Pseudo-Wire Protection Ping Pan IETF 65.

Slides:



Advertisements
Similar presentations
Pseudowire freeze mechanism draft-jin-pwe3-pw-freeze-00 Lizhong Jin Bhumip. Khasnabish.
Advertisements

LDP extensions for Explicit Pseudowire to transport LSP mapping draft-cao-pwe3-mpls-tp-pw-over-bidir-lsp-02.txt Mach Chen Wei Cao.
Protection Mechanisms for LDP P2MP/MP2MP LSP draft-zhao-mpls-mldp-protections-02.txt Quintin Zhao, Emily Chen, Tao Chou Huawei Technology Daniel King OldDog.
Pseudowire Endpoint Fast Failure Protection draft-shen-pwe3-endpoint-fast-protection-00 Rahul Aggarwal Yimin Shen
PW Endpoint Fast Failure Protection draft-shen-pwe3-endpoint-fast-protection-02 Yimin Shen (Juniper Networks) Rahul Aggarwal (Arktan Inc) Wim Henderickx.
PW Endpoint Fast Failure Protection draft-shen-pwe3-endpoint-fast-protection-03 Yimin Shen (Juniper) Rahul Aggarwal (Arktan Inc) Wim Henderickx (Alcatel-Lucent)
MPLS additions to RSVP Tunnel identification Tunnel parameter negotiation Routing policy distribution Routing debugging information Scalability improvements.
Draft-chen-i2rs-mpls-ldp-usecases-00/ draft-huang-i2rs-mpls-te-usecase-00 IETF 88 I2RS1 Use Cases for an Interface to MPLS Protocol draft-chen-i2rs-mpls-ldp-usecases-00/
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
Path Protection in MPLS Networks Using Segment Based Approach.
Benchmarking Carrier Ethernet Technologies Workshop Session MI.1: PW/MPLS Krakow, Poland Lieven Levrau 30 th April 2008.
Dual-Homing Protection for MPLS and MPLS-TP Pseudowires
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
Ashish Gupta (98130) Ashish Gupta (98131) Under guidance of Prof. B. N. Jain.
QoS-Aware Path Protection in MPLS Networks Ashish Gupta Ashish Gupta Bijendra Jain Indian Institute of Technology Delhi Satish Tripathi University of California.
Draft-li-l2vpn-ccvpn-arch-00IETF 88 L2VPN1 An Architecture of Central Controlled Layer 2 Virtual Private Network (L2VPN) draft-li-l2vpn-ccvpn-arch-00 Zhenbin.
1 Multi-Protocol Label Switching (MPLS) presented by: chitralekha tamrakar (B.S.E.) divya krit tamrakar (B.S.E.) Rashmi shrivastava(B.S.E.) prakriti.
© 2009 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IETF 84 – Vancouver August 2012 LSP Ping Support for P2MP PWs (draft-jain-pwe3-p2mp-pw-lsp-ping-00.txt)
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
1 LSP-Trace over MPLS tunnels draft-nitinb-lsp-ping-over-mpls-tunnel-01 Nitin BahadurJuniper Networks Kireeti KompellaJuniper Networks George SwallowCisco.
IETF 68, MPLS WG, Prague P2MP MPLS-TE Fast Reroute with P2MP Bypass Tunnels draft-leroux-mpls-p2mp-te-bypass-01.txt J.L. Le Roux (France Telecom) R. Aggarwal.
P2MP MPLS-TE FRR with P2MP Bypass Tunnel draft-leroux-mpls-p2mp-te-bypass-00.txt J.L. Le Roux (France Telecom) R. Aggarwal (Juniper) IETF 67, MPLS WG,
Draft-li-mpls-network-virtualization-framework-00IETF 88 SPRING WG1 Framework of Network Virtualization Based on MPLS Global Label draft-li-mpls-network-virtualization-framework-00.
Protection and Restoration Definitions A major application for MPLS.
A Snapshot on MPLS Reliability Features Ping Pan March, 2002.
PWE3 Agenda – Monday 8 th Nov 15 min - Agenda bash, WG Agenda and Status - Andy Malis and Matthew Bocci 5 min - Dynamic Placement of Multi Segment Pseudo.
1 IETF- 56 – TE WG- SAN FRANCISCO Inter-AS MPLS Traffic Engineering draft-vasseur-inter-AS-TE-00.txt Jean-Philippe Vasseur – Cisco Systems Raymond Zhang.
Setup and Manage PBB-based Tunnels with PWE3 Mechanism Ping Pan (Hammerhead Systems) Shane Amante (Level 3) Nasser El-Aawar (Level 3) Chicago, IETF 69.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Setup and Maintenance of Pseudo- Wires Using RSVP-TE Draft-raggarwa-rsvpte-pw-01.txt.
1 IETF-81, MPLS WG, Quebec City, Canada, July, 2011 draft-ali-mpls-inter-domain-p2mp-rsvp-te-lsp-06.txt MPLS WG IETF-81 Quebec City, Canada July, 2011.
PG 1 Multi-Segment Pseudowire Setup & Maintenance using LDP draft-balus-mh-pw-control-protocol-02.txt Authors David McDysan (MCI), Mike Duckett (Bellsouth),
1 Ping and Traceroute for GMPLS LSPs in Non-Packet Switched Networks draft-ali-ccamp-gmpls-lsp-ping-traceroute-01.txt Zafar Ali, Roberto Cassata (Cisco.
Draft-torvi-mpls-rsvp-ingress-protection-00IETF 84 MPLS: 30 July Ingress Protection for RSVP-TE p2p and p2mp LSPs draft-torvi-mpls-rsvp-ingress-protection-00.
IP Traffic Engineering RSP draft-shen-ip-te-rsp-01.txt Naiming Shen Albert Tian Jun Zhuang
1 1/24/2016 draft-shah-bocci-pwe3-ms-pw-signaling-01.txt MS-PW Signaling draft-shah-bocci-pwe3-ms-pw-signaling-01.txt Matthew Bocci, Mustapha Aissaoui,
August 2004draft-bocci-2vpn-pnni-mpls-iw-01.txt Signalling Interworking for ATM VPWS draft-bocci-l2vpn-pnni-mpls-iw-01 Matthew Bocci, Mustapha Aissaoui,
Pseudo-Wire Protection Ping Pan IETF 63.
MPLS-TP Shared Mesh Protection draft-cheung-mpls-tp-mesh-protection-05 IETF 83 – Paris, March 2012 Taesik Cheung and Jeong-dong Ryoo (ETRI) Yaacov Weingarten.
PG 1 Multi-hop Pseudowire Setup and Maintenance using LDP draft-balus-mh-pw-control-protocol-00.txt David McDysan, MCI Florin Balus, Nortel.
IETF 69, July 2007Slide 1 Preferential Forwarding Status bit Definition draft-muley-dutta-pwe3-redundancy-bit-01.txt Praveen Muley, Pranjal K. Dutta, Mustapha.
LSP-Ping extensions for MPLS-TP draft-nitinb-mpls-tp-lsp-ping-extensions-01 Nitin Bahadur Sami Boutros Rahul Aggarwal Eric Gray 1IETF 77 MPLS WG IETF 77,
Precision Time Protocol over MPLS draft-ronc-ptp-mpls-00.txt PWE3 WG IETF Chicago 2007 Ron Cohen
Pseudo-Wire Protection Mustapha Aissaoui, Florin Balus, Matthew Bocci, Hamid Ould-Brahim, Ping Pan IETF 66, Montreal.
25 July Pseudowire Communities draft-pkwok-pwe3-pw-communities-01 Paul Kwok Pranjal Dutta Frederic Jounay draft-pkwok-pwe3-pw-communities-01 IETF-81.
82 nd Taipei Protection Mechanisms for LDP P2MP/MP2MP LSP draft-zhao-mpls-mldp-protections-00.txt Quintin Zhao, Emily Chen, Huawei.
1 RSVP-TE Extensions For Fast Reroute of Bidirectional Co-routed LSPs draft-tsaad-mpls-rsvpte-bidir-lsp-fastreroute-00.txt Author list: Mike Taillon
Extensions to RSVP-TE for LSP Ingress Local Protection draft-ietf-teas-rsvp-ingress-protection-04 Huaimo Chen, Raveendra Torvi Autumn Liu, Tarek Saad,
IETF 67, Nov 2006Slide 1 VCCV Extensions for Multi- Segment Pseudo-Wire draft-hart-pwe3-segmented-pw-vccv-01.txt draft-ietf-pwe3-segmented-pw-04.txt Mustapha.
Analysis on Two Methods in Ingress Local Protection.
Zhenbin Li, Li Zhang(Huawei Technologies)
PW MUX PWE – 71st IETF 10 March 2008 Yaakov (J) Stein.
draft-liu-pim-single-stream-multicast-frr-01
RSVP-TE Extensions for Associated Co-routed Bidirectional Label Switched Paths (LSPs) draft-gandhishah-teas-assoc-corouted-bidir-01 Author list: Rakesh.
Presenter: Jeffrey Zhang
MPLS LSP Instant Install draft-saad-mpls-lsp-instant-install-00
RSVP Setup Protection draft-shen-mpls-rsvp-setup-protection-02
Yimin Shen (Juniper) Rahul Aggarwal (Arktan Inc)
Protection & Restoration Design Team - CCAMP WG
78th IETF Meeting - Maastricht 27th, July 2010
PLR Designation in RSVP-TE FRR
Extensions to Resource Reservation Protocol For Fast Reroute of Traffic Engineering GMPLS LSPs draft-ietf-teas-gmpls-lsp-fastreroute-06 Authors: Mike Taillon.
draft-sitaraman-mpls-rsvp-shared-labels-00
LSP Fast-Reroute Using RSVP Detours
draft-barth-pce-association-bidir-01
Technical Issues with draft-ietf-mpls-bfd-directed
Label Switched Path (LSP) Ping for IPv6 Pseudowire FECs
Extended BFD draft-mirmin-bfd-extended
draft-liu-pim-mofrr-tilfa-00
Pseudo-Wire Protection
Inter-AS OAM for SR Networks IETF 105, Montreal
Presentation transcript:

Pseudo-Wire Protection Ping Pan IETF 65

2 Why? Node 2 Node1 PW (Important traffic) PW (Best effort) Tunnel-1 (BW1) Tunnel-2 (BW2), backup Tunnel-1 Switch-over Conventional mechanism (e.g. MPLS FRR) would work, if 1.Tunnel-1 and Tunnel-2 have the same bandwidth (i.e.,BW1 = BW2) 2.All PW’s are equally important Otherwise, if BW2 < BW1, Important traffic may get dropped/delayed during network failure PW protection: Each PW needs to have its own “importance” and QoS level During switch-over, preempt others if necessary

3 Design Considerations (1) Need to work in single and multi-segement environment –Work with Generic ID FEC only Working and protection PW’s must be uniquely identified –But make the use of AII/AGI may not be a good idea working protection Need to know what to process

4 Design Considerations (2) On Backup Path Determination –Carrying “ERO” should be optional Use hop-by-hop forwarding for the working PW Get “RRO” information from “PW Switching Point TLV (SP- TLV)” Build the protection PW base on SP-TLV May use SP-TLV for loop-detection On CAC at each hop –Should be optional depending the traffic types Other relevant protection information: –1:1 or 1:N: need to validate the need of 1:N –Fate-sharing: useful in multi-hop applications –Hot-standby vs. cold-standby

5 Protocol Extension Protection-TLV –Setup and Holding Preference Levels –Protection Type: hot or cold standby –Schemes: 1:1 or 1:N –Flags: Fate-sharing allowed Per-hop BW CAC required –Reference ID: unique identify working and protecting PW’s PW Status: –Bad message, no bandwidth etc. Everything else: –Keep as it is AII/AGI must be the same on all working and protecting PW’s

6 How does it work? Node 3 Node1 Working PWProtecting PW Node 2 1.Send out Label Mapping and setup the working PW 2.When working, setup the protecting PW (base on SP-TLV…) 3.When working, pointing user traffic to the protecting PW 4.During failure (learned from BFD etc.), switch over 5.Preempt traffic when needed… 1.Run the Generic FEC procedure to setup the working PW 2.Run the Generic FEC procedure to setup the protection PW 3.When working, pointing user traffic to the protecting PW 4.During failure (learned from BFD etc.), switch over 5.Preempt traffic when needed… 1.Run MHOP PW for working and protection PW setup 2.Use SP-TLV for loop detection 3.Use Protection-TLV and SP-TLV to forward working and protection PW’s 4.Forward failure status if not working

7 Next Step This proposal works in both single- segment and multi-segment cases Like to –Continue to gather feedback –Iron out the details with others –Make this into a WG Working Document THANK YOU ALL