
Figure 40. Before Polarization Effect
Router B performs the same hash as router A and all the traffic goes through the same path to router D, while no traffic is redirected
to router E.
Some of the anti-polarization techniques used generally to mitigate unequal traffic distribution in LAG/ECMP as follows:
1.
Configuring different hash-seed values at each node - Hash seed is the primary parameter in hash computations that determine
distribution of traffic among the ECMP paths. The ECMP path can be configured different in each of the nodes “
hash-
algorithm seed-value
” would result in better traffic distribution for a given flow, by reducing Polarization effect.
2.
Configuring Ingress port as an additional load-balancing parameters [using “load-balance ingress-port enable”] would reduce the
polarization effect.
3.
Configuring different load-balancing parameters at each tier. In Router A, the hash fields for load balancing could be source-ip,
dest-ip, vlan, protocol, L4-source-port and L4-dest-port, whereas on Router B, the hash fields use only source-ip, dest-ip, and
protocol
4.
Configuring different hash algorithms at different tiers. For example, Router A could use crc16 as the hash algorithm while
router B can use XOR16 as the hash algorithm.
Configuration and Benefits
The preceding anti-polarization techniques require some coordinated configuration of network nodes to solve the problem and these
techniques are not scalable when the number of tiers in the network is high. Flow based hashing specifically addresses this using
Macro flow-based Hash
function. It facilitates a dynamic hash function selection across different nodes in a network on a macro
flow basis, thus reducing unfair distribution of bandwidth between members and starvation.
Selection of Algorithms is available under flow-based-hashing enabling another level of randomness in hash selection. CLI to enable
flow-based hashing is shown in the given example:
Dell_GW1(conf)#hash-algorithm ecmp flow-based-hashing ?
crc16 CRC16_BISYNC - 16 bit CRC16-bisync polynomial(default)
crc16cc CRC16_CCITT - 16 bit CRC16 using CRC16-CCITT polynomial
crc32MSB CRC32_UPPER - MSB 16 bits of computed CRC32
crc32LSB CRC32_LOWER - LSB 16 bits of computed CRC32
306
Equal Cost Multi-Path (ECMP)
Содержание S4048-ON
Страница 1: ...Dell Configuration Guide for the S4048 ON System 9 9 0 0 ...
Страница 146: ...Figure 14 BFD Three Way Handshake State Changes 146 Bidirectional Forwarding Detection BFD ...
Страница 477: ...Figure 68 Inspecting Configuration of LAG 10 on ALPHA Link Aggregation Control Protocol LACP 477 ...
Страница 480: ...Figure 70 Inspecting a LAG Port on BRAVO Using the show interface Command 480 Link Aggregation Control Protocol LACP ...
Страница 481: ...Figure 71 Inspecting LAG 10 Using the show interfaces port channel Command Link Aggregation Control Protocol LACP 481 ...
Страница 522: ...Figure 87 Configuring Interfaces for MSDP 522 Multicast Source Discovery Protocol MSDP ...
Страница 523: ...Figure 88 Configuring OSPF and BGP for MSDP Multicast Source Discovery Protocol MSDP 523 ...
Страница 524: ...Figure 89 Configuring PIM in Multiple Routing Domains 524 Multicast Source Discovery Protocol MSDP ...
Страница 528: ...Figure 91 MSDP Default Peer Scenario 1 528 Multicast Source Discovery Protocol MSDP ...
Страница 529: ...Figure 92 MSDP Default Peer Scenario 2 Multicast Source Discovery Protocol MSDP 529 ...
Страница 530: ...Figure 93 MSDP Default Peer Scenario 3 530 Multicast Source Discovery Protocol MSDP ...
Страница 633: ...Policy based Routing PBR 633 ...
Страница 777: ...Figure 119 Single and Double Tag TPID Match Service Provider Bridging 777 ...
Страница 778: ...Figure 120 Single and Double Tag First byte TPID Match 778 Service Provider Bridging ...