MPLS Part II - Recovery
|
|
|
- Brooke Allison
- 10 years ago
- Views:
Transcription
1 MPLS Part II - Recovery
2 Outline Introduction MPLS Recovery Framework MPLS Mechanism for Protection/Restoration Shared Backup LSP Restoration Fast reroute RSVP-TE Recovery A Heuristic Restoration Approach Analysis Simulations Comparison
3 Current Backbone Networks Protection Link layer protection (SONET/SDH) capable of service restoration within few tens of milliseconds The scope of the protection is limited, has no visibility into higher layer operations Layer 3 protection Routing protocol provide much greater flexibility restoration time in the order of seconds to minutes
4 Motivation: MPLS-Based Recovery MPLS is the lowest layer with the knowledge of the entire network topology MPLS provide necessary traffic engineering capabilities MPLS has desirable attributes when applied to the purpose of recovery for connectionless networks MPLS provide restoration times significantly shorter then the convergence times of IP routing protocols
5 1+1 (Dedicated) Protection
6 Link (vs Path) Protection Use an alternate detour if a link failed, or use a disjoint backup path (path protection)
7 Mesh Network Protection
8 Non-Dedicated Protection 1:1 Protection 1:N Protection
9 Path Mapping 1-to-1 Protection recovery path that is only to be used to recover that specific working path the recovery path can carry pre-emptable/low-priority traffic 1-to-n Protection n working paths are protected using only one recovery path As to backup bandwidth sharing, as long as the n working paths are disjoint (and hence at most one can fail at a time), their protection paths can share backup bandwidth on common links.
10 Model A LSP 2 B LSP 2 B LSP 2 B C LSP 1 B LSP 2 B D LSP 1 B LSP 1 B LSP 1 E F G LSP1 : E- F-G LSP2 : A- B LSP1 Backup : E-C-D-G LSP2 Backup : A-C-D-B
11 Restoration vs Protection Restoration the recovery path or path segments are created dynamically after the detection of a fault on the working path. (the recovery path is not pre- computed) Protection Switching In contrast to retoration, the recovery path is precomputed (but may not be pre-established).
12 Advantages & Disadvantages of Protection Simple and Quick: especailly if it uses 1+1 Do not require much extra process time, except to signal (set up) the switches along the pre-determined backup path (1:1 or 1:N) Usually can only recover from single link fault (what if the pre-computed path fails?) Inefficient usage of resource
13 Path Restoration Restoration Route can be computed after failure Link Restoration Path is discovered at the end nodes of the failed link More practical than path restoration Advantages & Disadvantages of Restoration Usually can recover from multiplex element faults More efficient usage of resource Complex Slow: require extra process time to setup path and reserve resource
14 Comparison between Protection & Restoration Characteristic: Protection -- the resource are reserved before the failure, they may be not used; Restoration -- the resource are reserved and used after the failure Route: Protection -- predetermined; Restoration -- can be dynamically computed Resource Efficiency: Protection -- Low; Restoration -- High
15 Comparison between Protection & Restoration (Cont ) Time used: Protection -- Short; Restoration -- Long Reliability: Protection -- mainly for single fault; Restoration -- can survive under multiplex faults Implementation: Protection -- Simple; Restoration -- Complex
16 Definitions and Terminology Path Switch LSR (PSL) The PSL is responsible for switching or replicating the traffic between the working path and the recovery path Normally chosen as the Ingress LSR or the nearest upstream LSR to the failure (link or node). Path Merge LSR (PML) The PML is responsible for receiving the recovery path traffic, and either merges the traffic back onto the working path, or, if it is itself the destination, passes the traffic on to the higher layer protocols Normally chosen as the Egress LSR
17 Definitions and Terminology Fault Indication Signal (FIS) A signal that indicates that a fault along a path has occurred. It is relayed by each intermediate LSR to its upstream or downstream neighbor, until it reaches the PSL Fault Recovery Signal (FIS) A signal that indicates a fault along a working path has been repaired.like the FIS,it is relayed by each intermediate LSR to its upstream or downstream neighbor, until is reaches the PSL
18 Fault Detection Link/Path Failure detected by a link probing mechanism (hello liveness message ) between neighbor LSRs Path failures can also be detected by Src/Dest (time-out, NAK etc) or by the Dest if 1+1 path protection is used. Path Degraded path has connectivity, but that the quality of the connection is unacceptable (e.g., high error bit rate, label mismatch or due to TTL errors). Need performance monitoring mechanisms. Link Degraded the link over which the working path is carried is performing below an acceptable level
19 Scope of Recovery Local Repair protect against a link or neighbor node fault and to minimize the amount of time required for failure propagation Fast but not optimized Global Repair the PSL is usually distant from the failure and needs to be notified by a FIS the recovery path can be made completely link and node disjoint with its working path slower than local repair
20 Post Recovery Operation When traffic is flowing on the recovery path, and the failure on the working path is repaired, one can Consider the recovery path as a new working path (Non-Revertive Mode) switch to the old working path (Revertive Mode) switch to a more preferred working path (make before break RSVP TE Recovery)
21 Outline Introduction MPLS Recovery Framework MPLS Mechanism for Protection/Restoration Shared Backup LSP Restoration Fast reroute RSVP-TE Recovery A Heuristic Restoration Approach Analysis Simulations Comparison
22 MPLS-based Recovery Principles Configuration of Recovery Default-recovery (No MPLS-based recovery enabled) Recoverable (MPLS-based recovery enabled) Initiation of Path Setup Pre-established Pre Qualified Established-on-Demand Initiation of Resource Allocation Pre-reserved Reserved-on-Demand
23 MPLS Recovery Cycle Model Network Impairment Fault Detected Start of Notification Start of Recovery Operation Recovery Operation Complete Path Traffic Restored T1 T2 T3 T4 T5 T T1 Fault Detection Time T2 Hold-off Time T3 Notification Time T4 Recovery Operation Time T5 Traffic Restoration Time
24 Main Comparison Criteria Recovery Time the time required for a recovery path to be activated (and traffic flowing) after a fault Loss Recovery schemes may introduce a certain amount of packet loss during switchover to a recovery path. Backup Capacity : corresponding to ( Quality of Protection ) The capacity will be dependent on the traffic characteristics of the network, the particular protection plan selection algorithms as well as the signaling and re-routing methods. Re-ordering the action of putting traffic back on preferred paths might cause packet re-ordering State Overhead As the number of recovery paths in a protection plan grows, the state required to maintain them also grows
25 Outline Introduction MPLS Recovery Framework MPLS Mechanism for Protection/Restoration Shared Backup LSP Restoration Fast reroute RSVP-TE Recovery A Heuristic Restoration Approach Analysis Simulations Comparison
26 Shared Backup LSP Restoration links on the backup path can be shared between different active paths Single link failure restoration is guaranteed using only aggregate network usage information without requiring per-lsp routing information for all current active LSPs Aggregate information is obtainable by adding a few new information elements to the link state advertisement of a link state routing protocol like OSPF or ISIS
27 Model A LSP 2 B LSP 2 B LSP 2 B C LSP 1 B LSP 2 B D LSP 1 B LSP 1 B LSP 1 E F G LSP1 : E- F-G LSP2 : A- B LSP1 Backup : E-C-D-G LSP2 Backup : A-C-D-B
28 Algorithm With Aggregated For link (i,j) Partial Information the cumulative bandwidth allocated for active paths is A(i,j) the cumulative bandwidth allocated for backup paths is B(i,j) the residual bandwidth free for allocation is R(i,j)
29 Estimate the Additional Amt of Backup Bandwidth Needed (or link cost) For a request of bandwidth b the active path is calculated as the shortest path on the topology of links that have R(i,j) > b Let M be the max of the A values along the active path The backup path is calculated as follows. The cost of a link (u,v) is now taken as: 0 if { M+b < B(u,v) } else b if { B(u,v) <= M and b <= R(u,v) } else M+b - B(u,v) if { M <= B(u,v) and M+b <=B(u,v)+R(u,v) } else infinity in all other cases The backup path is calculated as the shortest path on the topology with the cost of links calculated as above
30 Fast Reroute Main Idea: reverse traffic at the point of failure of the protected LSP back to the source switch, where the traffic flow can be redirected Objective: provide a single failure protection with quick restoration comparable to the order of milliseconds Minimize the alternative path computation complexity and signaling requirements 1:1 protection and 1:N protection can be achieved
31 Fast Reroute Model 1:1 protection LSR 2 LSR 4 LSR LSR 1 LSR 3 LSR 5 LSR 7 From LSR 1 to LSR 7 LSR1: PSL, LSR7 : PML Working LSP: alternative LSP:
32 Fast Reroute Model 1:N protection ( Using Label Stack ) LSR 2 LSR 4 LSR LSR 1 LSR 3 LSR 5 LSR 7 15 LSR 8 LSR 9
33 Restoration Shortcuts LSR B setup a shortcut alternative LSP Applied for Voice over IP service LSR D Source LSR A LSR B LSR C Destination
34 Pros. and Cons. Path computation complexity is greatly reduced both primary and alternative path computations can be localized at a single switch The amount of LSP setup signaling is minimized presence of traffic on the alternative segment path can be used as an FIS of the downstream primary path Data packets need reordering during the path rerouting process Less resource efficient (total length protection)
35 RSVP Detour To achieve timely detour path setup, using precomputed and pre- established detour path is essential for data traffic where packet loss is undesirable Detour decision must be made as close to the failure point as possible Ideal detour mechanism is to protect the entire LSP by establishing detour paths throughout the LSP To minimize the path computation overhead, it is desirable for the detour paths to merge back to the main LSP as soon as possible only protect unidirectional LSP
36 RSVP Detour Model detour ( Ingress,LSR2 ) Activate RSVP Tunnel (LSP) RSVP Detour (LSP) Ingress LSR 1 LSR 2 LSR 3 Egress
37 RSVP Extension Two new objects are defined to support LSP fast-reroute FAST_REROUTE object Setup (Holding) Priority: The priority of the detour with respect to taking(holding) resources Hop limit: The maximum number of extra hops the detour is allowed to take Bandwidth DETOUR object Source ID : IPv4 address identifying the beginning point of detour Downstream Node ID :IP address identifying the downstream node that source is trying to avoid
38 Make before break In general, it is highly desirable not to disrupt traffic, or adversely impact network operations while TE tunnel rerouting is in progress. This adaptive and smooth rerouting requirement necessitates establishing a new LSP tunnel and transferring traffic from the old LSP tunnel onto it before tearing down the old LSP tunnel The principle (implemented by RSVP Tunnel) applies not only in the case of failure but also when better routes are available than the existing ones.
39 Outline Introduction MPLS Recovery Framework MPLS Mechanism for Protection/Restoration Shared Backup LSP Restoration Fast reroute RSVP-TE Recovery A Heuristic Restoration Approach Analysis Simulations Comparison
40 Analysis Basic Idea Providing fault tolerance in MPLS networks based on the concept of domain protection In that domain, protection paths for all working paths that terminate in an egress router are calculated simultaneously The algorithm attempts to locate two trees in the domain such that no single link failure would disconnect a node form the root of the tree (the egress node) Permit the decoupling the protection path placement from the working path (much greater flexibility)
41 Analysis Conditions Assume MPLS domain represented by graph G(N,L) N is the set of n nodes L is the set of l links between the nodes Assume that graph G is two-edge redundant and therefore can be protected against any single link failure
42 Analysis Input : The MPLS domain D and the egress router e Output : two collections of protection path connecting ingress routers to egress router e Initialization: Find a spanning tree of graph G rooted in the egress router e. Let P be the set of nodes for which the protection paths have been established Initially it contains the egress router: p ={e}
43 Heuristic Algorithm Repeat until all nodes are protected (P=N): 1. Select one of the branches of the spanning tree attached to the egress node and mark all its nodes except for the egress node 2. Scan all marked nodes to find node i that has a link to an unmarked node j 3. Find a ring path consisting of the links of the spanning tree leading from e to i, the link between I and j, and the links of the spanning tree between j and e ( note that if j = e, this segment of the ring is empty )
44 Heuristic Algorithm (Cont.) 4. Place two ring paths along the ring: 1) one in clockwise, the other in counterclockwise direction 2) Merge the created protection paths with protection paths established in the previous iterations of the algorithm for the protected nodes that are now a part of the egress node 3) All nodes on the ring are added to p 5. Consider a new graph constructed by treating all nodes in P as a single node that will act as the egress node 6. Begin the subsequent iteration
45 Heuristic Model F 1. Find a branch C D E 2. Find node C has a link with an unmarked node D 3. construct the ring 4. All nodes on the ring are now a part of the egress node B A 5. Next iteration : Node F assume both node C and D as egress node, and setup the protection path respectively
46 Quality of a protection Scheme Finding optimal protection path The length of the protection path Indicate the delay of the traffic after a link failure Reflect the amount of the resources required to protect the domain The number of protection paths pre link Indicate the amount of resources (eg. Label table size, signalling overhead need to maintain the protection) Indicate that how well the protection paths are distributed throughout the network
47 Heuristic Decisions Spanning tree selection The protection paths are routed mostly along the branched of the spanning tree Try to find up a spanning tree with many short branches Using the Dijkstra s algorithm to calculate the shortest path spanning tree Finding the smallest possible ring Reduce the maximum and the average protection path lengths
48 Heuristic Decisions Example Find the short branch A-B-C (step 1) Comparison the length of the ring (step 2 &3) A-B-C-F selected Heuristic edge Decisions
49 Simulations Maximum length of protection paths for meshes Average length of protection paths for meshes
50 Simulations Number of protection paths per link for meshes Avg. number of protection paths per link for meshes
51 Comparison of MPLS Protection Schemes
52 Conclusion The scheme considers protection of all paths leading from ingress routers to a common egress router Protection using two paths allow for greater flexibility in protection path placement It provides the protection is better than Fast Reroute scheme The algorithmic complexity is less than that of RSVP Backup Tunnel while providing comparably good protection Unlike the FR and BT schemes, it guarantees independence of the working and protection path placement
53 MPLS Recovery Goals Using traffic engineering to optimal use of resources Aim to facilitate restoration times that are sufficiently fast for the end user application Aim to maximize network reliability and availability Aim to be applicable for protection of traffic at various granularities for a portion of the traffic on an individual path for all traffic on an individual path for all traffic on a group of paths Be applicable for segments or an entire end-to-end path
54 References Framework for MPLS-based recovery Vishal Sharma, Ben-Mack Crane, <Draft-ietf-mpls-recovery-framework-03>, July 2001 Extensions to RSVP-TE for MPLS Path Protection Ken Owens, Vishal Sharma <Draft-chang-mpls-path-protection-02>, July 2001 Shared Backup Label Switched Path Restoration Sriganesh Kini Murali Kodialam <Draft-kini-restoration-shared-backup-01>, May 2001 A Method for Setting an Alternative Label Switched Paths to Handle Fast Reroute Dimitry Haskin, Ram Krishnan <Draft-haskin-mpls-fast-reroute-05>, November 2000 A Method for MPLS LSP Fast-Reroute Using RSVP Detours Der-Hwa Gan, <Draft-gan-fast-reroute-00 > April 10, 2001 MPLS RSVP-TE Interoperability for Local Protection/Fast Reroute Alia Atlas,Curtis Villamizar <Draft-atlas-rsvp-local-protect-interop-01>, July 2001 A heuristic approach to service restoration in MPLS networks, in proc. Of the 2001 IEEE International Conference on Communications (ICC), Helsinki, Finland, June 2001
Recovery Modeling in MPLS Networks
Proceedings of the Int. Conf. on Computer and Communication Engineering, ICCCE 06 Vol. I, 9-11 May 2006, Kuala Lumpur, Malaysia Recovery Modeling in MPLS Networks Wajdi Al-Khateeb 1, Sufyan Al-Irhayim
A Hybrid Fault-Tolerant Algorithm for MPLS Networks. Maria Hadjiona, Chryssis Georgiou, Maria Papa, Vasos Vassiliou. University of Cyprus
Technical Report A Hybrid Fault-Tolerant Algorithm for MPLS Networks Maria Hadjiona, Chryssis Georgiou, Maria Papa, Vasos Vassiliou University of Cyprus Computer Science Department TR 07 06 December 2007
Multiple Fault Tolerance in MPLS Network using Open Source Network Simulator
Multiple Fault Tolerance in MPLS Network using Open Source Network Simulator Muhammad Kamran 1 and Adnan Noor Mian 2 Department of Computer Sciences, FAST- National University of Computer & Emerging Sciences,
A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks
A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks Mohammad HossienYaghmae Computer Department, Faculty of Engineering, Ferdowsi University of Mashhad, Mashhad, Iran [email protected]
A Fast Path Recovery Mechanism for MPLS Networks
A Fast Path Recovery Mechanism for MPLS Networks Jenhui Chen, Chung-Ching Chiou, and Shih-Lin Wu Department of Computer Science and Information Engineering Chang Gung University, Taoyuan, Taiwan, R.O.C.
Comparison Analysis of Recovery Mechanism at MPLS Network
International Journal of Electrical and Computer Engineering (IJECE) Vol.1, No.2, December 2011, pp. 151~160 ISSN: 2088-8708 151 Comparison Analysis of Recovery Mechanism at MPLS Network Mohammad Yanuar
An Efficient Fault Tolerance Model for Path Recovery in MPLS Networks
An Efficient Fault Tolerance Model for Path Recovery in MPLS Networks Arunkumar C K M.Tech student, Dept. of ECE, Dayananda Sagar College of Engineering, VTU, Banglore, India ABSTRACT: Increasing demand
PROTECTION ALGORITHMS FOR BANDWIDTH GUARANTEED CONNECTIONS IN MPLS NETWORKS WONG SHEK YOON
PROTECTION ALGORITHMS FOR BANDWIDTH GUARANTEED CONNECTIONS IN MPLS NETWORKS WONG SHEK YOON (B.Eng.(Hons), NUS) A THESIS SUBMITTED FOR THE DEGREE OF MASTER OF ENGINEERING DEPARTMENT OF ELECTRICAL & COMPUTER
MPLS Traffic Engineering in ISP Network
MPLS Traffic Engineering in ISP Network Mohsin Khan Birmingham City University, England ABSTRACT Multi Protocol Label Switching (MPLS) is an innovative and vibrant technology. The most famous applications
Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang [email protected] AT&T
Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang [email protected] AT&T 1 Outline! BGP/MPLS VPN (RFC 2547bis)! Setting up LSP for VPN - Design Alternative Studies! Interworking of LDP / RSVP
Introducing Basic MPLS Concepts
Module 1-1 Introducing Basic MPLS Concepts 2004 Cisco Systems, Inc. All rights reserved. 1-1 Drawbacks of Traditional IP Routing Routing protocols are used to distribute Layer 3 routing information. Forwarding
Bandwidth Sharing with Primary Paths for Protection Routing in an MPLS Network
Bandwidth Sharing with Primary Paths for Protection Routing in an MPLS Network Faisal Aslam, Saqib Raza and Zartash Afzal Uzmi Department of Computer Science Lahore University of Management Sciences, Pakistan
Network Design for Highly Available VoIP
Network Design for Highly Available VoIP David Tipper Associate Professor Department of Information Science and Telecommunications University of Pittsburgh [email protected] http://www.tele.pitt.edu/tipper.html
Protection And Restoration In MPLS Networks
Protection And Restoration In MPLS Networks An examination of the methods for protecting MPLS LSPs against failures of network resources Ed Harrison, [email protected] Ben Miller, [email protected] Adrian
Multiprotocol Label Switching (MPLS)
Multiprotocol Label Switching (MPLS) รศ.ดร. อน นต ผลเพ ม Asso. Prof. Anan Phonphoem, Ph.D. [email protected] http://www.cpe.ku.ac.th/~anan Computer Engineering Department Kasetsart University, Bangkok, Thailand
Traffic protection in MPLS networks using an off-line flow optimization model
Traffic protection in MPLS networks using an off-line flow optimization model A.E. Krzesinski and K.E. Müller Department of Computer Science University of Stellenbosch, 76 Stellenbosch, South Africa Phone:
WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr. 2006 Cisco Systems, Inc. All rights reserved.
MPLS WAN Topologies 1 Multiprotocol Label Switching (MPLS) IETF standard, RFC3031 Basic idea was to combine IP routing protocols with a forwarding algoritm based on a header with fixed length label instead
RSVP- A Fault Tolerant Mechanism in MPLS Networks
RSVP- A Fault Tolerant Mechanism in MPLS Networks S.Ravi Kumar, M.Tech(NN) Assistant Professor Gokul Institute of Technology And Sciences Piridi, Bobbili, Vizianagaram, Andhrapradesh. Abstract: The data
Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS
Computer Network Architectures and Multimedia Guy Leduc Chapter 2 MPLS networks Chapter based on Section 5.5 of Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley,
MPLS Based Recovery Mechanisms
MPLS Based Recovery Mechanisms Master Thesis Johan Martin Olof Petersson UNIVERSITY OF OSLO May 2005 2 Foreword This thesis is part of my Candidatus Scientiarum studies in communication systems at the
Multi Protocol Label Switching (MPLS) is a core networking technology that
MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson Abstract Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of
Relationship between SMP, ASON, GMPLS and SDN
Relationship between SMP, ASON, GMPLS and SDN With the introduction of a control plane in optical networks, this white paper describes the relationships between different protocols and architectures. Introduction
MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009
MikroTik RouterOS Introduction to MPLS Prague MUM Czech Republic 2009 Q : W h y h a v e n 't y o u h e a r d a b o u t M P LS b e fo re? A: Probably because of the availability and/or price range Q : W
Fast Reroute Techniques in MPLS Networks. George Swallow [email protected]
Fast Reroute Techniques in MPLS Networks George Swallow [email protected] Agenda What are your requirements? The solution space U-turns Traffic Engineering for LDP Traffic Engineering Some Observations
Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks
Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks Faiz Ahmed Electronic Engineering Institute of Communication Technologies, PTCL
MPLS Basics. For details about MPLS architecture, refer to RFC 3031 Multiprotocol Label Switching Architecture.
Multiprotocol Label Switching (), originating in IPv4, was initially proposed to improve forwarding speed. Its core technology can be extended to multiple network protocols, such as IPv6, Internet Packet
MPLS TE Technology Overview
C H A P T E R MPLS TE Technology Overview In this chapter, you review the following topics: MPLS TE Introduction Basic Operation of MPLS TE DiffServ-Aware Traffic Engineering Fast Reroute This chapter
Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone
International Journal of Computer Science and Telecommunications [Volume 5, Issue 6, June 2014] 9 ISSN 2047-3338 Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone Mushtaq
NAVAL POSTGRADUATE SCHOOL THESIS
NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS A PERFORMANCE ANALYSIS OF BGP/MPLS VPN FAILOVER FUNCTIONALITY by Guan Chye Tan December 2006 Thesis Advisor: Second Reader: Geoffrey Xie John Gibson
QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)
QoS Switching H. T. Kung Division of Engineering and Applied Sciences Harvard University November 4, 1998 1of40 Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p
Project Report on Traffic Engineering and QoS with MPLS and its applications
Project Report on Traffic Engineering and QoS with MPLS and its applications Brief Overview Multiprotocol Label Switching (MPLS) is an Internet based technology that uses short, fixed-length labels to
IMPLEMENTING CISCO MPLS V3.0 (MPLS)
IMPLEMENTING CISCO MPLS V3.0 (MPLS) COURSE OVERVIEW: Multiprotocol Label Switching integrates the performance and traffic-management capabilities of data link Layer 2 with the scalability and flexibility
MPLS - A Choice of Signaling Protocol
www.ijcsi.org 289 MPLS - A Choice of Signaling Protocol Muhammad Asif 1, Zahid Farid 2, Muhammad Lal 3, Junaid Qayyum 4 1 Department of Information Technology and Media (ITM), Mid Sweden University Sundsvall
A Hybrid Fault-Tolerant Algorithm for MPLS Networks
A Hybrid Fault-Tolerant Algorithm for MPLS Networks Maria Hadjiona, Chryssis Georgiou, Maria Papa, Vasos Vassiliou Department of Computer Science, University of Cyprus, CY 1678, Nicosia, Cyprus {cs02cm1,chryssis,cs03pm,vasosv}@cs.usy.ac.cy
Object-Oriented Design and Implementation of Fault Management Function for MPLS network
Object-Oriented Design and Implementation of Fault Management Function for MPLS network Sung-Jin Lim, Ryung-Min Kim, and Young-Tak Kim Advanced Networking Technology Lab. Dept. of Information & Communication
New QOS Routing Algorithm for MPLS Networks Using Delay and Bandwidth Constraints
New QOS Routing Algorithm for MPLS Networks Using Delay and Bandwidth Constraints Santosh Kulkarni 1, Reema Sharma 2,Ishani Mishra 3 1 Department of ECE, KSSEM Bangalore,MIEEE, MIETE & ISTE 2 Department
Cisco Configuring Basic MPLS Using OSPF
Table of Contents Configuring Basic MPLS Using OSPF...1 Introduction...1 Mechanism...1 Hardware and Software Versions...2 Network Diagram...2 Configurations...2 Quick Configuration Guide...2 Configuration
Bandwidth Management in MPLS Networks
School of Electronic Engineering - DCU Broadband Switching and Systems Laboratory 1/17 Bandwidth Management in MPLS Networks Sanda Dragos & Radu Dragos Supervised by Dr. Martin Collier email: [email protected]
Broadband Networks. Prof. Karandikar. Department of Electrical Engineering. Indian Institute of Technology, Bombay. Lecture - 26
Broadband Networks Prof. Karandikar Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 26 Optical Network &MPLS So, as you were discussing in the previous lectures, next
MPLS Concepts. Overview. Objectives
MPLS Concepts Overview This module explains the features of Multi-protocol Label Switching (MPLS) compared to traditional ATM and hop-by-hop IP routing. MPLS concepts and terminology as well as MPLS label
Adapting MPLS Fast Reroute to Create Resilient Rings
Adapting LS Fast Reroute to Create Resilient Rings Ahmed Abdelhalim Foundry Networks www.mpls.jp Ring Topology: Multiple Scenarios, Multiple Technologies Backbone Backbone Access Cost effective design
Evaluating performance on an ISP MPLS network
Evaluating performance on an ISP MPLS network Dilmohan Narula, Mauricio Rojasmartinez, Venkatachalapati Rayipati [email protected], [email protected], [email protected]
MPLS Pseudowire Innovations: The Next Phase Technology for Today s Service Providers
MPLS Innovations: The Next Phase Technology for Today s Service Providers Introduction MPLS technology enables a smooth evolution of core networks within today s service provider infrastructures. In particular,
Fast Re-Route in IP/MPLS networks using Ericsson s IP Operating System
Fast Re-Route in IP/MPLS networks using s IP Operating System Introduction: Today, Internet routers employ several routing protocols to exchange routes. As a router learns its potential routes, it builds
Question 1. [7 points] Consider the following scenario and assume host H s routing table is the one given below:
Computer Networks II Master degree in Computer Engineering Exam session: 11/02/2009 Teacher: Emiliano Trevisani Last name First name Student Identification number You are only allowed to use a pen and
H3C SR8800 RPR Technology White Paper
H3C 00 RPR Technology White Paper Keywords: RPR, IP ring network Abstract: Resilient Packet Ring (RPR) is an international standard for establishing IP ring networks, offering a highly efficient and reliable
Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions
Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions Steve Gennaoui, Jianhua Yin, Samuel Swinton, and * Vasil Hnatyshin Department of Computer Science Rowan University
MPLS L2VPN (VLL) Technology White Paper
MPLS L2VPN (VLL) Technology White Paper Issue 1.0 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
Building MPLS VPNs with QoS Routing Capability i
Building MPLS VPNs with QoS Routing Capability i Peng Zhang, Raimo Kantola Laboratory of Telecommunication Technology, Helsinki University of Technology Otakaari 5A, Espoo, FIN-02015, Finland Tel: +358
Policy-Based Fault Management for Integrating IP over Optical Networks
Policy-Based Fault Management for Integrating IP over Optical Networks Cláudio Carvalho 1, Edmundo Madeira 1, Fábio Verdi 2, and Maurício Magalhães 2 1 Institute of Computing (IC-UNICAMP) 13084-971 Campinas,
MENTER Overview. Prepared by Mark Shayman UMIACS Contract Review Laboratory for Telecommunications Science May 31, 2001
MENTER Overview Prepared by Mark Shayman UMIACS Contract Review Laboratory for Telecommunications Science May 31, 2001 MENTER Goal MPLS Event Notification Traffic Engineering and Restoration Develop an
MPLS Environment. To allow more complex routing capabilities, MPLS permits attaching a
MPLS Environment Introduction to MPLS Multi-Protocol Label Switching (MPLS) is a highly efficient and flexible routing approach for forwarding packets over packet-switched networks, irrespective of the
Path Selection Analysis in MPLS Network Based on QoS
Cumhuriyet Üniversitesi Fen Fakültesi Fen Bilimleri Dergisi (CFD), Cilt:36, No: 6 Özel Sayı (2015) ISSN: 1300-1949 Cumhuriyet University Faculty of Science Science Journal (CSJ), Vol. 36, No: 6 Special
Requirements for VoIP Header Compression over Multiple-Hop Paths (draft-ash-e2e-voip-hdr-comp-rqmts-01.txt)
Requirements for VoIP Header Compression over Multiple-Hop Paths (draft-ash-e2e-voip-hdr-comp-rqmts-01.txt) Jerry Ash AT&T [email protected] Bur Goode AT&T [email protected] Jim Hand AT&T [email protected] Raymond
MULTIPLE FAULT TOLERANCE IN MPLS NETWORK USING OPEN SOURCE NETWORK SIMULATOR
MULTIPLE FAULT TOLERANCE IN MPLS NETWORK USING OPEN SOURCE NETWORK SIMULATOR Muhammad Kamran FAST National University of Computer and Emerging Sciences, Lahore, Pakistan. [email protected] ABSTRACT Multiprotocol
QoS Strategy in DiffServ aware MPLS environment
QoS Strategy in DiffServ aware MPLS environment Teerapat Sanguankotchakorn, D.Eng. Telecommunications Program, School of Advanced Technologies Asian Institute of Technology P.O.Box 4, Klong Luang, Pathumthani,
Quality of Service using Traffic Engineering over MPLS: An Analysis. Praveen Bhaniramka, Wei Sun, Raj Jain
Praveen Bhaniramka, Wei Sun, Raj Jain Department of Computer and Information Science The Ohio State University 201 Neil Ave, DL39 Columbus, OH 43210 USA Telephone Number: +1 614-292-3989 FAX number: +1
Evolution of QoS routing in the Internet
Evolution of QoS routing in the Internet Olivier Bonaventure Dept. Computing Science and Engineering Université catholique de Louvain http://www.info.ucl.ac.be/people/obo June 4th, 2004 Page 1 Agenda Routing
A Network Recovery Scheme for Node or Link Failures using Multiple Routing Configurations
A Network Recovery Scheme for Node or Link Failures using Multiple Routing Configurations Suresh Babu Panatula Department of Computer Science and Engineering Sri Sai Aditya Institute of Science and Technology,
Offline path computation
Uni Innsbruck Informatik - Uni Innsbruck Informatik - 4 Internet Technology The inner network view, part 2 (C): MPLS Michael Welzl http://www.welzl.at DPS NSG Team http://dps.uibk.ac.at dps.uibk.ac.at/nsg
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification
Multiple Layer Traffic Engineering in NTT Network Service
Multi-layer traffic engineering in photonic-gmpls-router networks Naoaki Yamanaka, Masaru Katayama, Kohei Shiomoto, Eiji Oki and Nobuaki Matsuura * NTT Network Innovation Laboratories * NTT Network Service
MPLS-TP. Future Ready. Today. Introduction. Connection Oriented Transport
MPLS-TP Future Ready. Today Introduction As data traffic started dominating telecom networks, there was a need for transport data networks, as opposed to transport TDM networks. Traditional transport technologies
IP Core Transport Network
UDC 635.14:621.391 IP Core Transport Network VAkira Hakata VMasafumi Katoh VHaruo Yamashita VSatoshi Nojima (Manuscript received February 28, 2001) This paper proposes a next-generation IP core transport
November 2013. Defining the Value of MPLS VPNs
November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do
How To Provide Qos Based Routing In The Internet
CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this
Quality of Service for VoIP
Quality of Service for VoIP WCS November 29, 2000 John T. Chapman Cisco Distinguished Engineer Broadband Products and Solutions Course Number Presentation_ID 1999, Cisco Systems, Inc. 1 The QoS Matrix
QoS Implementation For MPLS Based Wireless Networks
QoS Implementation For MPLS Based Wireless Networks Subramanian Vijayarangam and Subramanian Ganesan Oakland University, Rochester, Michigan Abstract : Voice has been the primary application in wireless
Juniper Networks NorthStar Controller
Juniper Networks NorthStar Controller Functionality Test Report Introduction IP/MPLS has been the technology of choice for service providers for the better part of a decade and a half. Backbone network
IMPLEMENTING CISCO MPLS V2.3 (MPLS)
IMPLEMENTING CISCO MPLS V2.3 (MPLS) COURSE OVERVIEW: The course will enable learners to gather information from the technology basics to advanced VPN configuration. The focus of the course is on VPN technology
Enterprise Network Simulation Using MPLS- BGP
Enterprise Network Simulation Using MPLS- BGP Tina Satra 1 and Smita Jangale 2 1 Department of Computer Engineering, SAKEC, Chembur, Mumbai-88, India [email protected] 2 Department of Information Technolgy,
Master Course Computer Networks IN2097
Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for
HPSR 2002 Kobe, Japan. Towards Next Generation Internet. Bijan Jabbari, PhD Professor, George Mason University
HPSR 2002 Kobe, Japan Towards Next Generation Internet Bijan Jabbari, PhD Professor, George Mason University May 28, 2002 Overview! Scalability and Interoperability in Internet! Impediments in Deployment
Designing Reliable IP/MPLS Core Transport Networks
Designing Reliable IP/MPLS Core Transport Networks Matthias Ermel Workshop ITG FG 5.2.1 14. November 2008 München Content 1. Introduction 2. Protection Mechanisms 3. Failure Detection Page 1 Architecture
Lesson 13: MPLS Networks
Slide supporting material Lesson 13: MPLS Networks Giovanni Giambene Queuing Theor and Telecommunications: Networks and Applications 2nd edition, Springer All rights reserved IP Over ATM Once defined IP
End-to-End Dedicated Protection in Multi-Segment Optical Networks
End-to-End Dedicated Protection in Multi-Segment Optical Networks Srinivasan Seetharaman, Admela Jukan and Mostafa Ammar Georgia Institute of Technology, Atlanta, GA Email: {srini, ajukan, ammar}@cc.gatech.edu
ADAPTIVE RESOURCE ALLOCATION AND INTERNET TRAFFIC ENGINEERING ON DATA NETWORK
ADAPTIVE RESOURCE ALLOCATION AND INTERNET TRAFFIC ENGINEERING ON DATA NETWORK ABSTRACT Hatim Hussein Department of Electrical and Computer Engineering, George Mason University, Fairfax, Virginia, USA [email protected]
An Efficient Primary-Segmented Backup Scheme for Dependable Real-Time Communication in Multihop Networks
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 11, NO. 1, FEBRUARY 2003 81 An Efficient Primary-Segmented Backup Scheme for Dependable Real-Time Communication in Multihop Networks Krishna Phani Gummadi, Madhavarapu
Network traffic engineering
Toolbox, hybrid IP/MPLS optimisation method and fairness Research Unit in Networking EECS Department University of Liège 13 September 005 Outline 1 3 4 5 Outline MPLS principles 1 MPLS principles 3 4 5
OPNET simulation of voice over MPLS With Considering Traffic Engineering
Master Thesis Electrical Engineering Thesis no: MEE 10:51 June 2010 OPNET simulation of voice over MPLS With Considering Traffic Engineering KeerthiPramukh Jannu Radhakrishna Deekonda School of Computing
Enhancing Converged MPLS Data Networks with ATM, Frame Relay and Ethernet Interworking
TECHNOLOGY WHITE PAPER Enhancing Converged Data Networks with, Frame Relay and Ethernet Interworking Virtual Private Networks (VPN) are a popular way for enterprises to interconnect remote sites. Traditionally,
ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2
1 ISTANBUL 1.1 MPLS overview 1 1.1.1 Principle Use of a ATM core network 2 Overlay Network One Virtual Circuit per communication No routing protocol Scalability problem 2 1.1.1 Principle Weakness of overlay
Implementing Cisco MPLS
Implementing Cisco MPLS Course MPLS v2.3; 5 Days, Instructor-led Course Description This design document is for the refresh of the Implementing Cisco MPLS (MPLS) v2.3 instructor-led training (ILT) course,
Leveraging Advanced Load Sharing for Scaling Capacity to 100 Gbps and Beyond
Leveraging Advanced Load Sharing for Scaling Capacity to 100 Gbps and Beyond Ananda Rajagopal Product Line Manager Service Provider Solutions Foundry Networks [email protected] Agenda 2 Why Load
Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1
Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1 Gautam Chakrabarti Sandeep Kulkarni Department of Computer Science and Engineering Michigan State University Abstract To ensure uninterrupted
Kingston University London
Kingston University London Thesis Title Implementation and performance evaluation of WAN services over MPLS Layer-3 VPN Dissertation submitted for the Degree of Master of Science in Networking and Data
Chapter 10 Link-State Routing Protocols
Chapter 10 Link-State Routing Protocols CCNA2-1 Chapter 10 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario. Thanks
Link Failure Recovery. for MPLS Networks with Multicasting
Link Failure Recovery for MPLS Networks with Multicasting A Thesis Presented to the faculty of the School of Engineering and Applied Science University of Virginia In Partial Fulfillment of the requirements
David Tipper Graduate Telecommunications and Networking Program. Telcom 2110 Network Design, Slides 11. WAN Network Design
WAN - VPN Network Design David Tipper Graduate Telecommunications and Networking Program University it of Pittsburgh Telcom 2110 Network Design, Slides 11 WAN Network Design WAN typically have a mesh or
Analysis of Link Utilization in MPLS Enabled Network using OPNET IT Guru
Analysis of Link Utilization in MPLS Enabled Network using OPNET IT Guru Anupkumar M Bongale Assistant Professor Department of CSE MIT, Manipal Nithin N Assistant Professor Department of CSE MIT, Manipal
How To Understand The Benefits Of An Mpls Network
NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 Introduction MPLS in the Enterprise Multi-Protocol Label Switching (MPLS) as a technology has been around for over a decade
MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans
MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans Contents Overview 1 1. L2 VPN Padding Verification Test 1 1.1 Objective 1 1.2 Setup 1 1.3 Input Parameters 2 1.4 Methodology 2 1.5
