MPLS Local Restoration using Optimized Aggregate Information Zartash Afzal Uzmi Computer Science and Engineering Lahore University of Management Sciences.

Slides:



Advertisements
Similar presentations
QoS Strategy in DiffServ aware MPLS environment Teerapat Sanguankotchakorn, D.Eng. Telecommunications Program, School of Advanced Technologies Asian Institute.
Advertisements

Object-Oriented Design and Implementation of Fault Management Function for MPLS network Sung-Jin Lim, Ryung-Min Kim, and Young-Tak Kim Advanced Networking.
Generalized Multiprotocol Label Switching: An Overview of Signaling Enhancements and Recovery Techniques IEEE Communications Magazine July 2001.
1 Extensions to Resource Reservation Protocol For Fast Reroute of Traffic Engineering GMPLS LSPs draft-tsaad-ccamp-rsvpte-bidir-lsp-fastreroute-05 Author.
Protection and Restoration in Optical Network
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—8-1 MPLS TE Overview Understanding MPLS TE Components.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—8-1 MPLS TE Overview Introducing the TE Concept.
Refresh Interval Independent facility FRR draft-chandra-mpls-enhanced-frr-bypass-01 Chandrasekar Ramachandran Markus.
1 Traffic Engineering (TE). 2 Network Congestion Causes of congestion –Lack of network resources –Uneven distribution of traffic caused by current dynamic.
ElasticTree: Saving Energy in Data Center Networks Brandon Heller, Srini Seetharaman, Priya Mahadevan, Yiannis Yiakoumis, Puneed Sharma, Sujata Banerjee,
A simulation study of GELS (GMPLS-controlled Ethernet Label Switching) for Ethernet over WAN Muhammad Saqib Ilyas School.
CS Summer 2003 Lecture 12 FastReRoute (FRR) - Big Picture.
Ashish Gupta Under Guidance of Prof. B.N. Jain Department of Computer Science and Engineering Advanced Networking Laboratory.
Jan 29, 2006Lahore University of Management Sciences1 Seamless Detection of Link and Node Failures for Local Protection in MPLS Zartash Afzal Uzmi Computer.
Dynamic Routing and Wavelength Assignment Scheme for Protection against Node Failure Ying Wang1, Tee Hiang Cheng1,2 and Biswanath Mukherjee3 1School of.
Protection in OBS Zartash Afzal Uzmi. Jan 13, 2006Lahore University of Management Sciences2 First slide… This is not a tutorial! This is a discussion.
Jan 13, 2006Lahore University of Management Sciences1 Protection Routing in an MPLS Network using Bandwidth Sharing with Primary Paths Zartash Afzal Uzmi.
Introduction to MPLS and Traffic Engineering Zartash Afzal Uzmi.
October 8, 2004MPLS: TE and Restoration1 MPLS: Traffic Engineering and Restoration Routing Basics Zartash Afzal Uzmi Computer Science and Engineering Department.
Inter-Domain Path Computation in MPLS Authors: Faisal Aslam, Zartash Afzal Uzmi, Adrian Farrel, and Michal Pioro Zartash Afzal Uzmi Department of Computer.
Restoration Routing in MPLS Networks Zartash Afzal Uzmi Computer Science and Engineering Lahore University of Management Sciences.
Traffic Engineering Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm.
Path Protection in MPLS Networks Ashish Gupta Design and Evaluation of Fault Tolerance Algorithms with Performance Constraints.
December 20, 2004MPLS: TE and Restoration1 MPLS: Traffic Engineering and Restoration Routing Zartash Afzal Uzmi Computer Science and Engineering Lahore.
MPLS Protection Routing: A Tutorial Zartash Afzal Uzmi.
MPLS and Traffic Engineering
Siemens-LUMS Collaboration. Project on GELS Evaluation CT IT 2 (Siemens) NC Lab (LUMS)
Restoration Routing in MPLS Networks Zartash Afzal Uzmi Computer Science and Engineering Lahore University of Management Sciences.
PROFITABLE CONNECTION ASSIGNMENT IN ALL OPTICAL WDM NETWORKS VISHAL ANAND LANDER (Lab. for Advanced Network Design, Evaluation and Research) In collaboration.
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
Introduction to MPLS and Traffic Engineering
Path Protection in MPLS Networks Using Segment Based Approach.
RATES: A Server for MPLS Traffic Engineering (Routing And Traffic Engineering Server) Zlatokrilov Haim Advanced Topics in IP Networks5/1/2001 Tel-Aviv.
Introduction to MPLS and Traffic Engineering Zartash Afzal Uzmi.
1 Maximizing Restorable Throughput in MPLS Networks Reuven Cohen Dept. of Computer Science, Technion Gabi Nakibly National EW Research Center Published.
Comparison of MSTP and (G)ELS Benchmarking Carrier Ethernet Technologies Workshop Session AI.1: Scientific and Technical Results Krakow, Poland April 30,
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
QoS-Aware Path Protection in MPLS Networks Ashish Gupta Ashish Gupta Bijendra Jain Indian Institute of Technology Delhi Satish Tripathi University of California.
Control and Traffic Management Paper: Banerjee et al.: ” Generalized multiprotocol label switching: an overview of signaling enhancements and recovery.
SMUCSE 8344 Constraint-Based Routing in MPLS. SMUCSE 8344 Constraint Based Routing (CBR) What is CBR –Each link a collection of attributes (performance,
Introduction to MPLS and Traffic Engineering Zartash Afzal Uzmi.
Integrated Dynamic IP and Wavelength Routing in IP over WDM Networks Murali Kodialam and T. V. Lakshman Bell Laboratories Lucent Technologies IEEE INFOCOM.
Helsinki 19 May 2006 Fine Protection of Data-Paths in Multi-Layer Networks Based on the GMPLS paradigm G.Oriolo, Università Tor Vergata, Roma joint work.
MPLS and Traffic Engineering Ji-Hoon Yun Computer Communications and Switching Systems Lab.
Budapest University of Technology and Economics Department of Telecommunications and Media Informatics Optimized QoS Protection of Ethernet Trees Tibor.
Network Survivability Against Region Failure Signal Processing, Communications and Computing (ICSPCC), 2011 IEEE International Conference on Ran Li, Xiaoliang.
Protection and Restoration Definitions A major application for MPLS.
CSC Survivability Anuj Dewangan Parinda Gandhi.
Enhanced Protection using Shared Segment Backups in a Multiservice GMPLS-based Networks Anna Urra, Eusebi Calle, Jose L Marzo Institute of Informatics.
QoS Routing ISDL Quality of Service Routing Algorithms for Bandwidth-Delay Constrained Applications Yi Yang, Jogesh Muppala et al.
Survivable Traffic Grooming with Differentiated End-to-End Availability Guarantees in WDM Mesh Networks Proceedings of the 13th IEEE Workshop on Local.
10/6/2003Kevin Su Traffic Grooming for Survivable WDM Networks – Shared Protection Kevin Su University of Texas at San Antonio.
Supporting DiffServ with Per-Class Traffic Engineering in MPLS.
(Slide set by Norvald Stol/Steinar Bjørnstad
Introducing a New Concept in Networking Fluid Networking S. Wood Nov Copyright 2006 Modern Systems Research.
Inter-area MPLS TE Architecture and Protocol Extensions
Use Cases for High Bandwidth Query and Control of Core Networks Greg Bernstein, Grotto Networking Young Lee, Huawei draft-bernstein-alto-large-bandwidth-cases-00.txt.
Hongkun Li, Yu Cheng, Chi Zhou Illinois Institute of Technology, Chicago, IL, USA IEEE GLOBECOM 2008.
Applicability of PCE for Computing Protection Paths draft-chen-pce-protection-applicability Huaimo Chen, Huawei.
Refresh Interval Independent facility FRR draft-chandra-mpls-enhanced-frr-bypass-00 Chandra Ramachandran Yakov Rekhter.
66th IETF, Montreal, July 2006 PCE Working Group Meeting IETF-66, July 2006, Montreal A Backward Recursive PCE-based Computation (BRPC) procedure to compute.
1 Protection in SONET Path layer protection scheme: operate on individual connections Line layer protection scheme: operate on the entire set of connections.
Draft-deoliveira-diff-te-preemption-02.txt J. C. de Oliveira, JP Vasseur, L. Chen, C. Scoglio Updates: –Co-author: JP Vasseur –New preemption criterion.
Performance Analysis of Inter-Domain Path Computation Methodologies draft-dasgupta-ccamp-path-comp-analysis-00.txt Sukrit Dasgupta, Jaudelice C. de Oliveira.
82 nd Taipei Protection Mechanisms for LDP P2MP/MP2MP LSP draft-zhao-mpls-mldp-protections-00.txt Quintin Zhao, Emily Chen, Huawei.
RSVP Setup Protection draft-shen-mpls-rsvp-setup-protection-03
Traffic Engineering with AIMD in MPLS Networks
Network Survivability
LSP Fast-Reroute Using RSVP Detours
Label Switched VPNs – Scalability and Performance Analysis
Presentation transcript:

MPLS Local Restoration using Optimized Aggregate Information Zartash Afzal Uzmi Computer Science and Engineering Lahore University of Management Sciences

May 18, 2005Lahore University of Management Sciences2 Outline Introduction QoS Requirements Local Restoration: Types of Backup Paths Local Restoration: Fault Models Backup Bandwidth Sharing Activation sets The new model for bandwidth sharing Optimized aggregate information scenario (oAIS) Experiments, simulations, and results

May 18, 2005Lahore University of Management Sciences3 QoS Requirements Bandwidth Guaranteed Primary Paths Bandwidth Guaranteed Backup Paths BW remains provisioned in case of network failure Minimal “Restoration Latency” Restoration latency is the time that elapses between the occurrence of a failure and the diversion of network traffic on a new path Path Restoration  More Latency Local Restoration  Less Latency

May 18, 2005Lahore University of Management Sciences4 Types of Backup Paths A next hop (nhop) path that spans a link (i, j) is a backup path which: originates at node i, and provides restoration for a primary LSP that traverses (i, j), if (i, j) fails. i j PLR: Point of Local Repair nhop path that spans (i, j)

May 18, 2005Lahore University of Management Sciences5 Types of Backup Paths A next next hop (nnhop) path that spans a link (i, j) is a backup path which: originates at node i, and provides restoration for a primary LSP that traverses (i, j), if either (i, j) or node j fails. i j PLR: Point of Local Repair nnhop path that spans (i, j)

May 18, 2005Lahore University of Management Sciences6 Local Restoration: Fault Models ABCD Link Protection ABCD ABCD Node Protection Element Protection

May 18, 2005Lahore University of Management Sciences7 nhop and nnhop paths Primary Path Backup Path All links and all nodes are protected! AB C D E PLR: Point of Local Repair nnhop nhop

May 18, 2005Lahore University of Management Sciences8 Opportunity cost of backup paths Local Protection requires that backup paths are setup in advance Upon failure, traffic is promptly switched onto preset backup paths Bandwidth must be reserved for all backup paths This results in a reduction in the number of Primary LSPs that can otherwise be placed on the network Can we reduce the amount of “backup bandwidth” but still provide guaranteed backups?

May 18, 2005Lahore University of Management Sciences9 BW Sharing in backup Paths Example: max(X, Y) BW: Y AB CD E F G L1 L2 BW: X Primary Path Backup Path X X X YY X+YX+YSharing

May 18, 2005Lahore University of Management Sciences10 Activation Sets A B C D E Activation set for node BActivation set for link (A,B) A B C D E

May 18, 2005Lahore University of Management Sciences11 Extent of BW Sharing: oAIS Aggregate Information Scenario (AIS) F ij : Bandwidth reserved on link (i, j) for all primary LSPs G ij : Bandwidth reserved on link (i, j) for all backup LSPs Optimized AIS (oAIS) – (H ij instead of F ij ) Hij : Maximum bandwidth reserved on any one link by all backup paths spanning link (i, j) More Information propagated  More potential for BW sharing

May 18, 2005Lahore University of Management Sciences12 oAIS versus AIS: Example LSP Request-1 (src, dst, bw) = (A, C, 4) A F D E BC G F AB =4 H AB =4 G AF =4

May 18, 2005Lahore University of Management Sciences13 oAIS Example LSP Request-2 (src, dst, bw) = (A, C, 5) A F D E BC G F AB =9 H AB =5 G AF =4 G AG =5 F AB =4 H AB =4

May 18, 2005Lahore University of Management Sciences14 oAIS Example LSP Request-3 (src, dst, bw) = (D, E, 7) A F D E BC G F AB =9 H AB =5 G AF =4 G AG =5 F DE =7 G AF =7

May 18, 2005Lahore University of Management Sciences15 oAIS Example LSP Request-4 (src, dst, bw) = (A, C, 6) A F D E BC G F AB =9 H AB =5 G AF =7 G AG =5 F DE =7 Need to Evaluate cost of all possible backup paths? How much BW is shareable on (A, F)? AIS: Shareable = max(0, G AF - F AB ) = G AF - min(G AF, F AB ) = 0 Additional resv = 6 oAIS: (H AB ≤ F AB ) Shareable = G AF - min(G AF, H AB ) = 2 Additional resv = = 4 CIS: (link (A,B) knows BW red ) Shareable = G AF - BW red = = 3 Additional resv = = 3

May 18, 2005Lahore University of Management Sciences16 Bandwidth Sharing Model Previous: A ij := Set of all primaries traversing through (i, j) B ij := Set of all backups traversing through (u, v) Our definition (for link protection case): A ij := Set of all primaries traversing through (i, j) B ij := Set of all nhop paths traversing through (u, v) µ ij := Set of all nhop paths that span (i, j)  ij uv := B uv ∩ µ ij

May 18, 2005Lahore University of Management Sciences17 Bandwidth Sharing Model i uv j k RED=7 BLU=2 3 OLD MODEL: A ij = {R, B} B uv = {R, B, …} A ij ∩ B uv = {R, B} || A ij ∩ B uv || = 2+7 = 9 Un-shareable = 9 Shareable = = 1 GRN=3 (New Request) Guv = 10 NEW MODEL: A ij = {R, B} B uv = {nh ij r, nh ij b, …}(nhops through (u, v)) µ ij = {nh ij r, nh ij b, …}(nhops spanning (i, j))  ij uv = µ ij ∩ B uv = {nh ij r } ||  ij uv || = = 9(Un-shareable) Shareable = G uv - ||  ij uv || = = 1

May 18, 2005Lahore University of Management Sciences18 Bandwidth Sharing Model i uv j k RED=7 BLU=2 3 OLD MODEL: A ij = {R, B} B uv = {R, B, …} A ij ∩ B uv = {R, B} || A ij ∩ B uv || = 2+7 = 9 Un-shareable = 9 Shareable = = 1 NEW MODEL: A ij = {R, B} B uv = {nh ij r, nh jk b, …}(nhops through (u, v)) µ ij = {nh ij r, nh ij b, …}(nhops spanning (i, j))  ij uv = µ ij ∩ B uv = {nh ij r } ||  ij uv || = 7(Un-shareable) Shareable = G uv - ||  ij uv || = = 3 GRN=3 (New Request) Guv = 10

May 18, 2005Lahore University of Management Sciences19 Simulation Experiments Rejected Requests Experiments Simulated on two topologies Measure the number of rejected LSPs for each information scenario Network Loading Experiments Simulated on two topologies Link capacities set to infinity Measure the total bandwidth required to service a given set of LSPs for each information scenario

May 18, 2005Lahore University of Management Sciences20 Single Link Protection: Network 1

May 18, 2005Lahore University of Management Sciences21 Single Link Protection: Network 1

May 18, 2005Lahore University of Management Sciences22 Single Link Protection: Network 2

May 18, 2005Lahore University of Management Sciences23 Single Link Protection: Network 2

May 18, 2005Lahore University of Management Sciences24 Single Node Protection: Network 1

May 18, 2005Lahore University of Management Sciences25 Single Element Protection: Network 1

May 18, 2005Lahore University of Management Sciences26 Questions & Answers

May 18, 2005Lahore University of Management Sciences27 Restoration in MPLS Primary Path Backup Path Path Protection MPLS path Protection may take 100s of ms, whereas MPLS Local protection takes less than 10 ms. AB CDE