Jan 13, 2006Lahore University of Management Sciences1 Protection Routing in an MPLS Network using Bandwidth Sharing with Primary Paths Zartash Afzal Uzmi.

Slides:



Advertisements
Similar presentations
QoS Strategy in DiffServ aware MPLS environment Teerapat Sanguankotchakorn, D.Eng. Telecommunications Program, School of Advanced Technologies Asian Institute.
Advertisements

APNOMS03 1 A Resilient Path Management for BGP/MPLS VPN Jong T. Park School of Electrical Eng. And Computer Science Kyungpook National University
Generalized Multiprotocol Label Switching: An Overview of Signaling Enhancements and Recovery Techniques IEEE Communications Magazine July 2001.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—8-1 MPLS TE Overview Understanding MPLS TE Components.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—8-1 MPLS TE Overview Introducing the TE Concept.
REAL-TIME COMMUNICATION ANALYSIS FOR NOCS WITH WORMHOLE SWITCHING Presented by Sina Gholamian, 1 09/11/2011.
Designing a New Routing Simulator for DiffServ MPLS Networks Peng Zhang Zhansong Ma Raimo Kantola {pgzhang, zhansong,
Dynamic routing – QoS routing Other approaches to QoS routing Traffic Engineering Practical Traffic Engineering.
A simulation study of GELS (GMPLS-controlled Ethernet Label Switching) for Ethernet over WAN Muhammad Saqib Ilyas School.
CS Summer 2003 Lecture 12 FastReRoute (FRR) - Big Picture.
Ashish Gupta Under Guidance of Prof. B.N. Jain Department of Computer Science and Engineering Advanced Networking Laboratory.
Jan 29, 2006Lahore University of Management Sciences1 Seamless Detection of Link and Node Failures for Local Protection in MPLS Zartash Afzal Uzmi Computer.
Dynamic Routing and Wavelength Assignment Scheme for Protection against Node Failure Ying Wang1, Tee Hiang Cheng1,2 and Biswanath Mukherjee3 1School of.
Protection in OBS Zartash Afzal Uzmi. Jan 13, 2006Lahore University of Management Sciences2 First slide… This is not a tutorial! This is a discussion.
Introduction to MPLS and Traffic Engineering Zartash Afzal Uzmi.
October 8, 2004MPLS: TE and Restoration1 MPLS: Traffic Engineering and Restoration Routing Basics Zartash Afzal Uzmi Computer Science and Engineering Department.
Inter-Domain Path Computation in MPLS Authors: Faisal Aslam, Zartash Afzal Uzmi, Adrian Farrel, and Michal Pioro Zartash Afzal Uzmi Department of Computer.
Restoration Routing in MPLS Networks Zartash Afzal Uzmi Computer Science and Engineering Lahore University of Management Sciences.
Traffic Engineering Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm.
Multiple constraints QoS Routing Given: - a (real time) connection request with specified QoS requirements (e.g., Bdw, Delay, Jitter, packet loss, path.
Path Protection in MPLS Networks Ashish Gupta Design and Evaluation of Fault Tolerance Algorithms with Performance Constraints.
December 20, 2004MPLS: TE and Restoration1 MPLS: Traffic Engineering and Restoration Routing Zartash Afzal Uzmi Computer Science and Engineering Lahore.
MPLS H/W update Brief description of the lab What it is? Why do we need it? Mechanisms and Protocols.
MPLS Protection Routing: A Tutorial Zartash Afzal Uzmi.
MPLS and Traffic Engineering
Restoration Routing in MPLS Networks Zartash Afzal Uzmi Computer Science and Engineering Lahore University of Management Sciences.
Decentralized resource management for a distributed continuous media server Cyrus Shahabi and Farnoush Banaei-Kashani IEEE Transactions on Parallel and.
MPLS Local Restoration using Optimized Aggregate Information Zartash Afzal Uzmi Computer Science and Engineering Lahore University of Management Sciences.
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
Introduction to MPLS and Traffic Engineering
Path Protection in MPLS Networks Using Segment Based Approach.
RATES: A Server for MPLS Traffic Engineering (Routing And Traffic Engineering Server) Zlatokrilov Haim Advanced Topics in IP Networks5/1/2001 Tel-Aviv.
Introduction to MPLS and Traffic Engineering Zartash Afzal Uzmi.
1 Maximizing Restorable Throughput in MPLS Networks Reuven Cohen Dept. of Computer Science, Technion Gabi Nakibly National EW Research Center Published.
Efficient agent-based selection of DiffServ SLAs over MPLS networks Thanasis G. Papaioannou a,b, Stelios Sartzetakis a, and George D. Stamoulis a,b presented.
A Scheduling-based Routing Network Architecture Omar Y. Tahboub & Javed I. Khan Multimedia & Communication Networks Research Lab (MediaNet) Kent State.
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
S. Suri, M, Waldvogel, P. Warkhede CS University of Washington Profile-Based Routing: A New Framework for MPLS Traffic Engineering.
Ashish Gupta (98130) Ashish Gupta (98131) Under guidance of Prof. B. N. Jain.
QoS-Aware Path Protection in MPLS Networks Ashish Gupta Ashish Gupta Bijendra Jain Indian Institute of Technology Delhi Satish Tripathi University of California.
SMUCSE 8344 Constraint-Based Routing in MPLS. SMUCSE 8344 Constraint Based Routing (CBR) What is CBR –Each link a collection of attributes (performance,
MATE: MPLS Adaptive Traffic Engineering Anwar Elwalid, et. al. IEEE INFOCOM 2001.
Mobile IP Performance Issues in Practice. Introduction What is Mobile IP? –Mobile IP is a technology that allows a "mobile node" (MN) to change its point.
1 Multi Protocol Label Switching Presented by: Petros Ioannou Dept. of Electrical and Computer Engineering, UCY.
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
Introduction to MPLS and Traffic Engineering Zartash Afzal Uzmi.
Integrated Dynamic IP and Wavelength Routing in IP over WDM Networks Murali Kodialam and T. V. Lakshman Bell Laboratories Lucent Technologies IEEE INFOCOM.
Helsinki 19 May 2006 Fine Protection of Data-Paths in Multi-Layer Networks Based on the GMPLS paradigm G.Oriolo, Università Tor Vergata, Roma joint work.
MPLS and Traffic Engineering Ji-Hoon Yun Computer Communications and Switching Systems Lab.
Network Survivability Against Region Failure Signal Processing, Communications and Computing (ICSPCC), 2011 IEEE International Conference on Ran Li, Xiaoliang.
Protection and Restoration Definitions A major application for MPLS.
A Snapshot on MPLS Reliability Features Ping Pan March, 2002.
Research Unit in Networking - University of Liège A Distributed Algorithm for Weighted Max-Min Fairness in MPLS Networks Fabian Skivée
June 4, 2003Carleton University & EIONGMPLS - 1 GMPLS Generalized Multiprotocol Label Switching Vijay Mahendran Sumita Ponnuchamy Christy Gnanapragasam.
Supporting DiffServ with Per-Class Traffic Engineering in MPLS.
(Slide set by Norvald Stol/Steinar Bjørnstad
1 An Arc-Path Model for OSPF Weight Setting Problem Dr.Jeffery Kennington Anusha Madhavan.
Introducing a New Concept in Networking Fluid Networking S. Wood Nov Copyright 2006 Modern Systems Research.
Use Cases for High Bandwidth Query and Control of Core Networks Greg Bernstein, Grotto Networking Young Lee, Huawei draft-bernstein-alto-large-bandwidth-cases-00.txt.
ReSerVation Protocol (RSVP) Presented by Sundar P Subramani UMBC.
MATE: MPLS Adaptive Traffic Engineering Anwar Elwalid Cheng Jin Steven Low Indra Widjaja Bell Labs Michigan altech Fujitsu 2006.
A Snapshot on MPLS Reliability Features Ping Pan March, 2002.
1 Protection in SONET Path layer protection scheme: operate on individual connections Line layer protection scheme: operate on the entire set of connections.
1 Revision to DOE proposal Resource Optimization in Hybrid Core Networks with 100G Links Original submission: April 30, 2009 Date: May 4, 2009 PI: Malathi.
Inter domain signaling protocol
Traffic Engineering with AIMD in MPLS Networks
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
Label Switched VPNs – Scalability and Performance Analysis
Achieving Resilient Routing in the Internet
Towards Predictable Datacenter Networks
Presentation transcript:

Jan 13, 2006Lahore University of Management Sciences1 Protection Routing in an MPLS Network using Bandwidth Sharing with Primary Paths Zartash Afzal Uzmi Computer Science and Engineering Lahore University of Management Sciences (LUMS) Visiting Professor – Chonbuk National University

Jan 13, 2006Lahore University of Management Sciences2 Outline Background Network Services and QoS Requirements Protection Routing in MPLS Backup Bandwidth Sharing Sharing with Primary Paths NPP++ Protection Routing Framework Routing Overhead Path Computation Path Signaling Simulation Results Evaluation and Experimentation Simulation Parameters Comparative Results

Jan 13, 2006Lahore University of Management Sciences3 Outline Background Network Services and QoS Requirements Protection Routing in MPLS Backup Bandwidth Sharing Sharing with Primary Paths NPP++ Protection Routing Framework Routing Overhead Path Computation Path Signaling Simulation Results Evaluation and Experimentation Simulation Parameters Comparative Results

Jan 13, 2006Lahore University of Management Sciences4 IP versus MPLS In IP Routing, each router makes its own routing and forwarding decisions In MPLS: Only one router (source) makes the routing decision Intermediate routers make forwarding decisions A path is computed and a “virtual circuit” is established from ingress router to egress router An MPLS path or virtual circuit from source to destination is called an LSP (label switched path)

Jan 13, 2006Lahore University of Management Sciences5 QoS Requirements Bandwidth Guaranteed Primary Paths MPLS allows establishing bandwidth-guaranteed paths Bandwidth Guaranteed Backup Paths BW remains provisioned in case of network failure Minimal “Recovery Latency” Recovery latency is the time that elapses between: “the occurrence of a failure”, and “the diversion of network traffic on a new path” Preset backup paths needed for minimal latency

Jan 13, 2006Lahore University of Management Sciences6 Types of Backup Paths Primary Path Backup Path All links and all nodes are protected! AB C D E PLR: Point of Local Repair nnhop nhop LOCAL PROTECTION (showing one LSP only)

Jan 13, 2006Lahore University of Management Sciences7 Opportunity cost of backup paths Protection requires that backup paths are setup in advance Upon failure, traffic is promptly switched onto preset backup paths Bandwidth must be reserved for all backup paths This results in a reduction in the number of Primary LSPs that can otherwise be placed on the network Can we reduce the amount of “backup bandwidth” but still provide guaranteed backups? YES: Try to share the bandwidth along backup paths

Jan 13, 2006Lahore University of Management Sciences8 BW Sharing in backup Paths Example: max(X, Y) BW: Y AB CD E F G LSP1 LSP2 BW: X Primary Path Backup Path X X X YY X+YX+Y Sharing is possible IF Links (A,B) and (C,D) do not simultaneously fail!

Jan 13, 2006Lahore University of Management Sciences9 Sharing with Primary Paths Can we do any sharing with primary paths? Normally, the answer is NO because… Traffic is always flowing on the primary paths BUT… Backup paths protecting a node N may share bandwidth with primary paths that originate or terminate at node N because… Such backup will be active when: node N fails, and in that condition… No primary originates or terminates at node N Sharing with (some) primary paths is possible

Jan 13, 2006Lahore University of Management Sciences10 Outline Background Network Services and QoS Requirements Protection Routing in MPLS Backup Bandwidth Sharing Sharing with Primary Paths NPP++ Protection Routing Framework Routing Overhead Path Computation Path Signaling Simulation Results Evaluation and Experimentation Simulation Parameters Comparative Results

Jan 13, 2006Lahore University of Management Sciences11 Protection Routing Framework Tasks related to backup paths in a protection routing framework: Backup path computation Backup path signaling Objectives of protection routing framework Incur scalable routing overhead Find optimal backup paths Maximize bandwidth sharing NPP++ framework achieves all of above

Jan 13, 2006Lahore University of Management Sciences12 1.Scalable routing overhead Aggregate Information Scenario (AIS) F ij : Bandwidth reserved on link (i, j) for all primary LSPs G ij : Bandwidth reserved on link (i, j) for all backup LSPs R ij : Bandwidth remaining on link (i, j) Extended NPP (NPP++) relies on AIS Low routing overhead More Information propagated  More potential for BW sharing

Jan 13, 2006Lahore University of Management Sciences13 2.Optimal backup paths Backup path computation is moved to a node that has maximal information about the activation set of protected element Node that computes backup paths maintains two local maps: BFTLIM How much backup bandwidth will fall on a given link (u,v) if this element fails PFTLIM How much primary bandwidth will be available on a given link (u,v) if this element fails FTLIMs keep historical information about bandwidth reserved for protecting an element Leads to the computation of backup paths that are optimal

Jan 13, 2006Lahore University of Management Sciences14 Path Computation in NPP++ R1R1 R2R2 R3R3 R4R4 R5R5 The backup paths protecting against the failure of R2 cannot share bandwidth on any link. R2 Contains: a) BFTLIM a) BFTLIM b) PFTLIM b) PFTLIM Path computation is shifted to R2 because… Only R2 has full knowledge of its own Activation set But such backup paths may share bandwidth with primary paths originating or terminating at R2.

Jan 13, 2006Lahore University of Management Sciences15 3.Maximum Bandwidth Sharing Optimal path is signaled with requirements for FULL bandwidth All nodes (along the backup path) maintain two local data structures: BLTFIM How much backup bandwidth will fall on this link if a given element fails PLTFIM How much primary bandwidth will be released on this link if a given element fails LTFIMs help nodes reserve only what is needed Leading to maximum sharing along backup paths

Jan 13, 2006Lahore University of Management Sciences16 NPP++ Summary Primary Path Backup Path R1R1 R2R2 R3R3 R4R4 (2) Path computation is shifted to special nodes (3) Nodes in primary path maintain “local data structures” called BFTLIM/PFTLIM (4) Nodes in backup paths maintain “local data structures” called BLTFIM/PLTFIM (1) Advertise aggregate link usage information only Results: Path computation is optimalPath computation is optimal Bandwidth sharing on backup paths is maximum.Bandwidth sharing on backup paths is maximum. Advertisement overhead is minimumAdvertisement overhead is minimum FTLIMs LTFIMs FTLIMs FTLIMs LTFIMs LTFIMs Protecting R2

Jan 13, 2006Lahore University of Management Sciences17 Outline Background Network Services and QoS Requirements Protection Routing in MPLS Backup Bandwidth Sharing Sharing with Primary Paths NPP++ Protection Routing Framework Routing Overhead Path Computation Path Signaling Simulation Results Evaluation and Experimentation Simulation Parameters Comparative Results

Jan 13, 2006Lahore University of Management Sciences18 Evaluation & Experimentation Traffic generation Used existing traffic models Rejected requests experiments Generate a set of LSP requests Measure the number of rejected requests Simulate on various topologies Scalability of local state information How do the average number of entries in locally stored maps grow with the number of requests

Jan 13, 2006Lahore University of Management Sciences19 Simulation Parameters Simulations performed on two networks Network 1: 15-node heterogeneous topology Core links with capacity 480 units, other links 120 units Network 2: 20-node homogenous topology (metros in the U.S.) Each link with capacity 120 units LSP requests arrive one-by-one Ingress/Egress pairs chosen randomly Bandwidth demand for each request is uniformly distributed between 1 and experiments with different traffic matrices

Jan 13, 2006Lahore University of Management Sciences20 Comparative Results: Network 1

Jan 13, 2006Lahore University of Management Sciences21 Comparative Results: Network 2

Jan 13, 2006Lahore University of Management Sciences22 Local Storage: Network 1

Jan 13, 2006Lahore University of Management Sciences23 Local Storage: Network 2

Jan 13, 2006Lahore University of Management Sciences24 Conclusions: NPP++ Optimal path computation Maximum sharing along computed path Scalable routing overhead Practically feasible 15% – 40% improvement over existing protection schemes

Jan 13, 2006Lahore University of Management Sciences25 Last slide… Thank you! Questions?