Applicability of PCE for Computing Protection Paths draft-chen-pce-protection-applicability Huaimo Chen, Huawei.

Slides:



Advertisements
Similar presentations
Extensions to PCEP for Backup Ingress and Egress of LSP draft-chen-pce-compute-backup-ingress-01 draft-chen-pce-compute-backup-egress-01 Huaimo Chen
Advertisements

Extensions to PCEP for Distributing Label across Domains draft-chen-pce-label-x-domains-00 Huaimo Chen Autumn Liu
Requirement and protocol for WSON and non-WSON interoperability CCAMP WG, IETF 81th, Quebec City, Canada draft-shimazaki-ccamp-wson-interoperability-00.
Protection Mechanisms for LDP P2MP/MP2MP LSP draft-zhao-mpls-mldp-protections-02.txt Quintin Zhao, Emily Chen, Tao Chou Huawei Technology Daniel King OldDog.
1 Reoptimization of Point-to-Multipoint Traffic Engineering Loosely Routed LSPs draft-tsaad-mpls-p2mp-loose-path-reopt-00 Author list: Tarek Saad
Draft-li-mpls-global-label-usecases-00IETF 88 SPRING WG1 Usecases of MPLS Global Label draft-li-mpls-global-label-usecases-00 Zhenbin Li, Quintin Zhao.
Sub-IP Layer Protection Mechanism Performance Benchmarking draft-ietf-bmwg-protection-term-05 draft-ietf-bmwg-protection-meth-04 November 17, 2008 Rajiv.
Pseudowire Endpoint Fast Failure Protection draft-shen-pwe3-endpoint-fast-protection-00 Rahul Aggarwal Yimin Shen
Draft-chen-i2rs-mpls-ldp-usecases-00/ draft-huang-i2rs-mpls-te-usecase-00 IETF 88 I2RS1 Use Cases for an Interface to MPLS Protocol draft-chen-i2rs-mpls-ldp-usecases-00/
Draft-li-isdnrg-seamless-mpls-mbh-00IETF 92 SDNRG1 Inter-SDN in Seamless MPLS for Mobile Backhaul Zhenbin Li, Rober Tao Huawei Technologies IETF 92, Dallas,
CS Summer 2003 Lecture 12 FastReRoute (FRR) - Big Picture.
Protection in OBS Zartash Afzal Uzmi. Jan 13, 2006Lahore University of Management Sciences2 First slide… This is not a tutorial! This is a discussion.
Restoration Routing in MPLS Networks Zartash Afzal Uzmi Computer Science and Engineering Lahore University of Management Sciences.
MPLS Protection Routing: A Tutorial Zartash Afzal Uzmi.
Restoration Routing in MPLS Networks Zartash Afzal Uzmi Computer Science and Engineering Lahore University of Management Sciences.
MPLS Local Restoration using Optimized Aggregate Information Zartash Afzal Uzmi Computer Science and Engineering Lahore University of Management Sciences.
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
LSP-Ping extensions for MPLS-TP draft-nitinb-mpls-tp-lsp-ping- extensions-00 Nitin Bahadur Sami Boutros Rahul Aggarwal Eric Gray.
November th Requirements for supporting Customer RSVP and RSVP-TE over a BGP/MPLS IP-VPN draft-kumaki-l3VPN-e2e-mpls-rsvp-te-reqts-05.txt.
November th Diego Requirements for delivering MPLS services over L3VPN draft-kumaki-l3VPN-e2e-mpls-rsvp-te-reqts-02.txt Kenji Kumaki KDDI,
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
IETF 68, MPLS WG, Prague P2MP MPLS-TE Fast Reroute with P2MP Bypass Tunnels draft-leroux-mpls-p2mp-te-bypass-01.txt J.L. Le Roux (France Telecom) R. Aggarwal.
P2MP MPLS-TE FRR with P2MP Bypass Tunnel draft-leroux-mpls-p2mp-te-bypass-00.txt J.L. Le Roux (France Telecom) R. Aggarwal (Juniper) IETF 67, MPLS WG,
UNI Extensions for Diversity and Latency Support 13-Mar-13IETF 86 Orlando1 Don Dieter.
Forward-Search P2P/P2MP TE LSP Inter-Domain Path Computation draft-chen-pce-forward-search-p2p-path-computation draft-chen-pce-forward-search-p2mp-path.
WG Document Status 192nd IETF TEAS Working Group.
67th IETF San Diego November 2006 Requirement for Inter-Domain LSP Recovery Wataru Imajuku: Tomohiro.
PCE-based Computation Procedure To Compute Shortest Constrained P2MP Inter-domain Traffic Engineering Label Switched Paths draft-zhao-pce-pcep-inter-domain-p2mp-procedures-02.txt.
Framework for G.709 Optical Transport Network (OTN) draft-ietf-ccamp-gmpls-g709-framework-05 CCAMP WG, IETF 82 nd Taipei.
Explicitly Routed Tunnels using MPLS Label Stack draft-gredler-spring-mpls-02 Hannes Gredler Yakov Rekhter
PCE-based Computation for Inter-domain P2MP LSP draft-zhao-pce-pcep-inter-domain-p2mp-procedures-00.txt Quintin Zhao, Huawei Technology David Amzallag,
Draft-torvi-mpls-rsvp-ingress-protection-00IETF 84 MPLS: 30 July Ingress Protection for RSVP-TE p2p and p2mp LSPs draft-torvi-mpls-rsvp-ingress-protection-00.
L1VPN Extended Overlay Model draft-fedyk-ccamp-l1vpn-extnd-overlay-00 Don Dieter
1 Scott Poretsky, Quarry Technologies Shankar Rao, Qwest Communications Jean-Louis Le Roux, France Telecom Rajiv Papneja, Isocore Rajesh Khanna, Avici.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 79th IETF - BeiJing Signaling Extension for MPLS Ring Yong Huang.
1 77th IETF, CCAMP WG, Anaheim, CA, USA March 2010 Signaling RSVP-TE P2MP LSPs in an Inter- domain Environment draft-ali-mpls-inter-domain-p2mp-rsvp-te-lsp-03.txt.
66th IETF, Montreal, July 2006 PCE Working Group Meeting IETF-66, July 2006, Montreal A Backward Recursive PCE-based Computation (BRPC) procedure to compute.
Draft-li-mpls-proxy-te-lsp-01IETF 90 MPLS1 Proxy MPLS Traffic Engineering Label Switched Path(LSP) draft-li-mpls-proxy-te-lsp-01 Zhenbin Li, Xinzong Zeng.
Extensions to RSVP-TE for P2MP LSP Ingress/Egress Local Protection draft-chen-mpls-p2mp-ingress-protection draft-chen-mpls-p2mp-egress-protection Huaimo.
Forward Search P2MP TE LSP Inter- Domain Path Computation draft-chen-pce-forward-search-p2mp-path Huaimo Chen
Forward-Search P2P TE LSP Inter- Domain Path Computation draft-chen-pce-forward-search-p2p-path-computation Huaimo Chen
The Application of the Path Computation Element Architecture to the Determination of a Sequence of Domains in MPLS & GMPLS draft-king-pce-hierarchy-fwk-01.txt.
Establishing P2MP MPLS TE LSPs draft-raggarwa-mpls-p2mp-te-02.txt Rahul Aggarwal Juniper Networks.
82 nd Taipei Protection Mechanisms for LDP P2MP/MP2MP LSP draft-zhao-mpls-mldp-protections-00.txt Quintin Zhao, Emily Chen, Huawei.
Multicast State Advertisement in EVPN draft-li-l2vpn-evpn-multicast-state-ad Zhenbin Li Junlin Zhang Huawei Technologies July, 2013 Berlin Germany.
Extensions to RSVP-TE for P2MP LSP Ingress/Egress Local Protection draft-chen-mpls-p2mp-ingress-protection draft-chen-mpls-p2mp-egress-protection Huaimo.
1 MPLS Source Label Mach Chen Xiaohu Xu Zhenbin Li Luyuan Fang IETF87 MPLS Aug Berlin draft-chen-mpls-source-label-00.
67th IETF - San Diego, CA, USA November 8, 2006 PCECP Requirements for support of Global Concurrent Optimization Y. Lee, Huawei, D. King, Aria Networks,
Analysis on Two Methods in Ingress Local Protection.
Daniel King, Old Dog Consulting Adrian Farrel, Old Dog Consulting
Zhenbin Li, Kai Lu Huawei Technologies IETF 98, Chicago, USA
Path Computation Element Working Group
PCE Applicability for Inter-Layer MPLS and GMPLS Traffic Engineering draft-oki-pce-inter-layer-app-00.txt Mar. 20, 2006 Eiji Oki (NTT) Jean-Louis Le.
P2MP MPLS-TE Fast Reroute with P2MP Bypass Tunnels
Tomohiro Otani Kenji Kumaki Satoru Okamoto Wataru Imajuku
Daniel King, Old Dog Consulting Adrian Farrel, Old Dog Consulting
Presenter: Jeffrey Zhang
Use Cases for Using PCE to act as a Central Controller (PCECC) Component draft-zhao-teas-pce-central-controller-use-cases-00.txt 95th Buenos Aires.
Daniel King, Old Dog Consulting Adrian Farrel, Old Dog Consulting
Extensions to RSVP-TE for P2MP LSP Ingress/Egress Local Protection
Extensions to RSVP-TE for P2MP LSP Ingress/Egress Local Protection
PLR Designation in RSVP-TE FRR
Guoman Liu ) ) Yuefeng Jian Jinghai ) Zongpeng )
Signaling RSVP-TE P2MP LSPs in an Inter-domain Environment draft-ali-mpls-inter-domain-p2mp-rsvp-te-lsp-01.txt Zafar Ali, Cisco Systems.
WG Document Status Compiled By: Matt Hartley, Lou Berger, Vishnu Pavan Beeram IETF 99 - TEAS Working Group.
Extensions to RSVP-TE for LSP Egress Local Protection
LSP Fast-Reroute Using RSVP Detours
Path Computation Element WG Status
Zhaohui (Jeffrey) Zhang
Presentation transcript:

Applicability of PCE for Computing Protection Paths draft-chen-pce-protection-applicability Huaimo Chen, Huawei

Page 2 Introduction  Discussions initiated by Daniel King on List.  Applications such as Cloud drive increasingly more traffic across longer ranges over LSP crossing domains  It is very important to provide protections for the traffic against failures  PCE is used for computing paths for LSP crossing domains  PCE COULD also be used for computing protection paths for LSP crossing domains

Page 3 Many Application Scenarios  End to end disjoint path P2P disjoint path from an ingress to an egress P2MP disjoint path from an ingress to a number of egresses  Multi-homing end to end disjoint path P2P disjoint path from a backup ingress to a backup egress P2MP disjoint path from a backup ingress to a number of backup egresses  One to one Local Protection Path P2P  Path for link protection  Path for intermediate node protection  Path for ingress and egress protection P2MP  Facility Local Protection Path P2P  Path for protecting a set of LSPs over a link  Path for protecting a set of LSPs through an intermediate node  Path for protecting a set of LSPs via ingress and egress P2MP

Page 4 PCE for Computing E2E Disjoint Path  P2P disjoint path from an ingress to an egress AU T Q R L M N K J I H G E F C B S P D PCE1 PCE2 PCE3 PCE4 Egress Ingress Primary path from A to U Backup path from A to U, disjoint with the primary path disjoint link, node, domain except for ingress A and egress U

Page 5 PCE for Computing E2E Disjoint Path  P2MP disjoint path from an ingress to multiple egresses AY W Q V L M N K J I H G E F C B X P D PCE1 PCE2 PCE3 PCE5 Egress Ingress Primary path from A to U,Y, Z Backup path from A to U,Y and Z, disjoint with the primary path Possible disjoint link, node, domain except for ingress A and egresses U, Y and Z U T R S PCE4 Z B1 A1 C1 PCE6 Egress

Page 6 PCE for Multi-homing E2E Disjoint Path  P2P disjoint path from a backup ingress to a backup egress A U Q R L M N K J I H G E F C B SP D PCE1 PCE2 PCE3 PCE4 Egress Ingress Primary path from A to U Backup path from A’ to U’, disjoint with primary path disjoint every link, every node, domain A’A’ U’U’ Backup Ingress Backup Egress T Src Dst

Page 7 PCE for Multi-homing E2E Disjoint Path  P2MP disjoint path from an ingress to multiple egresses Y W Q V L M N K J I H G E F C B X P D PCE1 PCE2 PCE3 PCE5 Egress Primary path from A to U,Y, Z Backup path from A’ to U’,Y’ and Z’, disjoint with the primary path Disjoint as many link, node, domain as possible U T R S PCE4 Z B1 A1 C1 PCE6 Egress A Ingress A’A’ Src Z’ U’U’ Y’ Backup Ingress Backup Egress Dst

Page 8 PCE for P2P Detour Local Protection Path  Link protection AU T Q R L M N K J I H G E F C B P D PCE1 PCE2 PCE3 PCE4 Egress Ingress P2P LSP from A to U Detour path for protecting link C--F S V C1 Detour path for protecting link J--R

Page 9 PCE for P2P Detour Local Protection Path  Intermediate node protection AU T Q R L M N K J I H G E F1F1 C B P D PCE1 PCE2 PCE3 PCE4 Egress Ingress P2P LSP from A to U Detour path for protecting node F S V C1 Detour path for protecting node J

Page 10 PCE for P2P Detour Local Protection Path  P2P path for protecting ingress and egress A U Q R L M N K J I H G E F C B SP D PCE1 PCE2 PCE3 PCE4 Egress Ingress P2P LSP from A to U Backup path from A’ to B (NH of A) for protecting ingress A A’A’ U’U’ Backup Ingress Backup Egress T Src Dst Backup path from R (PH of U) to U’ for protecting egress U

Page 11 PCE for P2MP Detour Local Protection Path  Path for protecting link  Path for protecting intermediate node  Path for protecting ingress and egress

Page 12 PCE for P2P Facility Local Protection Path  Link protection AU T Q R L M N K J I H G E F1F1 C B P D PCE1 PCE2 PCE3 PCE4 Egress Ingress P2P LSP from A to U Facility path for protecting link C— F for 2 LSPs S V C1 Facility path for protecting link J—R for 3 LSPs P2P LSP from A to V Egress W J1J1

Page 13 PCE for P2P Facility Local Protection Path  Intermediate node protection AU T Q R L M N K J I H G E F1F1 C B P D PCE1 PCE2 PCE3 PCE4 Egress Ingress P2P LSP from A to U Facility path for protecting node C for 2 LSPs S V C1 P2P LSP from A to V Egress

Page 14 PCE for P2P Facility Local Protection Path  P2P path for protecting ingress and egress A U Q R L M N K J I H G E F1F1 C B SP D PCE1 PCE2 PCE3 PCE4 Egress Ingress P2P LSP from A to U Backup path from A’ to B (NH of A) for protecting ingress A for 2 LSPs A’A’ U’U’ Backup Ingress Backup Egress T Src Dst Backup path from R (PH of U) to U’ for protecting egress U for 2 LSPs P2P LSP from A to V Ingress

Page 15 PCE for P2MP Facility Local Protection Path  Path for protecting link  Path for protecting intermediate node  Path for protecting ingress and egress

Summary/Next Step  Document highlights best practice, use cases and gaps.  Where needed recommendations for further extensions and procedures.  Would this be a useful document for WG?  Please provide input and examples  Thank you!