IP Fast Reroute Using Tunnel-AT draft-xu-ipfrr-tunnelat-00 Mingwei Xu, Lingtao Pan, Qing Li Tsinghua University, China 75 th IETF Meeting, Stockholm July.

Slides:



Advertisements
Similar presentations
New Timing Distribution Mechanism TICTOC WG, IETF 71th Philadelphia, USA draft-ji-tictoc-new-timing-distribution-mechanism-00.txt Kuiwen Ji
Advertisements

COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
Page 1 / 14 The Mesh Comparison PLANET’s Layer 3 MAP products v.s. 3 rd ’s Layer 2 Mesh.
Consensus Routing: The Internet as a Distributed System John P. John, Ethan Katz-Bassett, Arvind Krishnamurthy, and Thomas Anderson Presented.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 Internet Networking Spring 2006 Tutorial 7 DVMRP.
TDC365 Spring 2001John Kristoff - DePaul University1 Interconnection Technologies Routing I.
December 20, 2004MPLS: TE and Restoration1 MPLS: Traffic Engineering and Restoration Routing Zartash Afzal Uzmi Computer Science and Engineering Lahore.
Slide Set 15: IP Multicast. In this set What is multicasting ? Issues related to IP Multicast Section 4.4.
Internet Networking Spring 2002
1 Computer Networks Routing Algorithms. 2 IP Packet Delivery Two Processes are required to accomplish IP packet delivery: –Routing discovering and selecting.
Delivery, Forwarding, and Routing
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—4-1 LAN Connections Exploring the Functions of Routing.
Russ White IP Fast reroute Russ White
Routing and Routing Protocols Dynamic Routing Overview.
Lecture Week 10 Link-State Routing Protocols. Objectives Describe the basic features & concepts of link-state routing protocols. List the benefits and.
Multicast Routing Protocols NETE0514 Presented by Dr.Apichan Kanjanavapastit.
Review: routing algorithms. –Choose the appropriate paths. –Routing algorithms Flooding Shortest path routing (example). –Dijkstra algorithm. –Bellman-Ford.
 Network Segments  NICs  Repeaters  Hubs  Bridges  Switches  Routers and Brouters  Gateways 2.
10/8/2015CST Computer Networks1 IP Routing CST 415.
CS 5565 Network Architecture and Protocols Godmar Back Lecture 22.
Multicast Routing Algorithms n Multicast routing n Flooding and Spanning Tree n Forward Shortest Path algorithm n Reversed Path Forwarding (RPF) algorithms.
Network and Communications Ju Wang Chapter 5 Routing Algorithm Adopted from Choi’s notes Virginia Commonwealth University.
1 Module 4: Implementing OSPF. 2 Lessons OSPF OSPF Areas and Hierarchical Routing OSPF Operation OSPF Routing Tables Designing an OSPF Network.
Protection and Restoration Definitions A major application for MPLS.
Evaluation of the XL Routing Algorithm in Multiple Failure Conditions Nguyen Cao Julie Morris Khang Pham.
1 IETF- 56 – TE WG- SAN FRANCISCO Inter-AS MPLS Traffic Engineering draft-vasseur-inter-AS-TE-00.txt Jean-Philippe Vasseur – Cisco Systems Raymond Zhang.
IP fast reroute s olutions and challenges Amund Kvalbein.
Cisco Systems Networking Academy S2 C 11 Routing Basics.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #7 DVMRP.
Networking and internetworking devices. Repeater.
Routing Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009 Asia Pacific Institute of Information.
Fast recovery in IP networks using Multiple Routing Configurations Amund Kvalbein Simula Research Laboratory.
Interior Gateway Protocols (RIP, OSPF) continued….
On Improving the Efficiency and Manageability of NotVia Ang Li †, Pierre Francois ‡, and Xiaowei Yang † † UCIrvine ‡ Université catholique de Louvain CoNext.
1 An Arc-Path Model for OSPF Weight Setting Problem Dr.Jeffery Kennington Anusha Madhavan.
Routing protocols. 1.Introduction A routing protocol is the communication used between routers. A routing protocol allows routers to share information.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Link-State Routing Protocols Routing Protocols and Concepts – Chapter 10.
Spring Routing: Part I Section 4.2 Outline Algorithms Scalability.
82 nd Taipei Protection Mechanisms for LDP P2MP/MP2MP LSP draft-zhao-mpls-mldp-protections-00.txt Quintin Zhao, Emily Chen, Huawei.
Routing Semester 2, Chapter 11. Routing Routing Basics Distance Vector Routing Link-State Routing Comparisons of Routing Protocols.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
CSE 421 Computer Networks. Network Layer 4-2 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside.
Network Layer COMPUTER NETWORKS Networking Standards (Network LAYER)
Advanced Computer Networks
Instructor Materials Chapter 5: Dynamic Routing
Richard Ogier Presented by Tom Henderson July 28, 2011
draft-liu-pim-single-stream-multicast-frr-01
Shortest Path from G to C Using Dijkstra’s Algorithm
Routing Protocols and Concepts
Link-State Routing Protocols
IP Multicast Fast Reroute follow-up on draft-dimitri-rtgwg-mfrr-framework-00 RTG Working Group IETF 75 meeting Stockholm (Sweden) July 2009.
FAR: A Fault-avoidance Routing Method for Data Center Networks with Regular Topology Please send.
Loop protection and IPFRR
THE NETWORK LAYER.
CS 457 – Lecture 12 Routing Spring 2012.
Intra-Domain Routing Jacob Strauss September 14, 2006.
Chapter 5: Dynamic Routing
ECE 544 Protocol Design Project 2016
A Unified Approach to IP Segment Routing
Link-State Routing Protocols
Link-State Routing Protocols
Dynamic Routing Protocols part3 B
COMPUTER NETWORKS CS610 Lecture-16 Hammad Khalid Khan.
DSDV Destination-Sequenced Distance-Vector Routing Protocol
Achieving Resilient Routing in the Internet
Optional Read Slides: Network Multicast
draft-liu-pim-mofrr-tilfa-00
IPFRR WITH FAST NOTIFICATION
OSPF Protocol.
Presentation transcript:

IP Fast Reroute Using Tunnel-AT draft-xu-ipfrr-tunnelat-00 Mingwei Xu, Lingtao Pan, Qing Li Tsinghua University, China 75 th IETF Meeting, Stockholm July 2009

Background What is IPFRR  When a link or node failure occurs in an IP network, there is a period of disruption to the delivery of traffic until the network re-converges on a new topology.  IP fast reroute (IPFRR) mechanisms are methods used in pure IP networks to provide protection from such disruptions.

Background – Main stream mechanisms LFA: (in RFC 5286).  Send packet to an alternate neighbor.  Simple, but can not provide 100% protection coverage.

Background – Main stream mechanisms NotVia: (in ietf-rtgwg-ipfrr-notvia-addresses)  100% single node protection coverage  But, has to maintain extra NotVia addresses, high management burden  Has to reroute packet to next next hop, unnecessary back tracing (see example below)

Background – Main stream mechanisms Tunnel: (in ietf-bryant-ipfrr-tunnels)  Repairing source node S chooses a tunnel end node T that can forward packets to destination D bypassing failed neighbor F.  But The original draft does not describe an efficient algorithm to find tunnel end points. Failed to provide 100% single node failure protection

Background – More on Tunnel Why tunnel can’t provide 100% single node failure protection coverage.  Node n can’t be used as tunnel end point for s to reach h since the cost of link n-h is high. Directed forwarding can be used to solve it. (Tell n to forward packet to h directly)  But even with directly forwarding, node i can’t be reached by s

Background -- Reprotection But actually s can send packets with destination i to n, and telling n to directly forward them to h. Since h also notices the failure of f, it will reroute packets to i. We call this reprotection.

Tunnel-AT Our mechanism Tunnel-AT is an improved Tunnel.  By exploring reprotection, we achieve 100% protection for single node failure on a bi- connected topology.  Inspired by iSPF, we propose an efficient algorithm to find tunnel end points.  The length of the backup paths computed under Tunnel-AT are always exactly or very close to the length of the shortest working path to the destination.

Our Muse -- iSPF The iSPF works by reattach subtrees back:

Some definitions Detaching trees: Subtrees of the original shortest path tree of S rooted at one of F's neighbor other than S. Affected nodes: nodes of detaching trees. Attaching trees: maximal common subtrees of the original and new shortest path tree formed by affected nodes. Or the subtrees reattached in the process of iSPF.

Incoming nodes We call affected nodes whose parents are not affected nodes incoming nodes. (node 4 and 11)

Tunnel-AT algorithm Step 1: Record the corresponding incoming node of each affected nodes during the process of iSPF. Step 2: For each affected destination d, determine the mark needed to reroute packets to d’s incoming node.  Stage 1: Let P be the incoming node’s parent. Decide if we should encapsulate packets with P’s header (For example, if P is S’s neighbor, new header is not needed.)  Stage 2: Determine if Directed Forwarding is needed to ensure P send packets to the incoming node.

Complexity Analysis Based on the original shortest path tree T calculated by the normal link state routing protocol, every node has to perform k times incremental shortest path tree (iSPT) (k is the number of neighbors) to construct backup routes for all destinations. Theoretically, k * iSPT < One Full SPT

Evaluation Dataset  6 ASes from Rocketfuel topology database.  Extract bi-connected component. 100% Protection coverage:

Evaluation Almost optimal path length:

Evaluation Complexity is less than one full SPT

Thanks

Some Properties Property 1: If destination d1 is the parent of d2 in the same ATTree, d2 can be protected in the same way as d1. Property 2: If destination d1 is the parent of d2, d1 and d2 are not in the same ATTree, but they are in the same detaching tree, then d2 can be protected in the same way as d1. Property 3: If destination d1 is the parent of d2, d1 and d2 are not in the same detaching tree, then d2 can be protected in the same way as d1 if reprotection is used. In summary, a destination can be protected in the same way as its parent.