Fast Re-Route in IP/MPLS networks using Ericsson s IP Operating System
|
|
|
- Kelly Garrett
- 9 years ago
- Views:
Transcription
1 Fast Re-Route in IP/MPLS networks using s IP Operating System
2 Introduction: Today, Internet routers employ several routing protocols to exchange routes. As a router learns its potential routes, it builds a database of next-hops. For every possible destination prefix, the router uses this database to identify where to route a packet. This database is called the Forwarding Information Base (FIB) and is programmed in the line card. When a new link, router or shared risk link group (SRLG) is added, there is a time delay or up convergence, which takes place until the new connectivity information infiltrates the network. When a link, router or SRLG fails there is also a time delay, known as down convergence, which is present until information about the connectivity loss is disseminated throughout the network. Up convergence time delays are not as critical as the latency created during a down convergence. During a down convergence delay, packets in route towards the failed path are dropped. When a local link fails, a router notifies its neighbors, via Interior Gateway Protocols (IGP) and Border Gateway Protocols (BGP), re-computes new next-hops for all affected prefixes, and then installs those next-hops in the forwarding plane. Until the new next-hops are installed, traffic directed towards the affected prefixes is discarded. This process can take several seconds. The duration between a network failure event, and when all routers in that network update their forwarding hardware, is called convergence time. The process of routers updating next-hop information in their FIBs, to bypass a failure during network failure, is called Re-Routing. This paper provides an overview of how to achieve Fast Re-Route (FRR) functionality in a network by using s Internet Protocol Operating System (IP Operating System). You will gain an understanding of FRR, as well as how it enables large networks to recover from failure in sub second. Familiarity with Internet Protocols, Multi Protocol Label Switching (MPLS)/Label Distribution Protocol (LDP) and Virtual Private Networks (VPN) is essential to understanding the contents of this document. What is FRR? FRR is the ability of a router to support the following two functionalities: 1. Pre-calculating a backup route to destination prefixes in its next-hop database. This backup route is accessed via a backup next-hop and is activated when the primary route to a destination prefix goes down. When a router with a backup route to a prefix detects a connectivity failure to that prefix, to achieve convergence, it will exchange routing information for recalculation of a new next-hop. It then updates the FIB and the forwarding hardware. However, the advantage of pre-calculating a backup next-hop is that a router can successfully forward packets during convergence (i.e. before the new next-hop to the prefix has been calculated and the FIB has been updated) Prior to convergence, the network is in a transient state. As a result, different routers have different views of the network, which may cause them to calculate next-hops that are incompatible with the next-hop calculations of other routers in that network. This scenario creates the possibility of forwarding packets in a loop among two or more routers. Because the backup next-hops must ensure correct (but not necessarily optimal) forwarding in a nonconverged network, it is essential that any chosen backup next-hop prevents packets from being forwarded in a loop when other routers are using old next-hops, as well as when these routers start using new next-hops. Such a backup next-hop is called a loop free alternate (LFA) next-hop. To avoid forwarding loops during network convergence, all routers in the network must calculate LFA next-hops. 2. As soon as the failure of the primary route is detected, in the forwarding hardware, the router replaces the active next-hop to the failed destination prefix with a pre-calculated backup next-hop within tens of milliseconds. Routing protocols will download the pre-calculated backup next-hops, along with the primary next-hops in the forwarding hardware, so that the hardware is aware of the existence of backup next-hops. The hardware monitors adjacent links. When a link fails the primary next-hop to the unreachable prefixes is replaced with the backup nexthop for these prefixes. For non-adjacent links, the routing protocol in the control plane signals to the forwarding hardware that a destination prefix is down. At that time, the hardware replaces the primary next-hop with the backup next-hop. Since the update occurs in the hardware, it happens much faster than protocol convergence. A network built with routers that support FRR experiences less traffic loss and less micro-looping than non-frr networks. But achieving acceptable speed is a concern. Although a router s convergence time generally takes several seconds, new media applications that use voice and video are sensitive to traffic losses greater than tens of milliseconds. In order for next generation networks to support these applications, and provide 99999% reliability, these networks need to recover from failure in milliseconds. Position Paper: FRR in IP/MPLS Networks using 2
3 FRR in s IP Operating System: The FRR infrastructure in s IP Operating System is built using the following components: 1. Loop Free Alternate (LFA): Open Shortest Path First (OSPF), Intermediate System to Intermediate System (IS-IS), Label Distribution Protocol (LDP) and Resource Reservation Protocols (RSVP) support the calculation of LFA routes in s IP Operating System. In the topology shown in Figure 1, OSPF and IS-IS will calculate as the primary prefix P2 next-hop and as a backup next-hop to reach prefix P2 from P1. Similarly the LDP will use Label1 as the primary label and Label2 as a backup label to reach prefix P2 from P1. Both OSPF and IS-IS protocol implementations in the IP Operating System support per-prefix LFA as compared to per-link LFA. This ensures that networks using the IP Operating System have better node protection, better FRR topology coverage and better capacity utilization /Label2 R2/LSR R1/LSR /Label1 R4/LSR4 P2 P3 P4 1 2 R3/LSR3 Figure 1 LFA support for OSPF: In the IP Operating System, OSPF supports a per-prefix a LFA computation over a point-to-point OSPF interface that is configured for a LFA computation. If the point-to-point interface has a full neighbor adjacency, the LFA computation is performed for the entire area. By default, all point-to-point and broadcast interfaces can be used as LFA backups. LFA support for IS-IS: In the IP Operating System, IS-IS supports a per-prefix LFA computation over a point-to-point IS-IS interface configured for a LFA computation. IS-IS performs a L1 area/l2 domain LFA computation by executing a Shortest Path First (SPF) computation based on the standpoint of each eligible neighboring system. LFA support for LDP: In the IP Operating System, LDP functions in a liberal label retention mode to store next-hop labels corresponding to neighbors, which are not currently the primary neighbors, and in a downstream unsolicited mode to distribute the labels for the Forwarding Equivalence Class that are on other paths besides the Shortest Path Tree. The LDP LFA calculation follows the IGP protocols, via the Routing Information Base (RIB), for calculation of the backup next-hop. Position Paper: FRR in IP/MPLS Networks using 3
4 CLI/Configuration OSPF/ISIS/LDP/RSVP Routing Information Base will 1. Download primary next-hop calculated by the routing protocol Forwarding Information Base will store the primary and the back-up next-hop in the hardware The flow chart provides a logical view of a LFA implementation in the IP Operating System. IGPs will calculate primary and back-up next-hops. The RIB will download the primary and backup next-hops to the FIB, which in turn will program the next-hops in the hardware. 2. Fast local repair with protected Next Hops: Double Barrel Next-Hop (DBNH): The IGP/BGP/LDP protocols, that feed the prefix arrival information, provide a backup next-hop for the primary nexthop to the RIB, when executing a route add or update. The RIB will use the primary and backup information to create a double-barrel next-hop (DBNH). If there is an Equal Cost Multi Path (ECMP) of primary paths, then each primary path may optionally have a backup path. When a DBNH is downloaded to the line card, it will appear as a next-hop with two next-hop IDs - primary and backup. The line card holds on to this DBNH and downloads only the active part of the next-hop to the network processor for packet forwarding. When a line card receives a trigger, it will overwrite the active primary next-hop in the network processor, with the backup from the DBNH. The double barrel is also applicable to the Link State Protocol (LSP) paths in order for the LDP to compute and install an LFA backup path/label for a primary path/label. For the topology shown in Figure 1 a DBNH for an IGP protocol will look as follows: Prefix P1 uses a double barrel that contains a primary next-hop of and backup next-hop of Double Barrel Next-Hop Primary Next-Hop Backup Next-Hop is Primary Next-Hop is programmed in the Network Processor Position Paper: FRR in IP/MPLS Networks using 4
5 Similarly, DBNH for LDP will look as follows: Prefix P1 uses a double barrel that contains a primary next-hop of Label1 and backup next-hop of Label2 to get to P2 Double Barrel Next-Hop Primary Next-Hop Backup Next-Hop is Label 2 Primary next-hop Label1 is programmed in the Network Processor Double Label Next-Hop (DLNH): In LSP-based networks, egress Provider Edge (PE) routers need to be protected at the ingress PE. A labeled next-hop is a label acting as a next-hop to a Label Switching Router (LSR). A single pair of primary and backup labels (corresponding to primary and backup egress PE routers) can act as next-hop for thousands of external prefixes. In such a situation, a connectivity failure to the primary label requires a backup label update for thousands of prefixes in the line card, which can take up to several seconds. In the IP Operating System, this potential delay is avoided by the use of DLNHs. A DLNH is a next-hop that consists of two labels. Each of the two labels points to a DBNH. When the primary nexthop of the DBNH is active, the first label is used. When the backup is active the second label is used. In case of a failure, the advantage of a DLNH is that only a single mapping between the DLNH and DBNH needs to be updated. Advantages of DBNH and DLNH: 1. Since a DBNH and DLNH are programmed in the hardware, the switch from active next-hop to the back-up nexthops is achieved in about 50 milliseconds. 2. When link fails on an edge router that can reach several thousand prefixes using one next-hop, the router can reroute traffic to these prefixes with a single update to the next-hop database in the line card. 3. DBNHs and DLNHs are agnostic of the technology that notifies the link failure such as: Bidirectional Forwarding Detection, Fast Failure Notification, etc., and can be used with any underlying link failure detection mechanism. Consider a network, as shown in Figure 2, where PE routers LSR3 and LSR4 provide connectivity to a few thousand prefixes. LSR3 and LabelP14 allocate LabelP13 and LabelP23, and LabelP24 is allocated by LSR4. LabelP32 and LabelP42 are allocated by a customer edge LSR that is directly connected to these prefixes. LabelP32 and LabelP42 are allocated by another customer edge LSR that is directly connected to these prefixes. Label13 LabelP32 LSR1 Label14 LSR3 LabelP35 P2...P5000 P1 R1 Label23 LabelP42 LSR2 Label24 LSR4 LabelP45 P2...P5000 Figure 2 Position Paper: FRR in IP/MPLS Networks using 5
6 The DLNH in the FIB on LSR1 will look like: Double Label Next-Hop P2...P5000 P P10000 LabelP32 LabelP42 Double Label Next-Hop Label13 Label14 Label14 Label13 LabelP45 LabelP35 P2 P5000 prefixes are reachable through a DLNH containing labels LabelP32 and LabelP42. The DLNH in turn points to a DBNH of Label13 (from LSR3) and Label14 (from LSR4). When LSR3 is active, LabelP32 of DLNH is used to forward traffic. When the line card on LSR1 detects that connectivity to LSR3 is down, it switches the second label Label14 of the DBNH to active in the network processor, and from then on LabelP42 of DLNH is used to forward traffic. A similar explanation applies to prefixes P P10000 that use LSR4 as the primary next-hop. As a result, only a single update is required to update the next-hop for 5000 prefixes and, since this update is takes place in the hardware, it is executed in less than 50 milliseconds. 3. Triggers for Fast Re-Route: The IP Operating System has the ability to detect and propagate adjacent and remote link failures using proprietary Fast Failover Notification (FFN) and Event Tracking Infrastructure (ETI). FFN is a resilient infrastructure that detects link or router failures for critical services in milliseconds. FFN consists of a trigger mechanism, and an infrastructure to propagate the triggered event to all line cards, as well as several protocols on the control plane that depend on the FFN events to make re-routing decisions. The trigger could be events related to link or line card failure, Bidirectional Forwarding Detection (BFD) failure or keep alive failure. On the line card, a FNN event indicates that the primary next-hop is not reachable and triggers the line card to switch to the backup next-hop. In addition to FFN, ETI is used to trigger a switch from a primary to a backup next-hop. The IGP/BGP/LDP protocols store an ETI object ID in a DBNH. When the protocol detects that the next-hop is not reachable, the protocol signals the ETI infrastructure on the line card and the line card switches to the backup next-hop immediately. The IP Operating System provides the ability for multiple clients to use DBNHs, with the same primary or a backup pair by supporting different DBNHs for each client. An example of two clients needing the same double barrel, but different triggers, is the L2VPN and L3VPN that use the same PE routers as primary/backup. L2VPN routes are added by LDP, which may want control-plane driven triggering. L3VPN routes are added by BGP, which may want multi-hop BFD as a trigger. 4. Remote Loop Free Alternate (LFA): A LFA cannot provide protection in ring topologies as the one shown in the figure. LDP tunnel from R6 to R3 provide access from R6 to P1 P1 R3 R1 R6-R2-R1 is the primary path from R6 to P1 R2 X R4 R6 R5 Figure 3 Position Paper: FRR in IP/MPLS Networks using 6
7 In the topology shown in Figure 3, when all links are active, R6 sends traffic to P1 via R2 and R1. If the link between R6 and R2 breaks, R6 is not able to send traffic to P1 via R5, since R5 also uses R6 to send traffic to P1. The connectivity from R6 to R1 is restored in s IP Operating System by using remote a LFA. With remote a LFA, R6 is able to dynamically identify R3 as its remote LFA node and sets up a directed Label Distribution Protocol (LDP) session with R3. Then R6 uses this LDP session with R3 to send traffic for P1 and thus connectivity to P1 from R6 is restored. The LDP session between the two routers, as well as the related label processing, does not require any prior path provisioning. 5. IP FRR on s Smart Services Router Smart Services Router (SSR) developed using the IP Operating System is s flag ship routing and services platform. The SSR leverages the IP FRR functionality in the IP Operating System with the help of high density line cards that support the DBNH and DLNH along with ETI and FFN, and is well positioned to help operators achieve network convergence in sub second. 6. Use Cases for FRR in IP/MPLS networks: Static IPFRR with BFD: /32 R / / /32 R / /32 R /32 Figure 4 In the topology shown in Figure 4, the next-hop static routes are protected from failure using a DBNH. The BFD can be used to monitor the failure of a primary next-hop, and when failure is detected, the line card switches to existing a backup next-hop in a few milliseconds. R1 has a static route to /32 via primary next-hop and backup next-hop The FIB has a DBNH (with and ) for /32. Single session BFD is used to monitor connectivity to When connectivity loss to is detected, line card switches the backup next-hop to active. Position Paper: FRR in IP/MPLS Networks using 7
8 IGP FRR with BFD: /32 R / / /32 R / /32 R /32 Figure 5 In the topology shown in Figure 5, a next-hop of IGP protocols such as the OSPF and IS-IS are protected using a DBNH calculated by LFA. R1 has an IGP route to /32 via primary next-hop and a backup next-hop , computed through the LFA. The FIB has a DBNH (with and ) for /32. Single session BFD is used to monitor connectivity to When connectivity loss to is detected, the line card switches the backup next-hop to active. IPFRR in redundancy solutions with MC-LAG/VRRP: In the IP Operating System, FRR is used in redundancy solutions based on Multi Chassis (MC) LAG/Virtual Router Redundancy Protocol (VRRP) to re-route traffic through a backup Inter Chassis Redundancy (ICR) link when the active link goes down. H1 Redundancy with MC LAG/VRRP R1 L2 Network L2 L3 Network R2 H2 Figure 6 Position Paper: FRR in IP/MPLS Networks using 8
9 In the topology shown in Figure 6, router R1 has an active link to the L2 network and is the primary path for traffic from the L3 network to the L2 network. The link from R2 to the L2 network serves as the backup link to connect the L3 network to the L2 network. The link from the R2 to L3 network has a higher metric then the link from R1 to the L3 network and, as a result, the traffic from the L3 network flows to R1. R2 is also connected to R1 through an ICR link, which serves as a backup for traffic from the L3 network to the L2 network. Therefore, R1 has a DBNH via the ICR link to R2. When the primary link on R1 to the L2 network goes down, not only does the link on R2 to the L2 network become active, the line card on R1 activates the backup next-hop to R2 and traffic from the L3 network is rerouted to the L2 network through R2 in less than 50 milliseconds. As a result, FRR allows a fast recovery from link failure. BGP FRR using BGP Best External: The IP Operating System-based MPLS VPN networks are able to converge in milliseconds using the Best External feature in BGP. Primary PE router PER3 has route to PER1 and PER2 through BGP Best External PER1 CER2 PER3 MPLS VPN Network CER1 Customer Network PER2 Primary PE router Figure 7 In the MPLS VPN network shown above, both PE routers PER1 and PER2 are connected to the customer edge router CER1. The network is setup so that PE1 has a higher local preference. The traffic on the customer edge network exits the MPLS VPN network through PER1 to reach CER1. Since both PER1 and PER2 are connected to CER1, when the BGP Best External is enabled on PER1 and PER2, the BGP protocol calculates the backup best external path to CER1 through PER2 and advertises this path to PER3. As a result, the FIB on PER3 has a DBNH with PER1 as an active nexthop and PER2 as a backup next-hop. When PER3 detects a loss of connectivity to PER1, the line card immediately switches the backup next-hop of PER2 to active and traffic to CER1 is rerouted via PER2 in less than 50 milliseconds. Fast Re-Route in IP/MPLS networks using s IP Operating System BGP FRR using BGP Path Diversity: The IP Operating System-based BGP networks are able to converge in milliseconds using the Path Diversity feature on BGP Route Reflectors. PE RR Primary PE router PER1 PER4 Route Reflector has diverse session with peer PER4 CER1 Customer Network Figure 8 PER2 Primary PE router Position Paper: FRR in IP/MPLS Networks using 9
10 In the BGP network shown above, the Route Reflector learns the best path to CER1 through PER1, as well as the backup path through PER2 due to the BGP Best External. However, the route reflector only mirrors the best path through PER1 to its client PER4. When BGP Path Diversity is enabled, the Route Reflector has another diverse session with its client PER4 and in turn also displays the backup path through PER2 to PER4. Therefore, PER4 knows the best path and backup path to reach CER1. The FIB on PER4 has a DBNH for CER1 with PER1 as an active next-hop, and PER2 as backup next-hop. When PER4 detects a loss of connectivity to PER2, the line card immediately switches the backup next-hop of PER2 to active and traffic to CER1 is re-routed via PER2 in < 50 milliseconds. 6. IPFRR LFA Analyzer: also provides a network optimization tool called IPFRR LFA Analyzer for improving the IPFRR coverage with LFA. This tool, which costs much less than existing commercial tools, can help to determine if the network coverage can be improved by adding a new link with a higher cost or modify existing link costs to maximize the number of protected failure scenarios. A user friendly GUI allows operators to create their networks and assign costs to the links. Using this tool, operators can improve the performance of their existing networks by 10-40% by adding a few new links and achieve close to perfect LFA coverage via cost optimization. Conclusions: By developing an infrastructure based on LFAs and protected next-hops, the IP Operating System is able to detect and re-route traffic in less than 50 milliseconds from the event of failure. Independent of the number of prefixes that are reachable from an edge router, the DBNH and DLNH provide the ability to re-route traffic in sub second. Routers running s IP Operating System are able to take advantage of cutting edge FRR infrastructure to detect network failure and re-route traffic in milliseconds. These routers are able to minimize traffic loss during failure and recover from it without causing noticeable service degradation. As a result, s IP Operating System enables networks that are more scalable and have a lower downtime. About : is a world-leading provider of communications technology and services. We are enabling a networked society with efficient real-time solutions that will allow 60 billion people to study, work and live more freely in sustainable societies around the world. Our offering comprises services, software and infrastructure within Information and communications technology for telecom operators and other industries. Today 40 percent of the world s mobile traffic goes through networks and we support customer networks servicing more than 2.5 billion subscriptions. Please visit us at Position Paper: FRR in IP/MPLS Networks using 10
11 appendix Acronym BGP: Border Gateway Protocol BFD: Bidirectional Forwarding Detection CE: Customer Edge DBNH: Double Barrel Next-Hop DLNH: Double Label Next-Hop ECMP: Equal Cost Multi Path ETI: Event Tracking Infrastructure FIB: Forwarding Information Base FRR: Fast ReRoute FFN: Fast Failover Notification IP OPERATING SYSTEM: Internet Protocol Operating System IGP: Interior Gateway Protocol ICR: Inter Chassis Redundancy LDP: Label Distribution Protocol LFA: Loop Free Alternate IS-IS: Intermediate System to Intermediate System LSP: Link State Protocol LSR: Label Switching Router MPLS: Multi Protocol Label Switching MC: Multi Chassis OSPF: Open Shortest Path First PE: Provider Edge RIB: Routing Information Base RSVP: Resource Reservation Protocols SRLG: Shared Risk Link Group VRRP: Virtual Router Redundancy Protocol VPN: Virtual Private Network Inc. 200 Holger Way San Jose, CA Phone: (EUS) Jan / FGB Uen Rev A Specifications subject to change without notice. Position Paper: FRR in IP/MPLS Networks using 11
Fast Reroute for Triple Play Networks
Building Smart Broadband Networks TM Fast Reroute for Triple Play Networks Sachin Natu Product Management March 2006 IPTV Service Requirements IPTV Network Design Fast Reroute / Convergence Solutions -
ENSURING RAPID RESTORATION IN JUNOS OS-BASED NETWORKS
WHITE PAPER ENSURING RAPID RESTORATION IN JUNOS OS-BASED NETWORKS A Complete Convergence Solution Based on Local Repair, Loop Free Alternates, and Hierarchical Forwarding Copyright 0, Juniper Networks,
Multi Protocol Label Switching (MPLS) is a core networking technology that
MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson Abstract Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of
Fast Reroute Techniques in MPLS Networks. George Swallow [email protected]
Fast Reroute Techniques in MPLS Networks George Swallow [email protected] Agenda What are your requirements? The solution space U-turns Traffic Engineering for LDP Traffic Engineering Some Observations
Introducing Basic MPLS Concepts
Module 1-1 Introducing Basic MPLS Concepts 2004 Cisco Systems, Inc. All rights reserved. 1-1 Drawbacks of Traditional IP Routing Routing protocols are used to distribute Layer 3 routing information. Forwarding
BFD. (Bidirectional Forwarding Detection) Does it work and is it worth it? Tom Scholl, AT&T Labs NANOG 45
BFD (Bidirectional Forwarding Detection) Does it work and is it worth it? Tom Scholl, AT&T Labs NANOG 45 What is BFD? BFD provides a method to validate the operation of the forwarding plane between two
MPLS Basics. For details about MPLS architecture, refer to RFC 3031 Multiprotocol Label Switching Architecture.
Multiprotocol Label Switching (), originating in IPv4, was initially proposed to improve forwarding speed. Its core technology can be extended to multiple network protocols, such as IPv6, Internet Packet
WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr. 2006 Cisco Systems, Inc. All rights reserved.
MPLS WAN Topologies 1 Multiprotocol Label Switching (MPLS) IETF standard, RFC3031 Basic idea was to combine IP routing protocols with a forwarding algoritm based on a header with fixed length label instead
Cisco Configuring Basic MPLS Using OSPF
Table of Contents Configuring Basic MPLS Using OSPF...1 Introduction...1 Mechanism...1 Hardware and Software Versions...2 Network Diagram...2 Configurations...2 Quick Configuration Guide...2 Configuration
BGP Best Path Selection Algorithm
BGP Best Path Selection Algorithm Document ID: 13753 Contents Introduction Prerequisites Requirements Components Used Conventions Why Routers Ignore Paths How the Best Path Algorithm Works Example: BGP
Router and Routing Basics
Router and Routing Basics Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Routing Protocols and Concepts CCNA2 Routing and packet forwarding Static routing Dynamic
Loop-Free IP Fast Reroute Using Local and Remote LFAPs
Loop-Free IP Fast Reroute Using Local and Remote LFAPs I. Hokelek, M. A. Fecko, P. Gurung, S. Samtani Contact: Ibrahim Hokelek Applied Research Telcordia Technologies Inc. [email protected]
Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang [email protected] AT&T
Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang [email protected] AT&T 1 Outline! BGP/MPLS VPN (RFC 2547bis)! Setting up LSP for VPN - Design Alternative Studies! Interworking of LDP / RSVP
Fast Reroute with Segment Routing
TEHNOLOGY WHITE PPER Extending Fast Reroute coverage in LDP-based MPLS networks Segment Routing (SR) is an emerging technology for IP/Multiprotocol Label Switching (MPLS) networks that enables source routing.
How To Make A Network Secure
1 2 3 4 -Lower yellow line is graduate student enrollment -Red line is undergradate enrollment -Green line is total enrollment -2008 numbers are projected to be near 20,000 (on-campus) not including distance
MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans
MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans Contents Overview 1 1. L2 VPN Padding Verification Test 1 1.1 Objective 1 1.2 Setup 1 1.3 Input Parameters 2 1.4 Methodology 2 1.5
Using OSPF in an MPLS VPN Environment
Using OSPF in an MPLS VPN Environment Overview This module introduces the interaction between multi-protocol Border Gateway Protocol (MP-BGP) running between Provider Edge routers (s) and Open Shortest
Enterprise Network Simulation Using MPLS- BGP
Enterprise Network Simulation Using MPLS- BGP Tina Satra 1 and Smita Jangale 2 1 Department of Computer Engineering, SAKEC, Chembur, Mumbai-88, India [email protected] 2 Department of Information Technolgy,
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
IMPLEMENTING CISCO MPLS V3.0 (MPLS)
IMPLEMENTING CISCO MPLS V3.0 (MPLS) COURSE OVERVIEW: Multiprotocol Label Switching integrates the performance and traffic-management capabilities of data link Layer 2 with the scalability and flexibility
Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007
Multihoming and Multi-path Routing CS 7260 Nick Feamster January 29. 2007 Today s Topic IP-Based Multihoming What is it? What problem is it solving? (Why multihome?) How is it implemented today (in IP)?
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification
MPLS is the enabling technology for the New Broadband (IP) Public Network
From the MPLS Forum Multi-Protocol Switching (MPLS) An Overview Mario BALI Turin Polytechnic [email protected] www.polito.it/~baldi MPLS is the enabling technology for the New Broadband (IP) Public
HP Networking BGP and MPLS technology training
Course overview HP Networking BGP and MPLS technology training (HL046_00429577) The HP Networking BGP and MPLS technology training provides networking professionals the knowledge necessary for designing,
Multi-Protocol Label Switching To Support Quality of Service Needs
Technical Report, IDE1008, February 2010 Multi-Protocol Label Switching To Support Quality of Service Needs Master s Thesis in Computer Network Engineering - 15hp AMJAD IFTIKHAR AOON MUHAMMAD SHAH & FOWAD
MPLS/BGP Network Simulation Techniques for Business Enterprise Networks
MPLS/BGP Network Simulation Techniques for Business Enterprise Networks Nagaselvam M Computer Science and Engineering, Nehru Institute of Technology, Coimbatore, Abstract Business Enterprises used VSAT
Kingston University London
Kingston University London Thesis Title Implementation and performance evaluation of WAN services over MPLS Layer-3 VPN Dissertation submitted for the Degree of Master of Science in Networking and Data
Traffic Engineering Management Concepts
3 CHAPTER This chapter includes an overview of Cisco Prime Fulfillment and of some of the concepts used in this guide. This chapter includes the following sections: Prime Fulfillment TEM Overview, page
NAVAL POSTGRADUATE SCHOOL THESIS
NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS A PERFORMANCE ANALYSIS OF BGP/MPLS VPN FAILOVER FUNCTIONALITY by Guan Chye Tan December 2006 Thesis Advisor: Second Reader: Geoffrey Xie John Gibson
MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009
MikroTik RouterOS Introduction to MPLS Prague MUM Czech Republic 2009 Q : W h y h a v e n 't y o u h e a r d a b o u t M P LS b e fo re? A: Probably because of the availability and/or price range Q : W
MPLS Traffic Engineering in ISP Network
MPLS Traffic Engineering in ISP Network Mohsin Khan Birmingham City University, England ABSTRACT Multi Protocol Label Switching (MPLS) is an innovative and vibrant technology. The most famous applications
Introduction to HA Technologies: SSO/NSF with GR and/or NSR. Ken Weissner / [email protected] Systems and Technology Architecture, Cisco Systems
Introduction to HA Technologies: SSO/NSF with GR and/or NSR. Ken Weissner / [email protected] Systems and Technology Architecture, Cisco Systems 1 That s a lot of acronyms Some definitions HA - High Availability
Network Virtualization with the Cisco Catalyst 6500/6800 Supervisor Engine 2T
White Paper Network Virtualization with the Cisco Catalyst 6500/6800 Supervisor Engine 2T Introduction Network virtualization is a cost-efficient way to provide traffic separation. A virtualized network
Broadband Networks. Prof. Karandikar. Department of Electrical Engineering. Indian Institute of Technology, Bombay. Lecture - 26
Broadband Networks Prof. Karandikar Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 26 Optical Network &MPLS So, as you were discussing in the previous lectures, next
MPLS Concepts. Overview. Objectives
MPLS Concepts Overview This module explains the features of Multi-protocol Label Switching (MPLS) compared to traditional ATM and hop-by-hop IP routing. MPLS concepts and terminology as well as MPLS label
Understanding Virtual Router and Virtual Systems
Understanding Virtual Router and Virtual Systems PAN- OS 6.0 Humair Ali Professional Services Content Table of Contents VIRTUAL ROUTER... 5 CONNECTED... 8 STATIC ROUTING... 9 OSPF... 11 BGP... 17 IMPORT
Department of Communications and Networking. S-38.2131/3133 Networking Technology, Laboratory course A/B
Department of Communications and Networking S-38.2131/3133 Networking Technology, Laboratory course A/B Work Number 38: MPLS-VPN Basics Student Edition Preliminary Exercises and Laboratory Assignments
GregSowell.com. Mikrotik Routing
Mikrotik Routing Static Dynamic Routing To Be Discussed RIP Quick Discussion OSPF BGP What is Routing Wikipedia has a very lengthy explanation http://en.wikipedia.org/wiki/routing In the context of this
MPLS - A Choice of Signaling Protocol
www.ijcsi.org 289 MPLS - A Choice of Signaling Protocol Muhammad Asif 1, Zahid Farid 2, Muhammad Lal 3, Junaid Qayyum 4 1 Department of Information Technology and Media (ITM), Mid Sweden University Sundsvall
Real-Time Traffic Engineering Management With Route Analytics
Real-Time Traffic Engineering Management With Route Analytics Executive Summary Increasing numbers of service providers and mobile operators are using RSVP-TE based traffic engineering to provide bandwidth
Protection Methods in Traffic Engineering MPLS Networks
Peter Njogu Kimani Protection Methods in Traffic Engineering MPLS Networks Helsinki Metropolia University of Applied Sciences Bachelor of Engineering Information technology Thesis 16 th May 2013 Abstract
MPLS-based Layer 3 VPNs
MPLS-based Layer 3 VPNs Overall objective The purpose of this lab is to study Layer 3 Virtual Private Networks (L3VPNs) created using MPLS and BGP. A VPN is an extension of a private network that uses
How To Understand The Benefits Of An Mpls Network
NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 Introduction MPLS in the Enterprise Multi-Protocol Label Switching (MPLS) as a technology has been around for over a decade
Multiprotocol Label Switching (MPLS)
Multiprotocol Label Switching (MPLS) รศ.ดร. อน นต ผลเพ ม Asso. Prof. Anan Phonphoem, Ph.D. [email protected] http://www.cpe.ku.ac.th/~anan Computer Engineering Department Kasetsart University, Bangkok, Thailand
Layer 3 Routing User s Manual
User s Manual Second Edition, July 2011 www.moxa.com/product 2011 Moxa Inc. All rights reserved. User s Manual The software described in this manual is furnished under a license agreement and may be used
Routing with OSPF. Introduction
Routing with OSPF Introduction The capabilities of an internet are largely determined by its routing protocol. An internet's scalability, its ability to quickly route around failures, and the consumption
Chapter 4. Distance Vector Routing Protocols
Chapter 4 Distance Vector Routing Protocols CCNA2-1 Chapter 4 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario.
Juniper Networks NorthStar Controller
Juniper Networks NorthStar Controller Functionality Test Report Introduction IP/MPLS has been the technology of choice for service providers for the better part of a decade and a half. Backbone network
How To Fix Bg Convergence On A Network With A Bg-Pic On A Bgi On A Pipo On A 2G Network
1 BGP Prefix Independent Convergence draft-rtgwg-bgp-pic-00 Authors :, Cisco Systems Presenter : Clarence Filsfils, Cisco Systems Pradosh Mohapatra, Cisco Systems IETF85, Nov/2012 Atlanta, USA 2 Agenda
Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS
Computer Network Architectures and Multimedia Guy Leduc Chapter 2 MPLS networks Chapter based on Section 5.5 of Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley,
How Routers Forward Packets
Autumn 2010 [email protected] MULTIPROTOCOL LABEL SWITCHING (MPLS) AND MPLS VPNS How Routers Forward Packets Process switching Hardly ever used today Router lookinginside the packet, at the ipaddress,
MPLS WAN Explorer. Enterprise Network Management Visibility through the MPLS VPN Cloud
MPLS WAN Explorer Enterprise Network Management Visibility through the MPLS VPN Cloud Executive Summary Increasing numbers of enterprises are outsourcing their backbone WAN routing to MPLS VPN service
PRASAD ATHUKURI Sreekavitha engineering info technology,kammam
Multiprotocol Label Switching Layer 3 Virtual Private Networks with Open ShortestPath First protocol PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Abstract This paper aims at implementing
IPv6 over IPv4/MPLS Networks: The 6PE approach
IPv6 over IPv4/MPLS Networks: The 6PE approach Athanassios Liakopoulos Network Operation & Support Manager ([email protected]) Greek Research & Technology Network (GRNET) III Global IPv6 Summit Moscow, 25
IxNetwork TM MPLS-TP Emulation
IxNetwork TM MPLS-TP Emulation Test the Functionality, Performance, and Scalability of an MPLS-TP Ingress, Egress, or Transit Node MPLS has come a long way since its original goal to allow core routers
Configuring a Load-Balancing Scheme
Configuring a Load-Balancing Scheme Last Updated: October 5, 2011 This module contains information about Cisco Express Forwarding and describes the tasks for configuring a load-balancing scheme for Cisco
Lecture 8: Routing I Distance-vector Algorithms. CSE 123: Computer Networks Stefan Savage
Lecture 8: Routing I Distance-vector Algorithms CSE 3: Computer Networks Stefan Savage This class New topic: routing How do I get there from here? Overview Routing overview Intra vs. Inter-domain routing
MPLS over IP-Tunnels. Mark Townsley Distinguished Engineer. 21 February 2005
MPLS over IP-Tunnels Mark Townsley Distinguished Engineer 21 February 2005 1 MPLS over IP The Basic Idea MPLS Tunnel Label Exp S TTL MPLS VPN Label Exp S TTL MPLS Payload (L3VPN, PWE3, etc) MPLS Tunnel
MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service
Nowdays, most network engineers/specialists consider MPLS (MultiProtocol Label Switching) one of the most promising transport technologies. Then, what is MPLS? Multi Protocol Label Switching (MPLS) is
Leveraging Advanced Load Sharing for Scaling Capacity to 100 Gbps and Beyond
Leveraging Advanced Load Sharing for Scaling Capacity to 100 Gbps and Beyond Ananda Rajagopal Product Line Manager Service Provider Solutions Foundry Networks [email protected] Agenda 2 Why Load
Disaster-Resilient Backbone and Access Networks
The Workshop on Establishing Resilient Life-Space in the Cyber-Physical Integrated Society, March. 17, 2015, Sendai, Japan Disaster-Resilient Backbone and Access Networks Shigeki Yamada ([email protected])
MPLS TE Technology Overview
C H A P T E R MPLS TE Technology Overview In this chapter, you review the following topics: MPLS TE Introduction Basic Operation of MPLS TE DiffServ-Aware Traffic Engineering Fast Reroute This chapter
MPLS Pseudowire Innovations: The Next Phase Technology for Today s Service Providers
MPLS Innovations: The Next Phase Technology for Today s Service Providers Introduction MPLS technology enables a smooth evolution of core networks within today s service provider infrastructures. In particular,
MPLS VPN Route Target Rewrite
The feature allows the replacement of route targets on incoming and outgoing Border Gateway Protocol (BGP) updates Typically, Autonomous System Border Routers (ASBRs) perform the replacement of route targets
Demonstrating the high performance and feature richness of the compact MX Series
WHITE PAPER Midrange MX Series 3D Universal Edge Routers Evaluation Report Demonstrating the high performance and feature richness of the compact MX Series Copyright 2011, Juniper Networks, Inc. 1 Table
Junos MPLS and VPNs (JMV)
Junos MPLS and VPNs (JMV) Course No: EDU-JUN-JMV Length: Five days Onsite Price: $32500 for up to 12 students Public Enrollment Price: $3500/student Course Level JMV is an advanced-level course. Prerequisites
DD2491 p1 2008. Load balancing BGP. Johan Nicklasson KTHNOC/NADA
DD2491 p1 2008 Load balancing BGP Johan Nicklasson KTHNOC/NADA Dual home When do you need to be dual homed? How should you be dual homed? Same provider. Different providers. What do you need to have in
Exterior Gateway Protocols (BGP)
Exterior Gateway Protocols (BGP) Internet Structure Large ISP Large ISP Stub Dial-Up ISP Small ISP Stub Stub Stub Autonomous Systems (AS) Internet is not a single network! The Internet is a collection
Virtual Subnet: A Scalable Cloud Data Center Interconnect Solution
Virtual Subnet: A Scalable Cloud Data Center Interconnect Solution draft-xu-virtual-subnet-06 Xiaohu Xu ([email protected]) IETF82, TAIWAN Why VM Mobility across Data Centers Data center maintenance Applications
MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre
The feature overcomes the requirement that a carrier support multiprotocol label switching (MPLS) by allowing you to provide MPLS connectivity between networks that are connected by IP-only networks. This
Juniper / Cisco Interoperability Tests. August 2014
Juniper / Cisco Interoperability Tests August 2014 Executive Summary Juniper Networks commissioned Network Test to assess interoperability, with an emphasis on data center connectivity, between Juniper
TechBrief Introduction
TechBrief Introduction Leveraging Redundancy to Build Fault-Tolerant Networks The high demands of e-commerce and Internet applications have required networks to exhibit the same reliability as the public
- Multiprotocol Label Switching -
1 - Multiprotocol Label Switching - Multiprotocol Label Switching Multiprotocol Label Switching (MPLS) is a Layer-2 switching technology. MPLS-enabled routers apply numerical labels to packets, and can
EVOLVING TO END-TO-END MPLS ARCHITECTURES Alcatel-Lucent Enables Seamless,
EVOLVING TO END-TO-END MPLS ARCHITECTURES Alcatel-Lucent Enables Seamless, Scalable, Resilient MPLS Networks TECHNICAL White Paper Increasing demand for video content, Mobile broadband and Cloud services
KT The Value Networking Company
KT The Value Networking Company IRIMS (Internet Routing Information Management System) 2005. 9 Y.D. KIM, G.E.KIM, C.K.Hwang, J.H.YOO (webman, gekim, ckhwang, styoo@kt kt.co..co.kr) Abstract An AS (Autonomous
Configuring a Load-Balancing Scheme
Configuring a Load-Balancing Scheme Finding Feature Information Configuring a Load-Balancing Scheme Last Updated: August 15, 2011 This module contains information about Cisco Express Forwarding and describes
Exercise 4 MPLS router configuration
Exercise 4 MPLS router configuration Computer Network Technologies and Services (CNTS) Tecnologie e Servizi di Rete (TSR) Preliminary note For this exercise you have to use the virtual routing laboratory.
TRILL for Data Center Networks
24.05.13 TRILL for Data Center Networks www.huawei.com enterprise.huawei.com Davis Wu Deputy Director of Switzerland Enterprise Group E-mail: [email protected] Tel: 0041-798658759 Agenda 1 TRILL Overview
Project Report on Traffic Engineering and QoS with MPLS and its applications
Project Report on Traffic Engineering and QoS with MPLS and its applications Brief Overview Multiprotocol Label Switching (MPLS) is an Internet based technology that uses short, fixed-length labels to
100Gigabit and Beyond: Increasing Capacity in IP/MPLS Networks Today Rahul Vir Product Line Manager Foundry Networks rvir@foundrynet.
100Gigabit and Beyond: Increasing Capacity in IP/MPLS Networks Today Rahul Vir Product Line Manager Foundry Networks [email protected] 1 Agenda 2 40GE/100GE Timeline to Standardization The Ethernet Alliance
ETHERNET VPN (EVPN) NEXT-GENERATION VPN FOR ETHERNET SERVICES
ETHERNET VPN (EVPN) NEXT-GENERATION VPN FOR ETHERNET SERVICES Alastair JOHNSON (AJ) February 2014 [email protected] AGENDA 1. EVPN Background and Motivation 2. EVPN Operations 3. EVPN
IP/MPLS-Based VPNs Layer-3 vs. Layer-2
Table of Contents 1. Objective... 3 2. Target Audience... 3 3. Pre-Requisites... 3 4. Introduction...3 5. MPLS Layer-3 VPNs... 4 6. MPLS Layer-2 VPNs... 7 6.1. Point-to-Point Connectivity... 8 6.2. Multi-Point
VPLS Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-10-30
Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of
Frame Mode MPLS Implementation
CHAPTER 4 Frame Mode MPLS Implementation Lab 4-1: Configuring Frame Mode MPLS (4.5.1) In this lab, you learn how to do the following: Configure EIGRP on a router. Configure LDP on a router. Change the
Redundancy & the Netnod Internet Exchange Points
Redundancy & the Netnod Internet Exchange Points The extent to which businesses and consumers use the Internet for critical communication has been recognised for over a decade. Since the rise of the commercial
Migrating to MPLS Technology and Applications
Migrating to MPLS Technology and Applications Serge-Paul Carrasco June 2003 asiliconvalleyinsider.com Table Of Content Why to migrate to MPLS? Congestion on the Internet Traffic Engineering MPLS Fundamentals
Protection And Restoration In MPLS Networks
Protection And Restoration In MPLS Networks An examination of the methods for protecting MPLS LSPs against failures of network resources Ed Harrison, [email protected] Ben Miller, [email protected] Adrian
Distance Vector Routing Protocols. Routing Protocols and Concepts Ola Lundh
Distance Vector Routing Protocols Routing Protocols and Concepts Ola Lundh Objectives The characteristics of distance vector routing protocols. The network discovery process of distance vector routing
MPLS Architecture for evaluating end-to-end delivery
International Journal of Scientific and Research Publications, Volume 2, Issue 11, November 2012 1 MPLS Architecture for evaluating end-to-end delivery Nikita Wadhera Lovely Professional University Abstract-
Link-State Routing Protocols
Link-State Routing Protocols Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Objectives Link-state routing protocol Single-area OSPF concepts Single-area OSPF
MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs
A Silicon Valley Insider MPLS VPN Services PW, VPLS and BGP MPLS/IP VPNs Technology White Paper Serge-Paul Carrasco Abstract Organizations have been demanding virtual private networks (VPNs) instead of
RFC 2547bis: BGP/MPLS VPN Fundamentals
White Paper RFC 2547bis: BGP/MPLS VPN Fundamentals Chuck Semeria Marketing Engineer Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2001 or 888 JUNIPER www.juniper.net
MPLS Concepts. MPLS Concepts
MPLS Concepts MPLS: Multi Protocol Label Switching MPLS is a layer 2+ switching MPLS forwarding is done in the same way as in VC (Virtual Circuit) switches Packet forwarding is done based on Labels MPLS
Design of MPLS networks VPN and TE with testing its resiliency and reliability
MASARYK UNIVERSITY FACULTY OF INFORMATICS Design of MPLS networks VPN and TE with testing its resiliency and reliability Diploma thesis Michal Aron Brno, spring 2014 ZADANIE DP Declaration I declare
Lecture 12: Link-state Routing"
Lecture 2: Link-state Routing" CSE 23: Computer Networks Alex C. Snoeren HW 3 due next Tuesday! Lecture 2 Overview" Routing overview Intra vs. Inter-domain routing Link-state routing protocols CSE 23 Lecture
Configuring Dual VPNs with Dual ISP Links Using ECMP Tech Note PAN-OS 7.0
Configuring Dual VPNs with Dual ISP Links Using ECMP Tech Note PAN-OS 7.0 Revision A 2015, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Use Case... 3 Equal Cost MultiPath (ECMP)...
Bell Aliant. Business Internet Border Gateway Protocol Policy and Features Guidelines
Bell Aliant Business Internet Border Gateway Protocol Policy and Features Guidelines Effective 05/30/2006, Updated 1/30/2015 BGP Policy and Features Guidelines 1 Bell Aliant BGP Features Bell Aliant offers
BGP Convergence in much less than a second Clarence Filsfils - [email protected]
BGP Convergence in much less than a second Clarence Filsfils - [email protected] 1 Down Convergence T1 Down Convergence T2 Default metric = 1 Src R R 20 F Dst Link L Assume a flow from Src to Dest T1: when
Relationship between SMP, ASON, GMPLS and SDN
Relationship between SMP, ASON, GMPLS and SDN With the introduction of a control plane in optical networks, this white paper describes the relationships between different protocols and architectures. Introduction
