questions about these figures. What is not in question is the case for setting our sights high for all these children. Good provision for SEN does not mean a sympathetic acceptance of low achievement. It means a tough-minded determination to show that children with SEN are capable of excellence. Where schools respond in this way, teachers sharpen their ability to set high standards for all pupils. The great majority of children with SEN will, as adults, contribute economically; all will contribute as members of society. Schools have to prepare all children for these roles. That is a strong reason for educating children with SEN, as far as possible, with their peers. Where all children are included as equal partners in the school community, the benefits are felt by all. That is why we are committed to comprehensive and enforceable civil rights for disabled people. Our aspirations as a...

Words: 257 - Pages: 2

Free Essay

Content

...ioninteractive.com MARKETING Idea Book for Turning Content into Conversions C NTENT CREATE ENGAGE MARKET STRATEGIZE Landing Pages for Content is clearly king. That passion to learn is the fuel of content marketing. Valuable content spreads like wildfire—providing opportunities for the brands behind the content to capitalize on their blogs, white papers, infographics, webinars and slide decks. This guide to Landing Pages for Content Marketing takes a practical look at exactly how to deliver measurable, significant conversions for each of the major categories of content. Beyond the narrow view of dumping your content, behind a lead capture form (often called “gating the assets”), there exists creative ways to up-sell and cross-sell content to convert your audience’s attention into business results. This approach preserves the social and organic viability of content, while improving its business value. It also adds a new ROI layer of measurement and comparison to content marketing initiatives. For each category of content, we give you a couple of tactics —letting you get your feet wet with one before jumping into another. Everything here is designed to deepen engagement and participation with your brand while providing you with © i-on interactive, inc. All rights reserved. Across markets and personas, people have an insatiable appetite to consume information. measurable results from your content marketing initiatives—driving qualified leads & sales for your organization...

Words: 2467 - Pages: 10

Free Essay

The Air Force and Army Strategic Plans for Modernization

...modernizing the United States’ military. The strategic plans that each branch outlined in their respective White Papers both emphasize the need for new technologies and continual modernization. Both branches recognize that changes need to be made, but the Air Force and Army differ in the scope and execution of these changes within their branches. Although these details vary, both plans have the common goal of modernizing our military to stay one step ahead of our adversaries and maintaining our global military dominance. Both White Papers echo the age old adage that “compliancy breeds failure”. The Army and the Air Force are both using lessons learned to try to predict future technological needs in an increasingly unpredictable global environment. Details and means differ, but both branches agree that the best way to have a dominant presence while dealing with financial constraints is to focus on unmanned technologies and specialized equipment. The Army is focusing on unmanned aerial vehicles, small unmanned ground vehicles, and modernized surveillance systems (2009 ARMY MODERNIZATION WHITE PAPER). The Air Force, similarly, is building self-sustaining computer networks so that human resources can be focused elsewhere. Also, the strategic plans both emphasis the need of specialized equipment for Special Forces (Moseley, 2007). The strategic plans outlined in the two White Papers agree that our modernized military must focus on specialized equipment for strategic use and an unmanned...

Words: 528 - Pages: 3

Premium Essay

Ifsm 370 Project 2: White Paper Instructions

...IFSM 370 Project 2: White Paper Instructions Follow Below Link to Download Tutorial https://homeworklance.com/downloads/ifsm-370-project-2-white-paper-instructions/ For More Information Visit Our Website ( https://homeworklance.com/ ) Email us At: Support@homeworklance.com or lancehomework@gmail.com Introduction This is an individual project. Each student must complete a White Paper that proposes a telecommunications solution to address a communications problem for a business organization. The target audience will be the organization’s Chief Information Officer (CIO). The White Paper deliverable is an MS Word document. If you have never written a white paper, you should conduct some research and review sample white papers to understand the content and format associated with these professional documents. The completed White Paper deliverable is due by 11:59 PM Eastern Time on the due date shown in the Course Schedule. See the Additional Information section of the syllabus for the penalty for late or missed assignments and projects. The White Paper is valued at 12% of the course grade. Scenario Ullman, Manly, & Ulysses Corporation With 75,000 customers worldwide, 250 employees working in four locations in the United States and three European offices, and a catalog of more than 100,000 parts, Ullman, Manly & Ulysses Corporation (UMUC) relies on its network for its survival. In the past decade, UMUC has seen its business grow from just one location...

Words: 1357 - Pages: 6

Free Essay

Route Redistriution

...Redistributing Routing Protocols Document ID: 8606 Contents Introduction Prerequisites Requirements Components Used Conventions Metrics Administrative Distance Redistribution Configuration Syntax and Examples IGRP and EIGRP OSPF RIP Redistributing Static Routes Except Gateway of Last resort in RIP using Route Map IS−IS Connected Routes Avoiding Problems Due to Redistribution Example 1 Example 2 Example 3 Example 4 Example 5 How to Redistribute Single Static Route Related Information Introduction The use of a routing protocol to advertise routes that are learned by some other means, such as by another routing protocol, static routes, or directly connected routes, is called redistribution. While running a single routing protocol throughout your entire IP internetwork is desirable, multi−protocol routing is common for a number of reasons, such as company mergers, multiple departments managed by multiple network administrators, and multi−vendor environments. Running different routing protocols is often part of a network design. In any case, having a multiple protocol environment makes redistribution a necessity. Differences in routing protocol characteristics, such as metrics, administrative distance, classful and classless capabilities can effect redistribution. Consideration must be given to these differences for redistribution to succeed. Prerequisites Requirements There are no specific requirements for this document. Components Used ...

Words: 5394 - Pages: 22

Premium Essay

Osi Layer in Malaysia

...Expert Reference Series of White Papers The OSI Model: Understanding the Seven Layers of Computer Networks 1-800-COURSES www.globalknowledge.com The OSI Model: Understanding the Seven Layers of Computer Networks Paul Simoneau, Global Knowledge Course Director, Network+, CCNA, CTP Introduction The Open Systems Interconnection (OSI) model is a reference tool for understanding data communications between any two networked systems. It divides the communications processes into seven layers. Each layer both performs specific functions to support the layers above it and offers services to the layers below it. The three lowest layers focus on passing traffic through the network to an end system. The top four layers come into play in the end system to complete the process. This white paper will provide you with an understanding of each of the seven layers, including their functions and their relationships to each other. This will provide you with an overview of the network process, which can then act as a framework for understanding the details of computer networking. Since the discussion of networking often includes talk of “extra layers”, this paper will address these unofficial layers as well. Finally, this paper will draw comparisons between the theoretical OSI model and the functional TCP/IP model. Although TCP/IP has been used for network communications before the adoption of the OSI model, it supports the same functions and features in a differently layered arrangement...

Words: 2594 - Pages: 11

Premium Essay

Business

...Pg1Pg1 Expert Reference Series of White Papers The OSI Model: Understanding the Seven Layers of Computer Networks 1-800-COURSES www.globalknowledge.com Pg2Pg2 The OSI Model: Understanding the Seven Layers of Computer Networks Paul Simoneau, Global Knowledge Course Director, Network+, CCNA, CTP Introduction The Open Systems Interconnection (OSI) model is a reference tool for understanding data communications between any two networked systems. It divides the communications processes into seven layers. Each layer both performs specific functions to support the layers above it and offers services to the layers below it. The three lowest layers focus on passing traffic through the network to an end system. The top four layers come into play in the end system to complete the process. This white paper will provide you with an understanding of each of the seven layers, including their functions and their relationships to each other. This will provide you with an overview of the network process, which can then act as a framework for understanding the details of computer networking. Since the discussion of networking often includes talk of “?extra layers”?, this paper will address these unofficial layers as well. Finally, this paper will draw comparisons between the theoretical OSI model and the functional TCP/IP...

Words: 2617 - Pages: 11

Premium Essay

Capstone Project

...ITT Capstone Project NT2799: Network Systems Administration | Donna Williamson, Andy Lara, Mary Hunter, Carlos Vargas, Matt Koppe, Morten Laigaard Donna Williamson, Andy Lara, Mary Hunter, Carlos Vargas, Matt Koppe, Morten Laigaard Table of Contents Part 1: Structure of WAN2 Part 2: Types of Equipment7 Part 3: Protocol Choices25 Part 4: Phone System73 Part 5: Security Proposal78 References89-92 Part 1 Structure of WAN Structure of WAN- Mary Hunter We have initially considered our LAN components and began our documentation. We have planed the design and determined all resources involved. We have considered and interviewed all the stakeholders involved. We are in the beginning stage, so the components, resources, stakeholders and design may change. We will use switches to connect hosts to the internetwork, and both hubs and switches will be used to interconnect devices in our star network architecture. This way if we need to add workstations we will only have to insert another hub or switch. All of ABC worldwide offices will include file services, print services, message services, directory services, and application services. All of the offices will have the use of a file server for file sharing backing up files and storage. They will have access to a print server that will include Queue-based printing and print sharing; a message server that will allow for e-mails with attachment files, including video, sound, and documents. All the offices will have access to a...

Words: 13943 - Pages: 56

Premium Essay

Computers

...ITS3103: Week 5– Assignment 2 18 March 2014 Tim Williams Professor Afzal South University ITS3103: Week 5– Assignment 2 18 March 2014 Tim Williams Professor Afzal South University Network Design Blue Print: PaintisDead.com (Vehicle Vinyl Wrapping Design Company). The company designs vehicle graphics for commercial and private vehicles and buildings. PaintisDead.com is headquarters is located in Miami, Florida (75 employees to include corporate management). Telecommunication Network Design needs to accommodate the headquarters and 5 satellite cities with at least 35 employees to include general manager in each store. Store locations are in Savannah Georgia, Fayetteville North Carolina, Richmond Virginia, Jacksonville Florida, and Dover Delaware. The company needs to have a telecommunication system that is efficient and cut down on business trips between all the stores to include the headquarters. Video conferencing, VoiP, push to talk cell phones for sales and design, computer network to protect design ideas when they are being transferred to other stores or when accessed on the server. * Does the client already have an established network and do they want to improve on it? Update vs. full network installation. * Does the client have a network? * What is the client’s budget? * What are the clients plans for growth? (Scalability of network to accommodate the rise in business 5yr vs. 10yr. * Security Considerations. * Used, non-used/free...

Words: 5175 - Pages: 21

Premium Essay

Sql Quiz

...Emory University | Internetworking Technology Handbook | [Type the document subtitle] | | SAVIOUR EMMANUEL UDOBONG | [Pick the date] | [Type the abstract of the document here. The abstract is typically a short summary of the contents of the document. Type the abstract of the document here. The abstract is typically a short summary of the contents of the document.] | Internetworking Basics An internetwork is a collection of individual networks, connected by intermediate networking devices, that functions as a single large network. Internetworking refers to the industry, products, and procedures that meet the challenge of creating and administering internetworks. The following articles provide information about internetworking basics: * Internetworking Basics * Introduction to LAN Protocols * Introduction to WAN Technologies * Bridging and Switching Basics * Routing Basics * Network Management Basics * Open System Interconnection Protocols LAN Technologies A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers, servers, and other devices. LANs offer computer users many advantages, including shared access to devices and applications, file exchange between connected users, and communication between users via electronic mail and other applications. The following articles provide information different LAN technologies: * Ethernet...

Words: 217433 - Pages: 870

Free Essay

Mobile Ip in Source Routing Systems

...Technical University of Ilmenau Faculty of Computer Science and Automation Department of Integrated Communications Systems Student research project (Mobile IP in Source Routing Systems) Supervisor: Dipl.-Inf. Florian Liers Editor: Imad kailouh Ilmenau, July 2010 1. Introduction ............................................................................................................. 4 1.1 Motivation .......................................................................................................... 4 1.2 Purpose of the work .......................................................................................... 4 2. Basics ..................................................................................................................... 5 2.1 Internet Protocol (IP) ......................................................................................... 5 2.1.1 IP Routing....................................................................................................... 5 2.1.1.1 What is routing ...................................................................................... 5 2.1.1.2 Source vs. Hop by Hop Routing ............................................................ 5 2.2 Mobile IP ........................................................................................................... 7 2.2.1 Terminology in Mobile IP ............................................................................. 7 2.2.2 How Mobile IP Works...

Words: 7747 - Pages: 31

Premium Essay

Information Technology

...Review Questions for Test-1 (with Answers): Chapter 1: Introduction to Data Communications Outline 1.1 Network Basics 1.2 Network Layer Model (most important) 1.3 Network Standards 1.4 Future Trends (least important) Answers to End-of-Chapter Questions 1. Describe the progression of communications systems from the 1800s to the present. Communications systems progression from the 1800s to the present: 1837 Invention of the telegraph 1876 Invention of the telephone 1877 Telephone system regulation begins in Canada 1878 Telephone system regulation begins in the United States 1879 Direct dialed long distance service begins 1880 Satellites begin to transmit international telephone calls 1881 Caterfone court decision permits non-Bell telephone equipment to be used 1970 Court permits MCI to provide long distance services 1984 Breakup of AT&T 1985 Cellular phones enter service 1996 Telecommunications Act of 1996 deregulates American telephone system 2. Why are network layers important? Communication networks are often broken into a series of layers, each of which can be defined separately, to enable vendors to develop software and hardware that can work together in the overall network. 3. Describe the four layers in the network model used in this book and what they do. • The application layer is the application software used by the user. • The network layer takes the message generated...

Words: 29622 - Pages: 119

Free Essay

Cisco

...ii Cisco TelePresence Fundamentals Cisco TelePresence Fundamentals Tim Szigeti, Kevin McMenamy, Roland Saville, Alan Glowacki Copyright©2009 Cisco Systems, Inc. Published by: Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the publisher, except for the inclusion of brief quotations in a review. Printed in the United States of America First Printing May 2009 Library of Congress Cataloging-in-Publication Data Cisco TelePresence fundamentals / Tim Szigeti ... [et al.]. p. cm. ISBN-13: 978-1-58705-593-5 (pbk.) ISBN-10: 1-58705-593-7 (pbk.) 1. Multimedia communications. 2. Computer conferencing. I. Szigeti, Tim. II. Title. [DNLM: 1. Cisco Systems, Inc. ] TK5105.15.C57 2009 006.7--dc22 2009013062 ISBN-13: 978-1-58705-593-5 ISBN-10: 1-58705-593-7 Warning and Disclaimer This book is designed to provide information about Cisco TelePresence. Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information is provided on an “as is” basis. The authors, Cisco Press, and Cisco Systems, Inc. shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or...

Words: 17200 - Pages: 69