Presenter: Jeffrey Zhang

Slides:



Advertisements
Similar presentations
Virtual Links: VLANs and Tunneling
Advertisements

MPLS VPN.
Identifying MPLS Applications
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 MPLS Scale to 100k endpoints with resiliency and simplicity Clarence.
Juniper Networks, Inc. Copyright © L2 MPLS VPNs Hector Avalos Technical Director-Southern Europe
© 2010 Cisco and/or its affiliates. All rights reserved. 1 Segment Routing Clarence Filsfils – Distinguished Engineer Christian Martin –
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—2-1 Label Assignment and Distribution Introducing Typical Label Distribution in Frame-Mode MPLS.
Draft-li-mpls-global-label-usecases-00IETF 88 SPRING WG1 Usecases of MPLS Global Label draft-li-mpls-global-label-usecases-00 Zhenbin Li, Quintin Zhao.
Pseudowire Endpoint Fast Failure Protection draft-shen-pwe3-endpoint-fast-protection-00 Rahul Aggarwal Yimin Shen
PW Endpoint Fast Failure Protection draft-shen-pwe3-endpoint-fast-protection-02 Yimin Shen (Juniper Networks) Rahul Aggarwal (Arktan Inc) Wim Henderickx.
PW Endpoint Fast Failure Protection draft-shen-pwe3-endpoint-fast-protection-03 Yimin Shen (Juniper) Rahul Aggarwal (Arktan Inc) Wim Henderickx (Alcatel-Lucent)
CS Summer 2003 Lecture 14. CS Summer 2003 MPLS VPN Architecture MPLS VPN is a collection of sites interconnected over MPLS core network. MPLS.
MPLS H/W update Brief description of the lab What it is? Why do we need it? Mechanisms and Protocols.
MPLS and Traffic Engineering
SMUCSE 8344 MPLS Virtual Private Networks (VPNs).
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—4-1 MPLS VPN Technology Forwarding MPLS VPN Packets.
November th Requirements for supporting Customer RSVP and RSVP-TE over a BGP/MPLS IP-VPN draft-kumaki-l3VPN-e2e-mpls-rsvp-te-reqts-05.txt.
1 Multi Protocol Label Switching Presented by: Petros Ioannou Dept. of Electrical and Computer Engineering, UCY.
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
P2MP MPLS-TE FRR with P2MP Bypass Tunnel draft-leroux-mpls-p2mp-te-bypass-00.txt J.L. Le Roux (France Telecom) R. Aggarwal (Juniper) IETF 67, MPLS WG,
A Snapshot on MPLS Reliability Features Ping Pan March, 2002.
Graceful Label Numbering in Optical MPLS Networks Ibrahim C. Arkut Refik C. Arkut Nasir Ghani
Draft-torvi-mpls-rsvp-ingress-protection-00IETF 84 MPLS: 30 July Ingress Protection for RSVP-TE p2p and p2mp LSPs draft-torvi-mpls-rsvp-ingress-protection-00.
IP Traffic Engineering RSP draft-shen-ip-te-rsp-01.txt Naiming Shen Albert Tian Jun Zhuang
A Snapshot on MPLS Reliability Features Ping Pan March, 2002.
2547 egress PE Fast Failure Protection draft-minto-2547-egress-node-fast-protection-00 Jeyananth Minto Maciek
RSVP Setup Protection draft-shen-mpls-rsvp-setup-protection-00 Yimin Shen (Juniper Networks) Yuji Kamite (NTT Communication) IETF 83, Paris, France.
82 nd Taipei Protection Mechanisms for LDP P2MP/MP2MP LSP draft-zhao-mpls-mldp-protections-00.txt Quintin Zhao, Emily Chen, Huawei.
Multicast State Advertisement in EVPN draft-li-l2vpn-evpn-multicast-state-ad Zhenbin Li Junlin Zhang Huawei Technologies July, 2013 Berlin Germany.
1 RSVP-TE Extensions For Fast Reroute of Bidirectional Co-routed LSPs draft-tsaad-mpls-rsvpte-bidir-lsp-fastreroute-00.txt Author list: Mike Taillon
1 MPLS Source Label Mach Chen Xiaohu Xu Zhenbin Li Luyuan Fang IETF87 MPLS Aug Berlin draft-chen-mpls-source-label-00.
MPLS Introduction Computer Networks 2007 Week 9 Lecture 1 by Donald Neal.
Analysis on Two Methods in Ingress Local Protection.
MPLS Virtual Private Networks (VPNs)
draft-zhao-teas-pcecc-use-cases-03
RSVP Setup Protection draft-shen-mpls-rsvp-setup-protection-03
Konstantin agouros Omkar deshpande
Requirements for LER Forwarding of IPv4 Option Packets
P2MP MPLS-TE Fast Reroute with P2MP Bypass Tunnels
Dave Allan Requirements and Framework for Unified MPLS Sub-Network Interconnection draft-allan-unified-mpls-req-frmwk-00 Dave.
RSVP-TE Extensions for Associated Co-routed Bidirectional Label Switched Paths (LSPs) draft-gandhishah-teas-assoc-corouted-bidir-01 Author list: Rakesh.
draft-atlas-rtgwg-mrt-mc-arch-02
Point-to-Multipoint Pseudo-Wire Encapsulation draft-raggarwa-pwe3-p2mp-pw-encaps-00.txt R. Aggarwal (Juniper)
RSVP Setup Protection draft-shen-mpls-rsvp-setup-protection-02
Multi Protocol Label Switching (MPLS)
Yimin Shen (Juniper) Rahul Aggarwal (Arktan Inc)
Multi-domain MPLS Deployment Enhancement
Extensions to RSVP-TE for P2MP LSP Ingress/Egress Local Protection
Internet Quality of Service
PLR Designation in RSVP-TE FRR
Extensions to Resource Reservation Protocol For Fast Reroute of Traffic Engineering GMPLS LSPs draft-ietf-teas-gmpls-lsp-fastreroute-06 Authors: Mike Taillon.
MPLS Basics 2 2.
MPLS - How does it work ?.
Fast Reroute for Node Protection in LDP- based LSPs
draft-chandra-mpls-rsvp-shared-labels-np-00
CHAPTER 8 Network Management
Zhenbin Li, Shunwan Zhuang Huawei Technologies
A Unified Approach to IP Segment Routing
MPLS VPNs by Richard Bannister.
Kireeti Kompella Juniper Networks
draft-sitaraman-mpls-rsvp-shared-labels-00
Separating Routing Planes using Segment Routing draft-gulkohegde-spring-separating-routing-planes-using-sr-00 IETF 98 – Chicago, USA Shraddha Hegde
EVPN a very short introduction
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
Label Switched VPNs – Scalability and Performance Analysis
Fast Reroute for Node Protection in LDP- based LSPs
IS-IS VPLS for Data Center Network draft-xu-l2vpn-vpls-isis-02
IP RSVP-TE: Extensions to RSVP for P2P IP-TE LSP Tunnels Tarek Saad, Juniper Networks Vishnu Pavan Beeram, Juniper.
BGP VPN service for SRv6 Plus IETF 105, Montreal
Zhaohui (Jeffrey) Zhang
Presentation transcript:

Presenter: Jeffrey Zhang (zzhang@juniper.net) MPLS Egress Protection Framework draft-shen-mpls-egress-protection-framework Presenter: Jeffrey Zhang (zzhang@juniper.net) Authors: Yimin Shen (yshen@juniper.net) Minto Jeyananth (minto@juniper.net)

What is MPLS Egress Protection ? MPLS egress failure – Failure of the egress node of an MPLS tunnel. MPLS egress protection – FRR for protecting an MPLS tunnel and the services carried by the tunnel against an egress failure. Driven by local failure detection and local repair on penultimate hop router. Equivalent to existing FRR for transit link and node failures, e.g. RSVP, LDP, LFA, etc. complements global repair (i.e. end-to-end repair) and control plane convergence

Specific Nature of Egress Protection Egress failure must be considered at two levels: Transport level – A failure of transport tunnel, for MPLS packets not being able to reach the egress router. Service level – A failure of every service carried by the tunnel, for service packets not being able to reach the service instances on the egress router. Accordingly, egress protection must be provided at both levels. Transport level – PLR redirects packets to a “protector” which acts as backup egress router. Service level – Protector hosts backup service instances to forward service packets to ultimate service destinations. The protector and backup service instances are unique components in egress protection.

Goals of This Draft Build a unified framework with support for all tunnel protocols and all service types. Minimize complexity and impact on MPLS networks by avoiding extension to tunnel protocols. Provide guidelines for extensions to service protocols. Should be addressed by separate drafts on a per-service-type basis. Serve as an informational document.

Requirements Must support P2P tunnels, as well as P2MP and MP2P tunnels by treating sub- LSPs as P2P. Must be independent of tunnel protocols, such as RSPV, LDP, BGP, SR. Must be generic to support all IP/MPLS services, including layer-2/3 VPNs. PLR must be agnostic on services and service labels, and maintain protecton state on a per-tunnel basis, rather than a per-service-label basis. PLR must be able to use routing and TE info to resolve path for bypass tunnel. Protector must be able to perform context label switching for rerouted MPLS service packets, and perform context IP forwarding for rerouted IP service packets. Must work seamlessly with transit link and node protection mechanisms

Basic Idea PLR is penultimate hop router. Pre-establishes a bypass tunnel to protector, with UHP. Protector is a backup egress router. Points bypass tunnel to special label table and IP forwarding table, corresponding to the label space and IP address space of egress router, respectively. Protection PLR reroutes service packets to protector via bypass tunnel, with service label intact. Protector forwards service packets to ultimate destinations, by using the label table and IP forwarding table indicated by bypass tunnel.

Diagram PE0 P1 PE1 PLR CE2 CE1 P2 PE2/protector transport tunnel bypass tunnel service packets Learns service label 3000 from PE1. Sets up tunnel to CID 5.1.1.1. Maps service to tunnel. Tunnel label Next-hop 100 primary - pop, to PE1 protection - swap to 200, to P2 protected egress {PE1, PE2} CID = 5.1.1.1 virtual egress router PE0 P1 PLR PE1 CE1 CE2 P2 PE2/protector Bypass label (Context label) Next-hop 500 pop, PE1_mpls_table PE1_mpls_table Assigns context label 500 to CID 5.1.1.1. Learns service label 3000 from PE1. Service-label Next-hop 3000 pop, to CE2

Building Blocks Protected egress {E, P} , where E = egress router, P = protector. Serves as a virtual egress node for both MPLS tunnel and services. Key strategy to include protector in the schema. Context ID (CID, aka. proxy ID) A unique IP address representing a protected egress {E, P}. Reachable via both E and P in routing and TE domains. Context label switching and IP forwording on P P assigns an unreserved label (i.e. context label) to CID, to indicate label table and IP forwarding table corresponding to E’s label space and IP address space, respectively. P populates the label table with service labels learned from E. P uses the context label as in-label for bypass tunnel. P forwards services packets received on bypass tunnel to ultimate destinations, based on the above tables.

Protection Establishment CID is advertised by IGP and IGP-TE. E tags service label advertisements with CID. Ingress router establishes transport tunnel to E, by using CID as destination. It then maps services to the tunnel. PLR establishes bypass tunnel to P, by using CID as destination and avoiding E. Protector assigns a context label to CID, and points the label to label table and IP forwarding table corresponding to E’s label space and IP address space, respectively. P uses the context label as in-label for bypass tunnel. E distributes service labels to P All the service labels which E has advertised to ingress router(s), tagged with CID. P installs the service labels in the label table corresponding to E. Next-hops are based on P’s own connectivity to service destinations.

Next Steps Seek comments and feedbacks. Seek WG adoption.