SDN and NFV is the next phase of technology change which will help service provider to launch the services in single click. This is all about the programmability of the networks by using open source software defined network controller.
Monday, December 19, 2011
Split Horizon and Route Poisoning - Layer 3 Routing Loops
Most of the time, I always be a part of layer 2 routing loop discussion but never heard about the engineers talking about layer 3 routing loop problem. This is being experienced during my recent visit in some company where all engineers knows why to use Spanning Tree Protocol but none of them knew why to use split horizon and route poisoning.
In layer 3 networks, there might chance of routing loops and split horizon, hold down timers and route poisoning are the techniques which help to prevent the layer 3 routing loop. Below depicted Figure 1 is showing the converge network. Let’s assume in case of failure of 10.4.0.0 network, router C will forward the update to router B and router B will forward the update to router A and router C as well. By doing this the same kind of the update which is being generated by C is received and C might think that he is getting the information of 10.4.0.0 network from B but In fact, 10.4.0.0 network is directly attached to router C. This situation can arise in smaller networks too.
The first work around is the split horizon technique which says not to send the updates to the interfaces from it has been received. It looks like send update information (Number of interfaces – Receiving Interface Updates).
Next one is route poisoning, when the router detects link down, the attached router sends the update to its neighbors. But in this case, the receiving router can send back the received information to the same interface from where it received by setting the route metric to maximum. Definitely this is the violation of split horizon rule but it helps router to understand about that particular network is down or inaccessible which actually help the convergence of routing. Now 10.4.0.0 is poisoned route which is having the maximum metric assigned as the route is not reachable. When the neighbor send the route back to the originator, it becomes reverse poisoned.
What does route poisoning do?
1. Set the hop count to an unreachable state as soon as the failed network is detected
2. Route remains poisoned until the hold-down timer expires.
3. Hold timer depends on the routing protocol; Every protocol is having different hold-down timer.
4. Only uni direction traffic flow.
5. If the route is not back up during the hold down time period expires, that route is removed from the routing table and added in the garbage table.
The last one is Hold Down timers. What does hold-timers do?
1. A router receives an update from a neighbor indicating that a network that previously was accessible is now no longer accessible.
2. The receiving router marks that route possibly down and starts the hold-down timer.
3. If an update with a better metric for that network is received from any neighboring router during the hold-down period, the network is reinstated and the hold-down timer is removed.
4. If an update from any other neighbor is received during the hold-down period with the same or worse metric for that network, that update is ignored. Thus, more time is allowed for the information about the change to be propagated.
5. Routers still forward packets to destination networks that are marked as possibly down. This allows the router to overcome any issues associated with intermittent connectivity. If the destination network truly is unavailable and the packets are forwarded, black hole routing is created and lasts until the hold-down timer expires. (Very Important Point). This could be the reason, administrators look forward to reduce the hold-down timers to increase the convergence time. Definitely if the network is not stable these timers generates lot of messages.
As per section 2.2.2, RFC 1058 explicitly says that “Split horizon with poisoned reverse will prevent any routing loops that involve only two gateways. However, it is still possible to end up with patterns in which three gateways are engaged in mutual deception.” Definitely this could be the case of broadcast of multi-access networks.
Click Here To Read Rest Of The Post...
Sunday, December 18, 2011
Aakash tablet retailing online
Datawind, the maker of the low cost tablet Aakash, has started selling the device online from today. Retailing at Rs. 2,500/-, it is currently the most reasonably priced tablet in the Indian market. What’s more, Datawind has made it extremely easy for users to get their hands on Aakash. The company promises to deliver the tablet to buyers within seven days and accepts cash on delivery. That way, users don’t have to pay online when they book the tablet on www.aakashtablet.com.
Aakash is powered by an Arm 11 – 366 MHz microprocessor and runs on Android’s 2.2 Froyo operating system. A 2100 mAh battery supports the tablet. Aakash weighs 350g and measures 7’’. It offers 256MB of RAM and has a resistive touch screen with a resolution of 800 x 480p. Its 2GB Flash internal storage is expandable externally up to 32GB. Connectivity wise, Aakash works on Wi-Fi networks. The tablet is perfect for those who desire everything a basic model offers but don’t want to spend too much on it.
For those looking for a slight more spruced up version of Aakash, there is the Ubislate 7. Manufactured by Datawind, this is Aakash’s big brother. Ubislate 7 will be available in January 2012 and will be powered by a Cortex A8 – 700MHz processor and a 3200 mAh battery. It will run on Android’s 2.3 operating system. Besides Wi-Fi, Ubislate will also work on GPRS networks. The best part about this tablet is that it is reasonably priced. Just slightly more expensive than Aakash, it will retail at Rs. 2999/-.
Both these tablets by Datawind guarantee that very soon, technology will be within every Indian’s reach. In fact, when Aakash was launched, Telecom and Education Minister Kapil Sibal had promised, “The rich have access to the digital world, the poor and ordinary have been excluded.
Specifications:
Display: 7” colour LCD/TFT
Keyboard: Built in
RAM: 2GB
Hard Drive: 32GB
Connectivity: Wifi, USB 2.0 (2), Ethernet port.
Operating System: Android
Power: 2 watt
Processor: Unknown
Expandable Memory upto 8GB (SD Card)
VGA Port (For connecting to Projector)
Features:
Open Office
SciLab
Internet browsing
Video web conferencing facility,
Multimedia content in a variety of formats (pdf, docx, ods, adp, xls, jpeg, gif,png, bmp, odt, zip, AVCHD, AVI, AC3)
Inbuilt PDF reader
Internet browsing with flash plug-in, JavaScript.
It is enabled with a touch screen.
An in-built keyboard is attached with this laptop.
The laptop can store the data of up to 2 GB memory. It is a RAM memory.
Wifi connectivity and USB port are this laptop’s additional features.
2 watt system is used up by this laptop so that it can even perform in areas where power supply is low.
80% shock resistant
Source
Click Here To Read Rest Of The Post...
Saturday, December 17, 2011
Difference Between MPLS and MPLS-TP
RFC 5654 is all about requirements of MPLS-TP. But what is the difference between MPLS and MPLS-TP and how operators can use MPLS-TP in lieu of legacy SDH/SONET networks.
1. MPLS requires a control plane protocol and but in case of MPLS-TP no control plane protocol is required. The reason for selecting no control plane protocol is only for the fast convergence and removing any kind of dependencies.
2. MPLS is uni directional where as MPLS-TP is bi-directional.
3. MPLS is having inband OAM where as in MPLS-TP out of band OAM is available.
4. No separation of control and data plane where as in MPLS-TP MUST support the logical separation of the control and management planes from the data plane
5. MPLS-TP 1+1 and 1:1 protection in a ring MUST support switching ime within 50 ms from the moment of fault detection in a network with a 16-node ring with less than 1200 km of fiber but in MPLS all dependent of IGP.
Click Here To Read Rest Of The Post...
Subscribe to:
Posts (Atom)