Overcomming Link/Router Failure In MPLS Networks

Slides:



Advertisements
Similar presentations
Identifying MPLS Applications
Advertisements

Generalized Multiprotocol Label Switching: An Overview of Signaling Enhancements and Recovery Techniques IEEE Communications Magazine July 2001.
MULTIPROTOCOL LABEL SWITCHING Muhammad Abdullah Shafiq.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—8-1 MPLS TE Overview Understanding MPLS TE Components.
Restoration by Path Concatenation: Fast Recovery of MPLS Paths Anat Bremler-Barr Yehuda Afek Haim Kaplan Tel-Aviv University Edith Cohen Michael Merritt.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—2-1 Label Assignment and Distribution Introducing Typical Label Distribution in Frame-Mode MPLS.
Introducing MPLS Labels and Label Stacks
CS Summer 2003 Lecture 12 FastReRoute (FRR) - Big Picture.
Introduction to MPLS and Traffic Engineering Zartash Afzal Uzmi.
December 20, 2004MPLS: TE and Restoration1 MPLS: Traffic Engineering and Restoration Routing Zartash Afzal Uzmi Computer Science and Engineering Lahore.
MPLS H/W update Brief description of the lab What it is? Why do we need it? Mechanisms and Protocols.
MPLS and Traffic Engineering
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
Introduction to MPLS and Traffic Engineering
Path Protection in MPLS Networks Using Segment Based Approach.
Multi-Protocol Label Switching
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
COS 420 Day 16. Agenda Assignment 3 Corrected Poor results 1 C and 2 Ds Spring Break?? Assignment 4 Posted Chap Due April 6 Individual Project Presentations.
QoS-Aware Path Protection in MPLS Networks Ashish Gupta Ashish Gupta Bijendra Jain Indian Institute of Technology Delhi Satish Tripathi University of California.
A Study of MPLS Department of Computing Science & Engineering DE MONTFORT UNIVERSITY, LEICESTER, U.K. By PARMINDER SINGH KANG
1 MPLS Architecture. 2 MPLS Network Model MPLS LSR = Label Switched Router LER = Label Edge Router LER LSR LER LSR IP MPLS IP Internet LSR.
SMUCSE 8344 Constraint-Based Routing in MPLS. SMUCSE 8344 Constraint Based Routing (CBR) What is CBR –Each link a collection of attributes (performance,
1 Multi-Protocol Label Switching (MPLS) presented by: chitralekha tamrakar (B.S.E.) divya krit tamrakar (B.S.E.) Rashmi shrivastava(B.S.E.) prakriti.
1 Multi Protocol Label Switching Presented by: Petros Ioannou Dept. of Electrical and Computer Engineering, UCY.
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
Introduction to MPLS and Traffic Engineering Zartash Afzal Uzmi.
1 Multiprotocol Label Switching. 2 “ ” It was designed to provide a unified data-carrying service for both circuit-based clients and packet-switching.
MPLS MultiProtocol Label Switching.
IP/MPLS Multiprotocol Label Switching
© 2006 Cisco Systems, Inc. All rights reserved. MPLS Introduction Module 4: Frame Mode MPLS Implementation.
MPLS and Traffic Engineering Ji-Hoon Yun Computer Communications and Switching Systems Lab.
MPLS Forwarder Preliminary 1 Outline MPLS Overview MPLS Overview MPLS MRD MPLS Data Path HLD 48K MPLS Fwder HLD IPE MPLS Fwder HLD Issues Summary.
Protection and Restoration Definitions A major application for MPLS.
A Snapshot on MPLS Reliability Features Ping Pan March, 2002.
MPLS Label Last Update Copyright 2011 Kenneth M. Chipps Ph.D. 1.
MPLS Some notations: LSP: Label Switched Path
1 Multiprotocol Label Switching (MPLS) and its Applications Network Architecture Spring 2009 Lecture 17.
(Slide set by Norvald Stol/Steinar Bjørnstad
Multiple Protocol Support: Multiprotocol Level Switching.
MULTI-PROTOCOL LABEL SWITCHING By: By: YASHWANT.V YASHWANT.V ROLL NO:20 ROLL NO:20.
Multi-protocol Label Switching
Multiprotocol Label Switching (MPLS) Routing algorithms provide support for performance goals – Distributed and dynamic React to congestion Load balance.
Multi-protocol Label Switching (MPLS) RFC 3031 MPLS provides new capabilities: QoS support Traffic engineering VPN Multiprotocol support.
Shengling Wang; Yong Cui; Das, S.; Mingwei Xu; Communications Workshops, ICC Workshops '08. IEEE International Conference on May 19-23, 2008 Page(s):441.
MPLS Introduction Computer Networks 2007 Week 9 Lecture 1 by Donald Neal.
MPLS Virtual Private Networks (VPNs)
Multi Protocol Label Switching (MPLS)
Advanced Computer Networks
Performance Measurements of MPLS Traffic Engineering and QoS
Multiprotocol Label Switching
Requirements for LER Forwarding of IPv4 Option Packets
Inter domain signaling protocol
Presenter: Jeffrey Zhang
Packet Switching Datagram Approach Virtual Circuit Approach
RSVP Setup Protection draft-shen-mpls-rsvp-setup-protection-02
Multi Protocol Label Switching (MPLS)
Yimin Shen (Juniper) Rahul Aggarwal (Arktan Inc)
Internet Quality of Service
MPLS Basics 2 2.
CHAPTER 8 Network Management
MPLS and its Applications CS 520 – Winter 2006 Lecture 17
Congestion Control (from Chapter 05)
MPLS and its Applications CS 520 – Winter 2007 Lecture 17
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
Label Switched VPNs – Scalability and Performance Analysis
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
Eusebi Calle, Jose L Marzo, Anna Urra. L. Fabrega
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
Presentation transcript:

Overcomming Link/Router Failure In MPLS Networks Yuval Hava Pini Halperin

Introduction MPLS networks overview MPLS in the use of path recovery Methods of recovery Results

Ethernet, Frame Relay, ATM, PPP… MPLS – Terminology FEC – Forwarding Equivalence Classes LER – Label Edge Router LSR – Label Switching Router LSP – Label Switching Path LDP – Label Distribution Protocol IP MPLS Ethernet, Frame Relay, ATM, PPP… Physical Layer

MPLS – Terminology MPLS Network הסבר איך הרשת עובדת מבחינת כל המרכיבים ( בכלליות ) עם החבילות. בהתחלה משתמש קצה מנסה להגיע למשתמש אחר הLER מוסיף לחבילה לייבל החבילה נעה ברשת MPLS עד שתגיע לLER ששמנו יוצאת ביציאה LER מוריד את התוספת של החבילה

MPLS Header Format MPLS ‘Shim’ Headers (1-n) n ••• 1 Layer 2 Header (eg. PPP, 802.3) Network Layer Header and Packet (eg. IP) 4 Bytes Label Stack Entry Format Label Exp. S TTL |------------------------------ 20 -----------------------------| |---- 3 ----| |- 1 -| |----------- 8 -----------| Label: Label Value, 20 bits (0-16 reserved) Exp.: Experimental / Class of Service, 3 bits S: Bottom of Stack, 1 bit (1 = last entry in label stack) TTL: Time to Live, 8 bits MPLS header is inserted between layer 3 and layer 2 headers

MPLS – FEC FEC - forward equivalence class LER classifies incoming IP traffic, relating it to the appropriate label by the FEC priority. We establish routing paths (A…Z), and we call them forward equivalence classes, or FECs. The FEC “A” paths are the highest-quality paths, and the FEC “Z” paths are the lowest-quality paths.

MPLS – FEC LSP IP1 IP2 IP1 IP2 IP1 #L1 IP2 IP1 #L2 IP2 IP1 #L3 IP2 LER LSR LSR LER LSP IP1 IP2 IP1 IP2 IP1 #L1 IP2 IP1 #L2 IP2 IP1 #L3 IP2 FEC – חבילות שמסלולן ברשת הוא זהה יוגדרו כשייכות לאותו ה-FEC Packets are destined for different address prefixes, but can be mapped to common path FEC - A subset of packets that are all treated the same way by a router

MPLS – LSR LSR – Label Switching Router When packets leave the LER, they are destined for the LSR, then there examined for the presence of labels. The LSR looks to its forwarding table. LIB (label information base), the LSR will swap labels according to instructions in LIB table.

MPLS – LSR Example R1 X A B R4 D R3 None 20 Label Stack R2 Z R5

MPLS – LSR Example R1 X A B R4 D R3 20 600 Label Stack R2 Z R5

MPLS – LSR Example R1 X A B R4 D R3 600 Label Stack R2 Z R5

MPLS – LSP LSP – Label Switching Path MPLS domain a path is setup for a given packet to travel based on an FEC Two options for route selection for a particular FEC : Hop by hop routing Explicit routing Hop-by-Hop routing This method allows each LSR to independently choose the next hop for each FEC. It is similar to that currently used in IP networks. The LSR uses any available routing protocols like Open Shortest Path First (OSPF). Within an MPLS domain a path is setup for a given packet to travel based on an FEC. The LSP setup for an FEC is unidirectional in nature. The return traffic must take another LSP. There are two different options available to select the LSP for a particular FEC.

MPLS – LSP Explicit Routing (Source Routing) is a very powerful technique With pure datagram routing, overhead of carrying complete explicit route is prohibitive MPLS allows explicit route to be carried only at the time the LSP is setup, and not with each packet MPLS makes explicit routing practical In an explicitly routed LSP LSP next hop is not chosen by the local node Selected by a single node, usually the ingress The sequence of LSRs may be chosen by Configuration (e.g., by an operator or by a centralized server) Selected dynamically by Ingress or Egress LSR MPLS explicit routing much more efficient than the alternative of IP source routing In MPLS the explicit route needs to be specified at the time when labels are assigned, but explicit route does not have to be specified with each IP packet. This makes MPLS explicit routing much more efficient than the alternative of IP source routing.

MPLS – LSP Example Consider the next parameters : LSR1 -> LSR7 Ingress Egress Consider the MPLS domain shown in Figure 2-7. Without explicit path routing, the tunnel is created hop by hop along the following path: LSR 1 -> LSR 3 -> LSR 4 -> LSR 7 Suppose LSR 5 and LSR 6 are underused and LSR 4 is overused. In this case you might choose to configure the following explicit path because it forwards the data better than the hop-by-hop path: LSR 1 -> LSR 3 -> LSR 5 -> LSR 6 -> LSR 7 physical connection hop by hop LSP explicit routing LSP Consider the next parameters : LSR1 -> LSR7 LSR5, LSR6 are underused LSR4 is overused

MPLS Example of hop by hop path: R1 R2 R3 R4 Packet P R1 analyzes P’s dest. And sets L1 to P L1 is being pushed into MPLS label stack in P’s header L1 represents LSP <R1,R2,R3,R4>

MPLS Example of hop by hop path: R1 R2 R3 R4 R21 R22 R23 R2 determines that P must pass through green tunnel R2 pushes a new label: L2 During tunneling through R2, R21, R22, R23, R3, stack has depth 2 L2 represents LSP <R2, R21, R22, R23, R3>

MPLS Example of hop by hop path: R1 R2 R3 R4 R21 R22 R23 R3 finds out it is the final hop of L2 LSP and pops L2 from the stack R3 discovers L1 on top of the stack and forwards P to the next hop for L1 LSP: R4

MPLS Why use MPLS ? IP-based forwarding is too slow for large traffic loads. In MPLS, the lookup requires only one access to the forwarding table Scalability: Label switching allowing large number of IP addresses with one or few labels Route control (exist in IP-based forwarding but is too messy) Route control קיים בניתוב IP אבל הוא לא הכי נוח לשימוש: המקור חייב לדעת מראש את מסלול הניתוב ליעד תוספת הניתוב יכולה להיות ארוכה- overhead לא כל הרשתות תומכות בזה

MPLS With the needs of real-time, high priority, and mission critical application services, network reliability and survivability have become important issues in the Internet Network failure is critical to these applications IP based recovery mechanism may take a long time (10s of seconds) - may result in a large amount of packet loss MPLS based protection: a protected LSP makes traffic travel through it at the same service quality regardless of any failures הסבר על הקריטיות וחשיבות השיקום המהיר

MPLS – LSP Failure Recovery All methods pre-establish a backup path Quick recovery 2 common types of recovery: Global repair The ingress LSR establishes the backup path to the whole LSP Local repair Each LSR along the path establishes the backup path to the next hop החלוקה ל-local ןל- global זהה לחלוקת שיטות הניתוב: hop by hop ו- explicit

RSVP-TE RSVP defines a 'session' to be a data flow with a particular destination and transport-layer protocol RSVP-TE – an extension to RSVP, defines resource reservation for IP systems RFC 4090 efficiently uses RSVP-TE to establish backup label-switched path (LSP) tunnels for the local repair of LSP tunnels RSVP – שיטה המגדירה session ברשת המכיל מידע מוגדר לגבי איכות התקשורת אל היעד RSVP-TE – הרחבה המיועדת לרשתות IP באמצעות RSVP-TE ניתן להגדיר בקלות מסלולי גיבוי של LSPs.

RSVP-TE – backup LSPs Meets the needs of real-time applications Traffic should be redirected onto backup LSP tunnels in 10s of milliseconds Can be satisfied by computing and signaling backup LSP tunnels in advance of failure and by re-directing traffic as close to the failure point as possible The time for redirection includes no path computation and no signaling delays, including delays to propagate failure notification between label-switched routers (LSRs). This extension will meet the needs of real-time applications such as voice over IP, for which user traffic should be redirected onto backup LSP tunnels in 10s of milliseconds. This timing requirement can be satisfied by computing and signaling backup LSP tunnels in advance of failure and by re-directing traffic as close to the failure point as possible. In this way, the time for redirection includes no path computation and no signaling delays, including delays to propagate failure notification between label-switched routers (LSRs).

RSVP-TE – backup LSPs One-to-one backup Protected LSP: [R1-R2-R3-R4-R5] R1's Backup: [R1-R6-R7-R8-R3] R2's Backup: [R2-R7-R8-R4] R3's Backup: [R3-R8-R9-R5] R4's Backup: [R4-R9-R5] R6 R7 R8 R9 Detour – partial one-to-one backup LSP For instance, if the link [R2-R3] fails , R2 will switch traffic received from R1 onto the protected LSP along link [R2-R7], using the label received when R2 created the detour. When R4 receives traffic with the label provided for R2's detour, R4 will switch that traffic onto link [R4-R5], using the label received from R5 for the protected LSP. At no point does the depth of the label stack increase as a result of the detour. While R2 is using its detour, traffic will take the path [R1-R2-R7-R8-R4-R5] For N nodes, there could be as many as (N - 1) detours Protected LSP: [R1->R2->R3->R4->R5] R1's Backup: [R1->R6->R7->R8->R3] R2's Backup: [R2->R7->R8->R4] R3's Backup: [R3->R8->R9->R5] R4's Backup: [R4->R9->R5] We refer to a partial one-to-one backup LSP [R2->R7->R8->R4] as a detour. To minimize the number of LSPs in the network, it is desirable to merge a detour back to its protected LSP, when feasible. When a detour LSP intersects its protected LSP at an LSR with the same outgoing interface, it will be merged. When a failure occurs along the protected LSP, the PLR redirects traffic onto the local detour. For instance, if the link [R2->R3] fails in Example 1, R2 will switch traffic received from R1 onto the protected LSP along link [R2->R7], using the label received when R2 created the detour. When R4 receives traffic with the label provided for R2's detour, R4 will switch that traffic onto link [R4-R5], using the label received from R5 for the protected LSP. At no point does the depth of the label stack increase as a result of the detour. While R2 is using its detour, traffic will take the path [R1->R2->R7->R8->R4->R5].

RSVP-TE – backup LSPs Facility backup Protected LSP 1: [R1-R2-R3-R4-R5] Protected LSP 2: [R8-R2-R3-R4] Protected LSP 3: [R2-R3-R4-R9] Bypass LSP Tunnel: [R2-R6-R7-R4] R6 R7 R9 For instance, if link [R2-R3] fails , R2 will switch onto link [R2-R6]. The label will be switched for one which will be understood by R4 to indicate the protected LSP, and the bypass tunnel's label will then be pushed onto the label-stack of the redirected packets. R4 will pop the bypass tunnel's label and examine the label underneath to determine the protected LSP that the packet is to follow. When R2 is using the bypass tunnel for protected LSP 1, the traffic takes the path [R1-R2-R6-R7-R4-R5]; the bypass tunnel is the connection between R2 and R4. There could be as many as (N-1) bypass tunnels to fully protect an LSP that traverses N nodes R2 has built a bypass tunnel that protects against the failure of link [R2->R3] and node [R3]. The doubled lines represent this tunnel. This technique provides a scalability improvement, in that the same bypass tunnel can also be used to protect LSPs from any of R1, R2, or R8 to any of R4, R5, or R9. The example describes three different protected LSPs that are using the same bypass tunnel for protection. As with the one-to-one method, there could be as many as (N-1) bypass tunnels to fully protect an LSP that traverses N nodes. However, each of those bypass tunnels could protect a set of LSPs. When a failure occurs along a protected LSP, the PLR redirects traffic into the appropriate bypass tunnel. For instance, if link [R2->R3] fails in Example 2, R2 will switch traffic received from R1 on the protected LSP onto link [R2->R6]. The label will be switched for one which will be understood by R4 to indicate the protected LSP, and the bypass tunnel's label will then be pushed onto the label- stack of the redirected packets. If penultimate-hop-popping is used, the merge point in Example 2, R4, will receive the redirected packet with a label indicating the protected LSP that the packet is to follow. If penultimate-hop-popping is not used, R4 will pop the bypass tunnel's label and examine the label underneath to determine the protected LSP that the packet is to follow. When R2 is using the bypass tunnel for protected LSP 1, the traffic takes the path [R1->R2->R6->R7->R4->R5]; the bypass tunnel is the connection between R2 and R4.

Pre-Qualify IETF’s recovery mechanisms have not considered optimal backup path for the recovery of an LSP in the occurrence of a network failure Pre-qualified recovery path – establishing an optimal backup LSP during the working LSP setup time Has a drawback: as time goes by, the network status changes The pre-qualified recovery path may not be optimal at the time of failure IETF הגדירו בגדול שני סוגים להגנה על LSP: Protection switching Rerouting model אבל לא מבטיחים שמסלול הגיבוי יהיה אופטימאלי לסוג התעבורה, כמו המסלול המקורי

Efficient Pre-Qualify During setup, each LSR calculates the pre-qualified recovery path to the next hop Whenever each LSR receives routing update message (and information of current network parameters), the qualified recovery path is also updated immediately When a fault occurs, the LSR establishes the recovery path using constraint-based LDP or sends FIS to LER If LER cannot establish a recovery path, it notifies to network manager Efficient pre-qualify מבוסס על שיטת explicit LSP אך עם local repair כאשר LSR מזהה נפילה, הוא ישר מודיע על הקמת recovery path ע"י constraint-based LDP. (constraint-based LDP – פרוטוקול להעברת הודעות "מפורשות" ליצירת ניתובים ברשת) אם לא, אז שולח FIS – fault indication signal

Efficient Pre-Qualify Simulation results: Figure 5 shows the result of simulation. Due to using he same backup path(LSR 4-5-6, in Figure 4), both the umber of packet loss and re-ordering has no difference ntil the amount of traffic of working and backup path eaches 5Mb. However, the packet loss of new roposed method is much smaller than that of an existing ne, from the traffic is 6Mb. This result is caused that ew proposed pre-qualified method uses the optimal ackup path(LSR 4-3-7-6), because congestion has occurred after protection LSP establishment. In case of packet re-ordering, the result of simulation has shown the same trend.

Hundessa Fast rerouting MPLS Upgraded D.Haskin method for backwards LSP. Backwards LSP : When a failure is detected the traffic is sent backwards to the ingress LSR using the pre-established LSP. From the ingress LSR the data will now sent through the recovery path . Drawback in this method is the delay involved in detecting the first packet plush the delay of the subsequent packets . backwards path Ingress Egress recovery path

Hundessa Fast rerouting MPLS Hundessa proposed a better way to overcome D.Haskin method with respect to RTT delay and packet disorder . When a fault is detected by LSR : Each LSR on backward start storing incoming packets in local buffer Last packet before initiating storing is tagged to indentify way back Each LSR on the backward send back its stored packets when he received its tagged packet We use one of the Exp field bits in MPLS header to avoid overheads Ingress LSR sent its stored packet with all the new packets from the backwards LSR’s through the alternative LSP Ingress Egress

Hundessa Fast rerouting MPLS A simulation was made in a network simulator for MPLS called MNS

FRR with PBT Fast ReRoute with Pre-establised Bypass Tunnels Establishes bypass tunnels rather than backup paths A tunnel back up all protected LSPs, not a particular one Max-Flow-Min-Cut is adopted to find the necessary links through which all paths between LSRi and LSRj must pass To protect both link failure and node failure, bypass tunnels are established around the next hop to the next-next hop

FRR with PBT Fast ReRoute with Pre-establised Bypass Tunnels Shortest augmenting path algorithm: 1. Set the residual bandwidth of every link as the link bandwidth Identify the shortest path from one LSR to the other. If the path does not exit, then end the algorithm. 3. Discover the minimum residual bandwidth R in the path, and decrease the residual bandwidth by R for each link in the path. If the residual bandwidth of a link is zero, then set this link to be disconnected. 4. Store the path and go to step 2.

FRR with PBT Fast ReRoute with Pre-establised Bypass Tunnels Each LSR establishes the bypass tunnels in the network initial state. The bypass tunnels to the next-next hop are set up with the shortest augmenting path algorithm By that, we establish the least amount of tunnels between 2 LSRs PBT-D Disjoint bypass tunnel for every link Disjoint algorithm can reduce the searching time for the shortest path

Reroute Methods comparison The simulation topology

Reroute Methods comparison Packet loss vs Transmission rates (bps) Pre-qualify has more packet loss since it reroutes the packets after failure

Reroute Methods comparison CRR – the number of packets received without link failure divided by the number of packets received with link failure