draft-ietf-bmwg-evpntest-07.txt   draft-ietf-bmwg-evpntest-08.txt 
Internet Engineering Task Force S. Jacob, Ed. Internet Engineering Task Force S. Jacob, Ed.
Internet-Draft K. Tiruveedhula Internet-Draft Independent
Intended status: Informational Juniper Networks Intended status: Informational K. Tiruveedhula
Expires: August 6, 2021 February 2, 2021 Expires: November 30, 2021 Juniper Networks
May 29, 2021
Benchmarking Methodology for EVPN and PBB-EVPN Benchmarking Methodology for EVPN and PBB-EVPN
draft-ietf-bmwg-evpntest-07 draft-ietf-bmwg-evpntest-08
Abstract Abstract
This document defines methodologies for benchmarking EVPN and PBB- This document defines methodologies for benchmarking EVPN and PBB-
EVPN performance. EVPN is defined in RFC 7432, and is being deployed EVPN performance. EVPN is defined in RFC 7432, and is being deployed
in Service Provider networks. Specifically, this document defines in Service Provider networks. Specifically, this document defines
the methodologies for benchmarking EVPN/PBB-EVPN convergence, data the methodologies for benchmarking EVPN/PBB-EVPN convergence, data
plane performance, and control plane performance. plane performance, and control plane performance.
Status of This Memo Status of This Memo
skipping to change at page 1, line 34 skipping to change at page 1, line 35
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet- working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/. Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
This Internet-Draft will expire on August 6, 2021. This Internet-Draft will expire on November 30, 2021.
Copyright Notice Copyright Notice
Copyright (c) 2021 IETF Trust and the persons identified as the Copyright (c) 2021 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of (https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License. described in the Simplified BSD License.
Table of Contents Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1. Requirements Language . . . . . . . . . . . . . . . . . . 3 1.1. Requirements Language . . . . . . . . . . . . . . . . . . 3
1.2. Terminologies . . . . . . . . . . . . . . . . . . . . . . 3 1.2. Terminologies . . . . . . . . . . . . . . . . . . . . . . 3
2. Test Topology . . . . . . . . . . . . . . . . . . . . . . . . 4 2. Test Topology . . . . . . . . . . . . . . . . . . . . . . . . 4
3. Test Cases for EVPN Benchmarking . . . . . . . . . . . . . . 7 3. Test Cases for EVPN Benchmarking . . . . . . . . . . . . . . 7
3.1. Data Plane MAC Learning . . . . . . . . . . . . . . . . . 7 3.1. Data Plane MAC Learning . . . . . . . . . . . . . . . . . 7
3.2. Control Plane MAC Learning . . . . . . . . . . . . . . . 8 3.2. Control Plane MAC Learning . . . . . . . . . . . . . . . 8
3.3. MAC Flush-Local Link Failure and Relearning . . . . . . . 9 3.3. MAC Flush-Local Link Failure and Relearning . . . . . . . 9
3.4. MAC Flush-Remote Link Failure and Relearning. . . . . . . 10 3.4. MAC Flush-Remote Link Failure and Relearning. . . . . . . 10
3.5. MAC Aging . . . . . . . . . . . . . . . . . . . . . . . . 11 3.5. MAC Aging . . . . . . . . . . . . . . . . . . . . . . . . 11
3.6. Remote MAC Aging . . . . . . . . . . . . . . . . . . . . 11 3.6. Remote MAC Aging . . . . . . . . . . . . . . . . . . . . 11
skipping to change at page 2, line 36 skipping to change at page 2, line 38
4.2. Data Plane Remote MAC Learning . . . . . . . . . . . . . 18 4.2. Data Plane Remote MAC Learning . . . . . . . . . . . . . 18
4.3. MAC Flush-Local Link Failure . . . . . . . . . . . . . . 19 4.3. MAC Flush-Local Link Failure . . . . . . . . . . . . . . 19
4.4. MAC Flush-Remote Link Failure . . . . . . . . . . . . . . 20 4.4. MAC Flush-Remote Link Failure . . . . . . . . . . . . . . 20
4.5. MAC Aging . . . . . . . . . . . . . . . . . . . . . . . . 21 4.5. MAC Aging . . . . . . . . . . . . . . . . . . . . . . . . 21
4.6. Remote MAC Aging. . . . . . . . . . . . . . . . . . . . . 21 4.6. Remote MAC Aging. . . . . . . . . . . . . . . . . . . . . 21
4.7. Local and Remote MAC Learning . . . . . . . . . . . . . . 22 4.7. Local and Remote MAC Learning . . . . . . . . . . . . . . 22
4.8. High Availability . . . . . . . . . . . . . . . . . . . . 23 4.8. High Availability . . . . . . . . . . . . . . . . . . . . 23
4.9. Scale . . . . . . . . . . . . . . . . . . . . . . . . . . 24 4.9. Scale . . . . . . . . . . . . . . . . . . . . . . . . . . 24
4.10. Scale Convergence . . . . . . . . . . . . . . . . . . . . 25 4.10. Scale Convergence . . . . . . . . . . . . . . . . . . . . 25
4.11. Soak Test . . . . . . . . . . . . . . . . . . . . . . . . 26 4.11. Soak Test . . . . . . . . . . . . . . . . . . . . . . . . 26
5. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 26 5. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 27
6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 27 6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 27
7. Security Considerations . . . . . . . . . . . . . . . . . . . 27 7. Security Considerations . . . . . . . . . . . . . . . . . . . 27
8. References . . . . . . . . . . . . . . . . . . . . . . . . . 27 8. References . . . . . . . . . . . . . . . . . . . . . . . . . 27
8.1. Normative References . . . . . . . . . . . . . . . . . . 27 8.1. Normative References . . . . . . . . . . . . . . . . . . 27
8.2. Informative References . . . . . . . . . . . . . . . . . 27 8.2. Informative References . . . . . . . . . . . . . . . . . 27
Appendix A. Appendix . . . . . . . . . . . . . . . . . . . . . . 28 Appendix A. Appendix . . . . . . . . . . . . . . . . . . . . . . 28
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 28 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 28
1. Introduction 1. Introduction
skipping to change at page 8, line 16 skipping to change at page 8, line 16
source and destination MAC address for one vlan, the same vlan must source and destination MAC address for one vlan, the same vlan must
be present in all the devices except RR. be present in all the devices except RR.
Send X unicast frames from CE to MHPE1(DUT) for one EVPN instance Send X unicast frames from CE to MHPE1(DUT) for one EVPN instance
working in SA mode. working in SA mode.
The DUT will learn these X MAC in data plane. The DUT will learn these X MAC in data plane.
Measurement : Measurement :
Measure the time taken to learn X MAC locally in DUT evpn MAC table. Measure the time taken to learn X MAC locally in DUT EVPN MAC table.
The data plane measurement is taken by considering DUT as black box. The data plane measurement is taken by considering DUT as black box.
The range of MAC are known from traffic generator, the same must be The range of MAC are known from traffic generator, the same must be
learned in DUT, the time taken to learn X MAC is measured. The learned in DUT, the time taken to learn X MAC is measured. The
measurement is carried out using external server which polls the DUT measurement is carried out using external server which polls the DUT
using automated scripts. using automated scripts.
The test is repeated for N times and the values are collected. The The test is repeated for N times and the values are collected. The
MAC learning rate is calculated by averaging the values obtained from MAC learning rate is calculated by averaging the values obtained from
N samples. N is an arbitrary number to get a sufficient sample. The N samples. N is an arbitrary number to get a sufficient sample. The
time measured for each sample is denoted by T1,T2...Tn. time measured for each sample is denoted by T1,T2...Tn.
skipping to change at page 10, line 20 skipping to change at page 10, line 20
Objective: Objective:
Measure the time taken to flush the Control plane MAC learned in DUT Measure the time taken to flush the Control plane MAC learned in DUT
during remote link failure and the time taken to relearn. during remote link failure and the time taken to relearn.
Topology : Topology 1 Topology : Topology 1
Procedure: Procedure:
confirm the DUT is up and running with EVPN. Confirm the DUT is up and running with EVPN.
Send X frames with X different source and destination MAC addresses Send X frames with X different source and destination MAC addresses
to DUT from SHPE3 using traffic generator for one vlan. to DUT from SHPE3 using traffic generator for one vlan.
Bring down the link between SHPE3 and traffic generator. Bring down the link between SHPE3 and traffic generator.
SHPE3 will withdraw the routes from DUT due to link failure. SHPE3 will withdraw the routes from DUT due to link failure.
Measure the time taken to flush the DUT EVPN MAC table. The DUT and Measure the time taken to flush the DUT EVPN MAC table. The DUT and
MHPE2 are running SA mode. MHPE2 are running SA mode.
skipping to change at page 11, line 9 skipping to change at page 11, line 9
scripts. scripts.
Flush rate = (T1+T2+..Tn)/N Flush rate = (T1+T2+..Tn)/N
Relearning rate = (T1+T2+..Tn)/N Relearning rate = (T1+T2+..Tn)/N
3.5. MAC Aging 3.5. MAC Aging
Objective: Objective:
To measure the MAC aging time. To measure the MAC Aging time.
Topology : Topology 1 Topology : Topology 1
Procedure: Procedure:
Confirm the DUT is up and running with EVPN. Confirm the DUT is up and running with EVPN.
Send X frames with X different source and destination MAC addresses Send X frames with X different source and destination MAC addresses
to DUT from CE using traffic generator for one vlan. to DUT from CE using traffic generator for one vlan.
skipping to change at page 11, line 47 skipping to change at page 11, line 47
arbitrary number to get a sufficient sample. The time measured for arbitrary number to get a sufficient sample. The time measured for
each sample is denoted by T1,T2...Tn. The measurement is carried out each sample is denoted by T1,T2...Tn. The measurement is carried out
using external server which polls the DUT using automated scripts. using external server which polls the DUT using automated scripts.
Aging time for X MAC in sec = (T1+T2+..Tn)/N Aging time for X MAC in sec = (T1+T2+..Tn)/N
3.6. Remote MAC Aging 3.6. Remote MAC Aging
Objective: Objective:
Measure the control plane learned MAC aging time. Measure the control plane learned MAC Aging time.
Topology : Topology 1 Topology : Topology 1
Procedure: Procedure:
Confirm the DUT is up and running with EVPN. Confirm the DUT is up and running with EVPN.
Send X frames with X different source and destination MAC addresses Send X frames with X different source and destination MAC addresses
to DUT from SHPE3 using traffic generator for one vlan. to DUT from SHPE3 using traffic generator for one vlan.
skipping to change at page 14, line 7 skipping to change at page 14, line 7
There is a bi directional traffic flow with X pps in each direction. There is a bi directional traffic flow with X pps in each direction.
Ensure the DUT learn 2X MAC. Ensure the DUT learn 2X MAC.
Then do a routing engine fail-over. Then do a routing engine fail-over.
Measurement : Measurement :
The expectation of the test is 0 traffic loss with no change in the The expectation of the test is 0 traffic loss with no change in the
DF role. DUT should not withdraw any routes. But in cases where the DF role. DUT should not withdraw any routes. But in cases where the
DUT is not property synchronized between master and standby, due to DUT is not property synchronised between master and standby, due to
that packet loss are observed. In that scenario the packet loss is that packet loss are observed. In that scenario the packet loss is
measured.The test is repeated for N times and the values are measured.The test is repeated for N times and the values are
collected. The packet loss is calculated by averaging the values collected. The packet loss is calculated by averaging the values
obtained by N samples. N is an arbitrary number to get a sufficient obtained by N samples. N is an arbitrary number to get a sufficient
sample. The time measured for each sample is denoted by T1,T2...Tn. sample. The time measured for each sample is denoted by T1,T2...Tn.
The measurement is carried out using external server which polls the The measurement is carried out using external server which polls the
DUT using automated scripts to ensure the DUT learned 2X MAC. The DUT using automated scripts to ensure the DUT learned 2X MAC. The
packet drop is measured using traffic generator. packet drop is measured using traffic generator.
Packet loss in sec with 2X MAC addresses = (T1+T2+..Tn)/N Packet loss in sec with 2X MAC addresses = (T1+T2+..Tn)/N
skipping to change at page 14, line 33 skipping to change at page 14, line 33
Objective: Objective:
Measure the ARP/ND scale of the DUT. Measure the ARP/ND scale of the DUT.
Topology : Topology 1 Topology : Topology 1
Procedure: Procedure:
Confirm the DUT is up and running with EVPN. Confirm the DUT is up and running with EVPN.
Send X arp/neighbor discovery(ND) from the traffic generator to DUT Send X arp/neighbour discovery(ND) from the traffic generator to DUT
with different sender ip/ipv6,MAC addresses to the target IRB address with different sender ip/ipv6, MAC addresses to the target IRB
configured in EVPN instance. address configured in EVPN instance.
The EVPN instance learns the MAC+ip and MAC+ipv6 addresses from these The EVPN instance learns the MAC+ip and MAC+ipv6 addresses from these
request and advertise as type 2 MAC+ip/MAC+ipv6 route to remote request and advertise as type 2 MAC+ip/MAC+ipv6 route to remote
provide edge routers which have same EVPN configurations. provide edge routers which have same EVPN configurations.
The value of X must be increased at a incremental value of 5% of X, The value of X must be increased at a incremental value of 5% of X,
till the limit is reached. The limit is where the DUT cant learn any till the limit is reached. The limit is where the DUT cant learn any
more type 2 MAC+ip/MAC+ipv6.The test must be separately conducted for more type 2 MAC+ip/MAC+ipv6.The test must be separately conducted for
arp and ND. arp and ND.
skipping to change at page 15, line 38 skipping to change at page 15, line 38
Then increment the scale of N by 5% of N till the limit is reached. Then increment the scale of N by 5% of N till the limit is reached.
The limit is where the DUT cant learn any EVPN routes from its peers. The limit is where the DUT cant learn any EVPN routes from its peers.
Measurement : Measurement :
There should not be any loss of route types 1,2,3 and 4 in DUT. DUT There should not be any loss of route types 1,2,3 and 4 in DUT. DUT
must relearn all type 1, 2, 3 and 4 from remote routers. The DUT must relearn all type 1, 2, 3 and 4 from remote routers. The DUT
must be subjected to various values of N to find the optimal scale must be subjected to various values of N to find the optimal scale
limit. The scope of the test is find out the maximum evpn instance limit. The scope of the test is find out the maximum EVPN instance
that a DUT can hold. The measurement is carried out using external that a DUT can hold. The measurement is carried out using external
server which polls the DUT using automated scripts to find the scale server which polls the DUT using automated scripts to find the scale
limit of EVPN instances. limit of EVPN instances.
3.11. Scale Convergence 3.11. Scale Convergence
Objective: Objective:
Measure the convergence time of DUT when the DUT is scaled with EVPN Measure the convergence time of DUT when the DUT is scaled with EVPN
instance along with traffic. instance along with traffic.
skipping to change at page 16, line 21 skipping to change at page 16, line 21
source and destination MAC addresses for N EVI's. source and destination MAC addresses for N EVI's.
Send F frames from traffic generator to SHPE3 with X different source Send F frames from traffic generator to SHPE3 with X different source
and destination MAC addresses. and destination MAC addresses.
There will be 2X number of MAC addresses will be learned in DUT EVPN There will be 2X number of MAC addresses will be learned in DUT EVPN
MAC table. MAC table.
There is a bi directional traffic flow with F pps in each direction. There is a bi directional traffic flow with F pps in each direction.
Then clear the BGP neighbors in the DUT. Then clear the BGP neighbours in the DUT.
Once the BGP session is in established state in DUT. Once the BGP session is in established state in DUT.
Measure the time taken to learn 2X MAC address in DUT MAC table. Measure the time taken to learn 2X MAC address in DUT MAC table.
Measurement : Measurement :
The DUT must learn 2X MAC addresses. Measure the time taken to learn The DUT must learn 2X MAC addresses. Measure the time taken to learn
2X MAC in DUT. The test is repeated for N times and the values are 2X MAC in DUT. The test is repeated for N times and the values are
collected. The convergence time is calculated by averaging the collected. The convergence time is calculated by averaging the
skipping to change at page 17, line 27 skipping to change at page 17, line 27
There is a bi directional traffic flow with F pps in each direction. There is a bi directional traffic flow with F pps in each direction.
The DUT must run with traffic for 24 hours. The DUT must run with traffic for 24 hours.
Every hour check for memory leak in EVPN process, CPU usage and Every hour check for memory leak in EVPN process, CPU usage and
crashes in DUT. crashes in DUT.
Measurement : Measurement :
Take the hourly reading of CPU, process memory. There should not be Take the hourly reading of CPU, process memory. There should not be
any leak, crashes, CPU spikes. The CPU spike is determined as the any memory leak, crashes, CPU spikes. The CPU spike is determined as
CPU usage which shoots at 40 to 50 percent of the average usage. The the sudden increase of CPU usage to 100 percent compared to the
average value vary from device to device. Memory leak is determined average usage. The average value vary from device to device. Memory
by increase usage of the memory for EVPN process. The expectation is leak is determined as the increase of memory usage with respect to
under steady state the memory usage for EVPN process should not time. The expectation is under steady state the memory usage for
increase. The measurement is carried out using external server which EVPN process should not increase with respect to time. The
polls the DUT using automated scripts which captures the CPU usage measurement is carried out using external server which polls the DUT
and process memory. using automated scripts which captures the CPU usage and process
memory.
4. Test Cases for PBB-EVPN Benchmarking 4. Test Cases for PBB-EVPN Benchmarking
4.1. Data Plane Local MAC Learning 4.1. Data Plane Local MAC Learning
Objective: Objective:
Measure the time taken to learn the Data Plane MAC in DUT. Measure the time taken to learn the Data Plane MAC in DUT.
Topology : Topology 1 Topology : Topology 1
skipping to change at page 18, line 18 skipping to change at page 18, line 18
Send X unicast frames from CE to MHPE1(DUT) for one PBB-EVPN instance Send X unicast frames from CE to MHPE1(DUT) for one PBB-EVPN instance
working in SA mode. working in SA mode.
The DUT will learn these X MAC in data plane. The DUT will learn these X MAC in data plane.
Measurement : Measurement :
Measure the time taken to learn X MAC locally in DUT PBB-EVPN MAC Measure the time taken to learn X MAC locally in DUT PBB-EVPN MAC
table. The data plane measurement is taken by considering DUT as table. The data plane measurement is taken by considering DUT as
black box. The range of MAC are known from traffic generator,the black box. The range of MAC are known from traffic generator, the
same must be learned in DUT, the time taken to learn X MAC is same must be learned in DUT, the time taken to learn X MAC is
measured.The measurement is carried out using external server which measured.The measurement is carried out using external server which
polls the DUT using automated scripts. polls the DUT using automated scripts.
The test is repeated for N times and the values are collected. The The test is repeated for N times and the values are collected. The
MAC learning rate is calculated by averaging the values obtained from MAC learning rate is calculated by averaging the values obtained from
N samples. N is an arbitrary number to get a sufficient sample. The N samples. N is an arbitrary number to get a sufficient sample. The
time measured for each sample is denoted by T1,T2...Tn. time measured for each sample is denoted by T1,T2...Tn.
MAC learning rate = (T1+T2+..Tn)/N MAC learning rate = (T1+T2+..Tn)/N
skipping to change at page 21, line 9 skipping to change at page 21, line 9
using automated scripts. using automated scripts.
Flush rate = (T1+T2+..Tn)/N Flush rate = (T1+T2+..Tn)/N
Relearning rate = (T1+T2+..Tn)/N Relearning rate = (T1+T2+..Tn)/N
4.5. MAC Aging 4.5. MAC Aging
Objective: Objective:
Measure the MAC aging time. Measure the MAC Aging time.
Topology : Topology 1 Topology : Topology 1
Procedure: Procedure:
Confirm the DUT is up and running with PBB-EVPN. Confirm the DUT is up and running with PBB-EVPN.
Send X frames with X different source and destination MAC addresses Send X frames with X different source and destination MAC addresses
to DUT from CE using traffic generator for one vlan. to DUT from CE using traffic generator for one vlan.
skipping to change at page 21, line 47 skipping to change at page 21, line 47
arbitrary number to get a sufficient sample. The time measured for arbitrary number to get a sufficient sample. The time measured for
each sample is denoted by T1,T2...Tn. The measurement is carried out each sample is denoted by T1,T2...Tn. The measurement is carried out
using external server which polls the DUT using automated scripts. using external server which polls the DUT using automated scripts.
Aging time for X MAC in sec = (T1+T2+..Tn)/N Aging time for X MAC in sec = (T1+T2+..Tn)/N
4.6. Remote MAC Aging. 4.6. Remote MAC Aging.
Objective: Objective:
Measure the remote MAC aging time. Measure the remote MAC Aging time.
Topology : Topology 1 Topology : Topology 1
Procedure: Procedure:
Confirm the DUT is up and running with PBB-EVPN. Confirm the DUT is up and running with PBB-EVPN.
Send X frames with X different source and destination MAC addresses Send X frames with X different source and destination MAC addresses
to DUT from SHPE3 using traffic generator for one vlan. to DUT from SHPE3 using traffic generator for one vlan.
skipping to change at page 24, line 7 skipping to change at page 24, line 7
There is a bi directional traffic flow with X pps in each direction. There is a bi directional traffic flow with X pps in each direction.
Ensure the DUT learn 2X MAC. Ensure the DUT learn 2X MAC.
Then do a routing engine fail-over. Then do a routing engine fail-over.
Measurement : Measurement :
The expectation of the test is 0 traffic loss with no change in the The expectation of the test is 0 traffic loss with no change in the
DF role. DUT should not withdraw any routes.But in cases where the DF role. DUT should not withdraw any routes.But in cases where the
DUT is not property synchronized between master and standby, due to DUT is not property synchronised between master and standby, due to
that packet loss are observed. In that scenario the packet loss is that packet loss are observed. In that scenario the packet loss is
measured. The test is repeated for N times and the values are measured. The test is repeated for N times and the values are
collected. The packet loss is calculated by averaging the values collected. The packet loss is calculated by averaging the values
obtained by N samples. N is an arbitrary number to get a sufficient obtained by N samples. N is an arbitrary number to get a sufficient
sample. The time measured for each sample is denoted by T1,T2...Tn. sample. The time measured for each sample is denoted by T1,T2...Tn.
The measurement is carried out using external server which polls the The measurement is carried out using external server which polls the
DUT using automated scripts to ensure the DUT learned 2X MAC. The DUT using automated scripts to ensure the DUT learned 2X MAC. The
packet drop is measured using traffic generator. packet drop is measured using traffic generator.
Packet loss in sec with 2X MAC addresses = (T1+T2+..Tn)/N Packet loss in sec with 2X MAC addresses = (T1+T2+..Tn)/N
skipping to change at page 24, line 44 skipping to change at page 24, line 44
Then increment the scale of N by 5% of N till the limit is reached. Then increment the scale of N by 5% of N till the limit is reached.
The limit is where the DUT cant learn any EVPN routes from its peers. The limit is where the DUT cant learn any EVPN routes from its peers.
Measurement : Measurement :
There should not be any loss of route types 2,3 and 4 in DUT. DUT There should not be any loss of route types 2,3 and 4 in DUT. DUT
must relearn all type 2, 3 and 4 from remote routers. The DUT must must relearn all type 2, 3 and 4 from remote routers. The DUT must
be subjected to various values of N to find the optimal scale limit. be subjected to various values of N to find the optimal scale limit.
The scope of the test is find out the maximum evpn instance that a The scope of the test is find out the maximum EVPN instance that a
DUT can hold. The measurement is carried out using external server DUT can hold. The measurement is carried out using external server
which polls the DUT using automated scripts to find the scale limit which polls the DUT using automated scripts to find the scale limit
of PBB-EVPN instances. of PBB-EVPN instances.
4.10. Scale Convergence 4.10. Scale Convergence
Objective: Objective:
To measure the convergence time of DUT when the DUT is scaled with To measure the convergence time of DUT when the DUT is scaled with
EVPN instance along with traffic. EVPN instance along with traffic.
skipping to change at page 25, line 31 skipping to change at page 25, line 31
source and destination MAC addresses for N PBB-EVI's. source and destination MAC addresses for N PBB-EVI's.
Send F frames from traffic generator to SHPE3 with X different source Send F frames from traffic generator to SHPE3 with X different source
and destination MAC addresses. and destination MAC addresses.
There will be 2X number of MAC addresses will be learned in DUT PBB- There will be 2X number of MAC addresses will be learned in DUT PBB-
EVPN MAC table. EVPN MAC table.
There is a bi directional traffic flow with F pps in each direction. There is a bi directional traffic flow with F pps in each direction.
Then clear the BGP neighbors in the DUT. Then clear the BGP neighbours in the DUT.
Once the BGP session is in established state in DUT. Once the BGP session is in established state in DUT.
Measure the time taken to learn 2X MAC address in DUT MAC table. Measure the time taken to learn 2X MAC address in DUT MAC table.
Measurement : Measurement :
The DUT must learn 2X MAC addresses. Measure the time taken to learn The DUT must learn 2X MAC addresses. Measure the time taken to learn
2X MAC in DUT. The test is repeated for N times and the values are 2X MAC in DUT. The test is repeated for N times and the values are
collected. The convergence time is calculated by averaging the collected. The convergence time is calculated by averaging the
skipping to change at page 26, line 38 skipping to change at page 26, line 38
There is a bi directional traffic flow with F pps in each direction. There is a bi directional traffic flow with F pps in each direction.
The DUT must run with traffic for 24 hours. The DUT must run with traffic for 24 hours.
Every hour check for memory leak in PBB-EVPN process,CPU usage and Every hour check for memory leak in PBB-EVPN process,CPU usage and
crashes in DUT. crashes in DUT.
Measurement : Measurement :
Take the hourly reading of CPU, process memory. There should not be Take the hourly reading of CPU, process memory. There should not be
any leak, crashes, CPU spikes. The CPU spike is determined as the any memory leak, crashes, CPU spikes. The CPU spike is determined as
CPU usage which shoots at 40 to 50 percent of the average usage. The the sudden increase of CPU usage to 100 percent compared to the
average value vary from device to device. Memory leak is determined average usage. The average value vary from device to device. Memory
by increase usage of the memory for PBB-EVPN process. The leak is determined as the increase of memory usage with respect to
expectation is under steady state the memory usage for PBB-EVPN time. The expectation is under steady state the memory usage for
process should not increase. The measurement is carried out using PBB-EVPN process should not increase with respect to time. The
external server which polls the DUT using automated scripts which measurement is carried out using external server which polls the DUT
captures the CPU usage and process memory. using automated scripts which captures the CPU usage and process
memory.
5. Acknowledgments 5. Acknowledgments
We would like to thank Fioccola Giuseppe of Telecom Italia reviewing We would like to thank Fioccola Giuseppe of Telecom Italia reviewing
our draft and commenting it. We would like to thank Sarah Banks for our draft and commenting it. We would like to thank Sarah Banks for
guiding and mentoring us. We take the opportunity to thank Al for guiding and mentoring us. We take the opportunity to thank Al for
reviewing our draft and gave us valuable comments. reviewing our draft and gave us valuable comments.
6. IANA Considerations 6. IANA Considerations
This memo includes no request to IANA. This memo includes no request to IANA.
7. Security Considerations 7. Security Considerations
The benchmarking tests described in this document are limited to the The benchmarking tests described in this document are limited to the
performance characterization of controllers in a lab environment with performance characterisation of controllers in a lab environment with
isolated networks. The benchmarking network topology will be an isolated networks. The benchmarking network topology will be an
independent test setup and MUST NOT be connected to devices that may independent test setup and MUST NOT be connected to devices that may
forward the test traffic into a production network or misroute forward the test traffic into a production network or misroute
traffic to the test management network. Further, benchmarking is traffic to the test management network. Further, benchmarking is
performed on a "black-box" basis, relying solely on measurements performed on a "black-box" basis, relying solely on measurements
observable external to the controller. Special capabilities SHOULD observable external to the controller. Security features mentioned
NOT exist in the controller specifically for benchmarking purposes. in the RFC 7432 will affect the test results. Special capabilities
Any implications for network security arising from the controller SHOULD NOT exist in the controller specifically for benchmarking
SHOULD be identical in the lab and in production networks. purposes. Any implications for network security arising from the
controller SHOULD be identical in the lab and in production networks.
8. References 8. References
8.1. Normative References 8.1. Normative References
[RFC2544] Bradner, S. and J. McQuaid, "Benchmarking Methodology for [RFC2544] Bradner, S. and J. McQuaid, "Benchmarking Methodology for
Network Interconnect Devices", RFC 2544, Network Interconnect Devices", RFC 2544,
DOI 10.17487/RFC2544, March 1999, DOI 10.17487/RFC2544, March 1999,
<https://www.rfc-editor.org/info/rfc2544>. <https://www.rfc-editor.org/info/rfc2544>.
skipping to change at page 28, line 15 skipping to change at page 28, line 20
[RFC7623] Sajassi, A., Ed., Salam, S., Bitar, N., Isaac, A., and W. [RFC7623] Sajassi, A., Ed., Salam, S., Bitar, N., Isaac, A., and W.
Henderickx, "Provider Backbone Bridging Combined with Henderickx, "Provider Backbone Bridging Combined with
Ethernet VPN (PBB-EVPN)", RFC 7623, DOI 10.17487/RFC7623, Ethernet VPN (PBB-EVPN)", RFC 7623, DOI 10.17487/RFC7623,
September 2015, <https://www.rfc-editor.org/info/rfc7623>. September 2015, <https://www.rfc-editor.org/info/rfc7623>.
Appendix A. Appendix Appendix A. Appendix
Authors' Addresses Authors' Addresses
Sudhin Jacob (editor) Sudhin Jacob (editor)
Juniper Networks Independent
Bangalore Bangalore
India India
Phone: +91 8061212543 Phone: +91 8061212543
Email: sjacob@juniper.net Email: sudhinjacob@rediffmail.com
Kishore Tiruveedhula Kishore Tiruveedhula
Juniper Networks Juniper Networks
10 Technology Park Dr 10 Technology Park Dr
Westford, MA 01886 Westford, MA 01886
USA USA
Phone: +1 9785898861 Phone: +1 9785898861
Email: kishoret@juniper.net Email: kishoret@juniper.net
 End of changes. 25 change blocks. 
46 lines changed or deleted 50 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/