Sunteți pe pagina 1din 19

Copyright 2003 Juniper Networks, Inc. Proprietary and Confidential www.juniper.

net
1
Bidirectional Forwarding
Detection (BFD)
0DWW 0DWW .RORQ .RORQ
APR!COT200+ APR!COT200+
.XDOD/XPSXU .XDOD/XPSXU
2YHUYLHZ
S Goals
S Protocol Overview
S Operation
S Status
S Implementation Details
3
Copyright 2003 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
Detecting Forwarding Failures (I)
S For IP, classically a function of the routing protocol
Because formerly, routing = forwarding
Fault resolution in perhaps tens of seconds
Perhaps too slow for anything but best-effort IP
Sometimes there is no routing protocol!
6RIWZDUH
5RXWHU
6RIWZDUH
5RXWHU
5RXWLQJ3URWRFRO 5RXWLQJ3URWRFRO
4
Copyright 2003 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
Detecting Forwarding Failures (II)
S Interface state can be used, but:
Transient failures are problematic
So are switched environments
6RIWZDUH
5RXWHU
6RIWZDUH
5RXWHU
5
Copyright 2003 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
Detecting Forwarding Failures (III)
S In modern architectures: routing forwarding
S Would be nice to have a way to detect forwarding
without relying on interface state
5RXWLQJ(QJLQH
3DFNHW)RUZDUGLQJ
(QJLQH
5RXWLQJ(QJLQH
3DFNHW)RUZDUGLQJ
(QJLQH
6
Copyright 2003 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
Goals for BFD
S Detection of forwarding plane-to-forwarding plane
connectivity (including links, interfaces, etc.)
S Faster convergence of routing protocols, particularly on shared
media like Ethernet
S Semantic separation of forwarding plane connectivity vs.
control plane connectivity (works well in concert with
Graceful Restart)
S A single mechanism that is independent of media, routing
protocol, and data protocol
S No changes to existing protocols
7
Copyright 2003 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
BFD Protocol Overview
S At its heart, Yet Another Hello Protocol
S Packets sent at regular intervals; neighbor failure detected
when packets stop showing up
S Intended to be implemented in the forwarding plane to the
extent possible (avoiding fate sharing with the control plane)
S Context defined by encapsulating protocol (sending inside
IPv4 packets signals IPv4 connectivity; also could be sent
over IPv6, directly over the datalink, or whatever)
S Always unicast, even on shared media
8
Copyright 2003 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
BFD Protocol Overview
S Not just for direct links; can also be used over MPLS LSPs,
other tunnels
S Sufficient context in the protocol to keep track of multiple
parallel paths between systems
S Timing is adjustable on-the-fly, allowing for adaptivity to
avoid catastrophic collapse due to false failure detection
6HVVLRQ 6HVVLRQ
6HVVLRQ 6HVVLRQ
6HVVLRQ 6HVVLRQ
6HVVLRQ 6HVVLRQ
/LQN /LQN
7XQQHO 7XQQHO
9
Copyright 2003 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
BFD Operation
S BFD Control Packets sent in both directions, providing basic
connectivity check and continuous parameter negotiation
S Optional Echo Mode can be negotiated
BFD Echo Packets transmitted addressed to originating
system; other system forwards them back through regular
forwarding path
Exercises entire forwarding path in destination system
May not always be possible or desirable, thus it is
negotiated
10
Copyright 2003 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
BFD Async Mode
S Control packets flow in each direction
11
Copyright 2003 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
BFD Echo Mode
S Control packets flow in each direction
S Echo packets loop through remote system
S Control packet flow is slower
12
Copyright 2003 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
BFD Operation
S Combination of continuous negotiation and unicast allows
high adaptivity
Less capable systems can negotiate slower detection
without penalizing faster systems
Transmission rate and detection time can be changed on-
the-fly, allowing for automatic mechanisms for recovery
from overly aggressive timers or unusual network events
Echo mode can be enabled or disabled without taking down
BFD session
S Three-way handshake on both up and down transitions
S Each system in full control of its own fate
13
Copyright 2003 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
BFD Operation
S No discovery protocol, handled by control protocol
S Semantics of BFD session failure are contextual
BFD-over-IP implies neighbor failure; IGP neighbor
should be torn down
BFD-over-Ethernet implies switch failure; subnet should be
withdrawn from routing protocols
S Works over a wide range of time constants
Timers specified in microseconds, allowing very fast or
very slow detection
Systems specify how quickly they can receive BFD packets
so that boxes of differing abilities can interoperate
14
Copyright 2003 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
BFD Operation
S Discriminator field used to demultiplex incoming packets once
session is up
Each system chooses 32 bit value that is unique among all
sessions, puts it in My Discr field
Remote systems discriminator is looped back in Your
Discr field
Your Discr used to choose session for incoming packets
S Initialization is slightly tricky
First packet has to bedemuxed on other info--source
address and interface index, for example
15
Copyright 2003 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
BFD Control Message
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Version |H| Diagnostic | Detect Mult | Length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| My Discr |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Your Discr |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Desired Min TX Interval |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Required Min RX Interval |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Required Min Echo RX Interval |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
16
Copyright 2003 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
BFD State Machine
'RZQ 'RZQ
,QLW ,QLW
8S 8S
)DLOLQJ )DLOLQJ
,+8 ,+8
,+8 ,+8
,+8 ,+8
WLPHRXW WLPHRXW
,+8 ,+8
,+8 ,+8
17
Copyright 2003 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
BFD Applications
S Routing protocol liveness detection (obviously)
S Switch-to-routerliveness detection
S Router-to-hostlivenessdetection (a real answer for
the web farms)
S Virtual link liveness (MPLS, GRE tunnels, etc.--no
need to keep reinventing these)
S Alarm passthrough (receive alarm from concatenated
link; take session admin-down with diagnostic
concatenated link down)
18
Copyright 2003 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
BFD Status
S Protocol jointly developed by Juniper and Cisco
S Internet draft published (draft-katz-ward-bfd-0x.txt)
S Published as an Informational document (so that
progress can be made in a reasonable amount of time
S Rumors of fast track standardization being pursued
Copyright 2003 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
19
http://www.juniper.net
Thank You!

S-ar putea să vă placă și