Download presentation
Presentation is loading. Please wait.
Published byNancy Maxwell Modified over 9 years ago
1
Budapest University of Technology and Economics Department of Telecommunications and Media Informatics Optimized QoS Protection of Ethernet Trees Tibor Cinkler, András Kern, István Moldován
2
BME-TMIT Ericsson, January 2006, Budapest2moldovan@tmit.bme.hu ● Ethernet is the most dominating LAN technology ●Cheap equipment + high speed (up to 10 Gbps) ● Switched Ethernet - Carrier grade properties are required: ●Traffic Engineering ●Resilience Ethernet in Metro Access Networks
3
BME-TMIT Ericsson, January 2006, Budapest3moldovan@tmit.bme.hu Spanning Tree Protocol (STP) ●Reverse learning + broadcast based packet switch ●Tree–like topology desired ●STP: ●Defines loop-free logical packet forwarding topology ●Spans a tree between the switches ●Problems: Slow convergence (improved by RSTP) Bad network utilization
4
BME-TMIT Ericsson, January 2006, Budapest4moldovan@tmit.bme.hu Multiple Spanning Tree Protocol ●MORE VLAN based spanning trees ●Multiple spanning tree instances ●Each tree runs a separate RSTP instance ●1 VLAN 1 tree ●Number of trees is decision of the operator ●By default tree spanning is “Topology-Driven”: ●Port costs based on topology and link capacities ●Costs can be set manually (to obtain desired trees)
5
BME-TMIT Ericsson, January 2006, Budapest5moldovan@tmit.bme.hu Protection switching ●802.3ad Link Aggregation ●uses redundant links for load balancing and protection ●Using MSTP ●2 MSTI trees, two paths: red and green ●VLAN 1 -> MST 1, VLAN 2 -> MST 2 ●A and B uses VLAN 1, in case of failure switch to VLAN 2 LAN VLAN 1 MST 1 VLAN 2 MST 2 (backup) A B
6
BME-TMIT Ericsson, January 2006, Budapest6moldovan@tmit.bme.hu ●Typical Metro Topology: ●Aggregated traffic (demands) goes from the access to the edge nodes. ●Root of the trees at Edges node one or more trees per edge node Model assumptions Traffic Source Traffic Destinatio n
7
BME-TMIT Ericsson, January 2006, Budapest7moldovan@tmit.bme.hu Optimization framework ●Optimize the spanning trees ●Goal is to minimize the used network resources to maximize network throughput ●Provide 1:1 protection ●To protect all traffic is expensive - protect only a part of the traffic: the prioritized traffic ●Best Effort can use the protection paths
8
BME-TMIT Ericsson, January 2006, Budapest8moldovan@tmit.bme.hu Formal description: ILP ●Integer Linear Program is used ●Result is a global optimal solution ●Constraints ●Total load does not exceed the link capacities and QoS limits ●If a demand uses a link the assigned tree will also use it ●Tree constraints (no cycles) ●Backup paths must be disjoint
9
BME-TMIT Ericsson, January 2006, Budapest9moldovan@tmit.bme.hu Evaluation Criteria ●Maximal Throughput of the network ●Scaling up the offered load ●The allocated capacity for protection ●Resilience vs. Throughput: the amount of traffic lost in case of failure ●Complexity
10
BME-TMIT Ericsson, January 2006, Budapest10moldovan@tmit.bme.hu Throughput gain
11
BME-TMIT Ericsson, January 2006, Budapest11moldovan@tmit.bme.hu Throughput w/ protection
12
BME-TMIT Ericsson, January 2006, Budapest12moldovan@tmit.bme.hu Capacities allocated
13
BME-TMIT Ericsson, January 2006, Budapest13moldovan@tmit.bme.hu Heuristic ●Decomposition: ●Demand Routing (DR) ●Based on Simulated Allocation (SAL) ●Tree Assignment and Placement (TAP) ●Tree construction algorithm ●Results verified by simulations ●comparison to ILP solution
14
BME-TMIT Ericsson, January 2006, Budapest14moldovan@tmit.bme.hu Heuristic Results
15
BME-TMIT Ericsson, January 2006, Budapest15moldovan@tmit.bme.hu Relative throughputs
16
BME-TMIT Ericsson, January 2006, Budapest16moldovan@tmit.bme.hu Conclusion ●We present an optimization TE Framework for QoS and protection ●ILP – not scalable ●Heuristics – scalable, close to optimal ●We show that: ●With optimization we can use redundant links –Throughput doubles compared to STP ●Optimized 1:1 protection –The same throughput as STP but all protected ●Protecting QoS traffic only is reasonable tradeoff
17
BME-TMIT Ericsson, January 2006, Budapest17moldovan@tmit.bme.hu Thank you for your attention!
18
BME-TMIT Ericsson, January 2006, Budapest18moldovan@tmit.bme.hu The End…
19
BME-TMIT Ericsson, January 2006, Budapest19moldovan@tmit.bme.hu QoS model ●Priority based scheduling: ●Lower priority traffic is not served until there is higher priority traffic in the queue. ●To ensure low delay for each QoS class: amount of higher priority traffic should be limited for each link ●The ratios are examples, and should be determined individually for each operator 10% 20% remaining 30%
20
BME-TMIT Ericsson, January 2006, Budapest20moldovan@tmit.bme.hu QoS provisioning ●Edges: ●Classification - VLANs ●Admission control, policing ●All nodes ●Queuing, scheduling ●Preprovisioned VLAN based QoS pipes ●Traffic engineered paths for VLAN pipes ●Resources assigned to pipes ●Optimization ensures that QoS requirements are met for each link
21
BME-TMIT Ericsson, January 2006, Budapest21moldovan@tmit.bme.hu Loss in case of failure ●Throughput loss is compared to the network throughput without failure ●losses are measured immediately after the link failure, so the restoration capability of the STP is not considered
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.