A framework for the use of SPMEs for shared mesh protection draft-allan-mpls-spme-smp-frmwk-00 Dave Allan, Greg Mirsky

Slides:



Advertisements
Similar presentations
QoS Strategy in DiffServ aware MPLS environment Teerapat Sanguankotchakorn, D.Eng. Telecommunications Program, School of Advanced Technologies Asian Institute.
Advertisements

G : DCM Signaling Mechanism Using GMPLS RSVP-TE ITU-T Workshop on IP-Optical, Chitose, Japan 7/11/2002 Dimitrios Pendarakis, Tellium, Inc. ITU-T.
MPLS: The Magic Behind the Myths Grenville Armitage (author) Scott Crosby (presenter)
Stable Load Control with Load Prediction in Multipath Packet Forwarding IlKyu Park, Youngseok Lee, and Yanghee Choi Proc. 15 th IEEE Int l conf. on Information.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—8-1 MPLS TE Overview Understanding MPLS TE Components.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—8-1 MPLS TE Overview Introducing the TE Concept.
IPv4 - The Internet Protocol Version 4
A Flexible Model for Resource Management in Virtual Private Networks Presenter: Huang, Rigao Kang, Yuefang.
Pseudowire Endpoint Fast Failure Protection draft-shen-pwe3-endpoint-fast-protection-00 Rahul Aggarwal Yimin Shen
Introducing MPLS Labels and Label Stacks
OLD DOG CONSULTING Traffic Engineering or Network Engineering? The transition to dynamic management of multi-layer networks Adrian Farrel Old Dog Consulting.
Presented by: Dmitri Perelman Nadav Chachmon. Agenda Overview MPLS evolution to GMPLS Switching issues –GMPLS label and its distribution –LSP creation.
Restoration Routing in MPLS Networks Zartash Afzal Uzmi Computer Science and Engineering Lahore University of Management Sciences.
December 20, 2004MPLS: TE and Restoration1 MPLS: Traffic Engineering and Restoration Routing Zartash Afzal Uzmi Computer Science and Engineering Lahore.
MPLS H/W update Brief description of the lab What it is? Why do we need it? Mechanisms and Protocols.
MPLS and Traffic Engineering
Restoration Routing in MPLS Networks Zartash Afzal Uzmi Computer Science and Engineering Lahore University of Management Sciences.
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
IP layer restoration and network planning based on virtual protection cycles 2000 IEEE Journal on Selected Areas in Communications Reporter: Jyun-Yong.
Path Protection in MPLS Networks Using Segment Based Approach.
Introduction to Protection & Restoration for OBS Copyright, 2000, SUNY, Univ. at Buffalo Presented by Zaoyang Guo & Dahai Xu.
draft-kompella-mpls-rmr Kireeti Kompella IETF 91
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
Ashish Gupta (98130) Ashish Gupta (98131) Under guidance of Prof. B. N. Jain.
SMUCSE 8344 Constraint-Based Routing in MPLS. SMUCSE 8344 Constraint Based Routing (CBR) What is CBR –Each link a collection of attributes (performance,
MPLS-TP OAM Framework draft-ietf-mpls-tp-oam-framework-07 editors: Dave Allan, Italo Busi, Ben Niven-Jenkins.
Implement a QoS Algorithm for Real-Time Applications in the DiffServ-aware MPLS Network Zuo-Po Huang, *Ji-Feng Chiu, Wen-Shyang Hwang and *Ce-Kuen Shieh.
1 Multi-Protocol Label Switching (MPLS) presented by: chitralekha tamrakar (B.S.E.) divya krit tamrakar (B.S.E.) Rashmi shrivastava(B.S.E.) prakriti.
Framework and Requirements for Shared Mesh Protection in MPLS-TP
1 Multi Protocol Label Switching Presented by: Petros Ioannou Dept. of Electrical and Computer Engineering, UCY.
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
Protocols and the TCP/IP Suite
Multi-Protocol Label Switching University of Southern Queensland.
MPLS and Traffic Engineering Ji-Hoon Yun Computer Communications and Switching Systems Lab.
SMUCSE 8344 Protection & Restoration of Optical Networks.
OIF NNI: The Roadmap to Non- Disruptive Control Plane Interoperability Dimitrios Pendarakis
A Snapshot on MPLS Reliability Features Ping Pan March, 2002.
Slide 1 MPLS-TP Linear Protection / Author / RTP IE Fixed CET I insert classification level © Nokia Siemens Networks MPLS-TP Linear Protection.
Packet switching network Data is divided into packets. Transfer of information as payload in data packets Packets undergo random delays & possible loss.
CSC Survivability Anuj Dewangan Parinda Gandhi.
Enhanced Protection using Shared Segment Backups in a Multiservice GMPLS-based Networks Anna Urra, Eusebi Calle, Jose L Marzo Institute of Informatics.
69th IETF Chicago July 2007 An analysis of scaling issues in MPLS-TE backbone networks Seisho Yasukawa, Adrian Farrel, and Olufemi Komolafe draft-yasukawa-mpls-scaling-analysis-04.txt.
Two-layer Restoration Scheme for IP over Optical Networks with MPLS Jia Ke, L. Mason, Q. Yang ICIS, School of EEE, Nanyang Technological University
MPLS Some notations: LSP: Label Switched Path
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Protocols and Architecture Slide 1 Use of Standard Protocols.
Supporting DiffServ with Per-Class Traffic Engineering in MPLS.
(Slide set by Norvald Stol/Steinar Bjørnstad
Data Communications and Networks Chapter 1 - Classification of network topologies Data Communications and Network.
Introducing a New Concept in Networking Fluid Networking S. Wood Nov Copyright 2006 Modern Systems Research.
Data Communication 1 Frame Relay n X.25 l Provides extensive error checking and flow control l station-to-station checking at the data link layer l Error.
1 Protection in SONET Path layer protection scheme: operate on individual connections Line layer protection scheme: operate on the entire set of connections.
2016/3/11 1 Data Link Layer. 2016/3/11 2 Two basic services of Data Link Allows the upper layers to access the media using techniques such as framing.
Pseudo-Wire Protection Ping Pan IETF 65.
MULTI-PROTOCOL LABEL SWITCHING By: By: YASHWANT.V YASHWANT.V ROLL NO:20 ROLL NO:20.
MEF Protection Work Pascal Menezes Technical Contributor June 3 rd 2003.
82 nd Taipei Protection Mechanisms for LDP P2MP/MP2MP LSP draft-zhao-mpls-mldp-protections-00.txt Quintin Zhao, Emily Chen, Huawei.
GMPLS UNI Best Current Practices draft-beeram-ccamp-gmpls-uni-bcp-00.txt V.Beeram, I.Bryskin, W.Doonan (ADVA Optical Networking) J.Drake, G.Grammel (Juniper.
MPLS Introduction How MPLS Works ?? MPLS - The Motivation MPLS Application MPLS Advantages Conclusion.
Multi-protocol Label Switching (MPLS) RFC 3031 MPLS provides new capabilities: QoS support Traffic engineering VPN Multiprotocol support.
PW MUX PWE – 71st IETF 10 March 2008 Yaakov (J) Stein.
Presenter: Jeffrey Zhang
An analysis of scaling issues in MPLS-TE backbone networks
PLR Designation in RSVP-TE FRR
CHAPTER 8 Network Management
draft-sitaraman-mpls-rsvp-shared-labels-00
MVPN/EVPN Tunnel Aggregation with Common Labels Zhaohui Zhang (Juniper) Eric Rosen (Juniper) Wen Lin (Juniper) Zhenbin Li (Huawei) BESS WG 20-March-2018.
Data Link Layer 2019/2/19.
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
SURVIVABILITY IN IP-OVER-WDM NETWORKS (2)
Pseudo-Wire Protection
Presentation transcript:

A framework for the use of SPMEs for shared mesh protection draft-allan-mpls-spme-smp-frmwk-00 Dave Allan, Greg Mirsky

Problem Numerous proposals exist to support the concept of shared mesh restoration with a concept of path preemption –So business priority can be applied to path protection when network resources are contended This is rather draconian on several fronts –The preempted service is 100% preempted, it simply stops working even if the preempting service is not consuming all of the protection resources at a given time –It requires the addition of path selectors and the coordination of same at arbitrary points in the network –Selector placement is constrained Limitations of “Preemption heuristics” explicitly limit the LSPs to being of “equal size” –Variable size pipes of different business priorities becomes an intractable logic problem

A simple example of selector based Shared mesh Two paths with a shared backup segment The selectors need to work in such a way that if both working paths fail, the service with the higher business priority gets use of the bandwidth in the shared protection segment Protected service Working Path Shared Protection Segment Protected service Working Path Head end AND all shared segment selectors ALL need reliable coordination to successfully protection switch

The issue If one can live with degradation of a service instead of preemption and notification, offering shared mesh protection can be significantly simplified –It is simply a planning exercise with no protocol changes This can be done by encoding business priority on a packet by packet basis across the shared segment –Packets with the highest business priority always get through –Packets with lower priority can scavenge unused bandwidth If we do this then: 1. no selector coordination is required, 2.no additional protocol elements are required, 3.no artificial constraints are placed on the locations of ingress to and egress from shared segments ›Shared protection resources have no topological constraints 4.No artificial constrains are placed on fixed pipe sizes

How to do this 1.Links are uniquely set aside as shared segment links ›This could be virtual links in the form of LLSPs that traffic is policed/shaped into 2.SPMEs at the ingress to a shared segment link use the pipe model of DSCP handling to impose encoding of business priority in the TC field of the SPME label – actual application encodings are simply tunneled 3.Network planning does not oversubscribe a business priority in a shared space but the sum of traffic across all business priorities does

Example Working Path High Priority Protection Path High Priority Shared mesh SPME High Priority Working Path Low Priority Protection Path Low Priority Shared mesh SPME Low priority Working paths traverse links that can carry  of all traffic Protection paths are only uncontended at a given business priority  of all traffic for all business priorities can oversubscribe link

Signalling Implications If signalling carried an indication of business priority, at the ingress to a shared protection domain, the SPME could be inferred from the combination of priority and the ERO permitting the SPME with the correct priority and domain egress to be selected

Next Steps We’ll pose the questions: “Do we see more than one model of shared mesh going forward?” “If only one, what are the actual business requirements?” Collect comments and seek validation