Adapting MPLS Fast Reroute to Create Resilient Rings



Similar documents
How To Understand The Benefits Of An Mpls Network

H3C SR8800 RPR Technology White Paper

Multi Protocol Label Switching (MPLS) is a core networking technology that

Broadband Networks. Prof. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Mumbai.

Broadband Networks. Prof. Karandikar. Department of Electrical Engineering. Indian Institute of Technology, Bombay. Lecture - 26

MPLS Part II - Recovery

MPLS Quality of Service What Is It? Carsten Rossenhövel EANTC (European Advanced Networking Test Center)

The Keys for Campus Networking: Integration, Integration, and Integration

MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009

Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone

Designing Reliable IP/MPLS Core Transport Networks

Recovery Modeling in MPLS Networks

Innovation in Access and Metropolitan Area Networks -

MPLS TE Technology Overview

Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services. An Advanced Guide for VPLS and VLL

Fast Re-Route in IP/MPLS networks using Ericsson s IP Operating System

MPLS-TP. Future Ready. Today. Introduction. Connection Oriented Transport

IP/MPLS-Based VPNs Layer-3 vs. Layer-2

MPLS Pseudowire Innovations: The Next Phase Technology for Today s Service Providers

Industrial Ethernet How to Keep Your Network Up and Running A Beginner s Guide to Redundancy Standards

MPLS in Private Networks Is It a Good Idea?

Fast Reroute for Triple Play Networks

Migrating to MPLS Technology and Applications

Introducing Basic MPLS Concepts

Fast Reroute Techniques in MPLS Networks. George Swallow

Ring Protection: Wrapping vs. Steering

Carrier Ethernet: New Game Plan for Media Converters

Leveraging Advanced Load Sharing for Scaling Capacity to 100 Gbps and Beyond

Implementing Cisco Service Provider Next-Generation Edge Network Services **Part of the CCNP Service Provider track**

Multiprotocol Label Switching (MPLS)

MPLS Concepts. Overview. Objectives

Protection Methods in Traffic Engineering MPLS Networks

Addressing Inter Provider Connections With MPLS-ICI

Quality of Service for VoIP

Data Center Networking Designing Today s Data Center

MPLS - A Choice of Signaling Protocol

MPLS is the enabling technology for the New Broadband (IP) Public Network

Internetworking II: VPNs, MPLS, and Traffic Engineering

Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang AT&T

WHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January Introduction...

Protection And Restoration In MPLS Networks

Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks

D.R. Network Design. The Small College Version

Enhancing Converged MPLS Data Networks with ATM, Frame Relay and Ethernet Interworking

Supporting Transport Application in IP/MPLS Environments

Testing Edge Services: VPLS over MPLS

Resiliency in Ethernet Based Transport Networks

Introduction to MPLS and Traffic Engineering

Riverstone Networks. Carrier Ethernet Standards Progress. Igor Giangrossi Sr. Systems Engineer, CALA

An Introduction to Resilient Packet Ring Technology

White Paper: Carrier Ethernet

MPLS Basics. For details about MPLS architecture, refer to RFC 3031 Multiprotocol Label Switching Architecture.

Boosting Capacity Utilization in MPLS Networks using Load-Sharing MPLS JAPAN Sanjay Khanna Foundry Networks

Business Case for BTI Intelligent Cloud Connect for Content, Co-lo and Network Providers

Bandwidth Sharing with Primary Paths for Protection Routing in an MPLS Network

NAVAL POSTGRADUATE SCHOOL THESIS

Delivering MPLS VPLS VPN Services With Metro Service Edge Platform

Deploying Multiservice Applications Using RPR Over the Existing SONET Infrastructure

Using & Offering Wholesale Ethernet Network and Operational Considerations

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

OAM Operations Administration and Maintenance

PROTECTION ALGORITHMS FOR BANDWIDTH GUARANTEED CONNECTIONS IN MPLS NETWORKS WONG SHEK YOON

How To Make A Network Cable Reliable And Secure

IP/MPLS Networks for Public Safety

Meraki Stacking. White Paper

Solutions Guide. Resilient Networking with EPSR

John Ragan Director of Product Management. Billy Wise Communications Specialist

WDM Passive Optical Networks: Protection and Restoration

Reducing the Risk, Cost and Frequency of Production Stoppages Using Network Redundancy

Design of MPLS networks VPN and TE with testing its resiliency and reliability

Multi-Provider Ethernet Service Delivery

100Gigabit and Beyond: Increasing Capacity in IP/MPLS Networks Today Rahul Vir Product Line Manager Foundry Networks

MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans

EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE

Relationship between SMP, ASON, GMPLS and SDN

LoopStar 700. Next Generation Ethernet Access and Transport Solutions

SONET and DWDM: Competing Yet Complementary Technologies for The Metro Network

A simulation study of GELS for Ethernet over WAN

TRILL for Service Provider Data Center and IXP. Francois Tallet, Cisco Systems

VPLS Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date

MPLS L2VPN (VLL) Technology White Paper

RESILIENT NETWORK DESIGN

Virtual Private LAN Service (VPLS)

Failsafe Protection for Utility Critical Infrastructure

GMPLS Network Management: Challenges and Solutions

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling

Overview of Routing between Virtual LANs

ASON for Optical Networks

ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2

Use of MPLS in Mobile Backhaul Networks

QoS Implementation For MPLS Based Wireless Networks

Solutions Focus: IPTV

How To Use Connection-Oriented Ether (Coe) For Cloud Services

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider

Transcription:

Adapting LS Fast Reroute to Create Resilient Rings Ahmed Abdelhalim Foundry Networks www.mpls.jp Ring Topology: Multiple Scenarios, Multiple Technologies Backbone Backbone Access Cost effective design To be used when reducing fiber cost is paramount Access or backbone applications Multiple technologies evolved over the years FDDI SONET Ring APS / SDH Ring MSP Vendor proprietary ring resiliency for Ethernet rings IEEE 802.17 RPR 2

Goals of a Good Ring Resiliency Mechanism Highly survivable Distributed control with no single point of failure Sub-second resiliency Ideally sub-50 ms resiliency Provides traffic path optimization after link failure Scalable Can be easily applied/extended to multiple interconnected rings Provides protection to upper layer services: Routed services, VPN services, multicast-based services, etc. Efficient bandwidth use (spatial reuse) Simple to manage 3 Fast Reroute & Ring Topologies What Makes Rings Different? Fast Reroute mainly envisioned for rich meshed / partially meshed topologies Potential for several backup paths A ring topology does not offer rich connectivity. Only: Primary path in one direction Backup path has to be the other way around the ring An FRR implementation with reasonable adaptation can efficiently offer resiliency for ring-based topologies 4

Why LS Fast Reroute for Rings? Standards-based mechanism Well established in the industry Especially, for meshed topologies Inherent rapid traffic protection LS experiencing increasing popularity Increasing demand for LS-capable hardware Avoid running additional ring-specific resiliency mechanisms Simplify whenever/wherever possible 5 Which Flavor of FRR? Detour LSPs can easily allow for an implementation that offers automatic protection optimal forwarding paths under local repair and after path optimization By extension, automatic bypass tunnels can also be used for higher scalability Question: can FRR be used to efficiently provide ring protection? YES 6

Optimal Calculation of Backup Paths Around the Ring?? General Direction Legend CSPF should be used = ingress LER = egress LER = Protected LSP = Backup Path (detour/bypass) What may be a good heuristic for meshed topologies may not be good for rings For a mesh topology, trying to find a backup path that flows towards downstream nodes of the protected path may work well Yet for a ring, a backup path will have to flow in a direction opposite to the protected path Excluding upstream nodes/links may make sense for loop avoidance in a mesh topology Yet, upstream nodes/links must not be excluded for CSPF on a ring 7 Optimal Calculation of Backup Paths Around the Ring cont. Case A Case B X CSPF should optimize a detour (case B) to avoid awkward forwarding patterns (case A) in case of failure CSPF primary goal should be reaching, not merely merging at NHop/NNHop CSPF should be recursive in finding the optimal merge point (): NHop, NNHop, becomes the optimal merge point () for the detour Bypass tunnels with automatic calculation can offer the scalability of many-to-one protection Algorithm must create an optimized bypass tunnel for each group of LSPs targeting the same *! * To avoid the undesirable case A! 8

Reducing Overhead and Increasing Scalability In theory, an LSP spanning N nodes can result in N-1 detours/bypass tunnels (case A) Case A For detours, a ring offers many opportunities for straight forward detour merging E.g., at each, merge detours having same SESSION, SENDER_TELATE, outgoing interface, and next hop LSR* Merging can dramatically simplify the overall picture (case B) Reduce signaling, state, and cross connects Case B Legend Reduce to practically one large detour spanning all nodes involved = Merge Point * An example of path-specific merging 9 Reducing Overhead and Increasing Scalability cont. For bypass tunnels, many LSPs can be protected via the same bypass tunnel On a link, protected LSPs targeting the same can be mapped to one bypass tunnel All LSPs targeting on this link are protected by one common bypass tunnel 10

Ensuring Bandwidth Availability in Case of Failures Straight Forward Approach Rely on spare capacity engineered into the ring Do not request bandwidth protection for the detours/bypass tunnels It can mislead CSPF A Variant of Above: A Differentiated Services Approach Business traffic has higher priority than residential traffic In case of failure, when capacity is reduced, business traffic is guaranteed* a percentage of the capacity at the expense of residential traffic * Through traffic management / scheduling 11 Putting It All Together What is the End Result Here? PathErr Fault Fault Normal Condition Wrap Steer A plug-n-play resiliency mechanism All backup paths set up automatically Rapid, sub-50 ms traffic protection via local repair ring wrap Provides traffic path optimization after link failure Tunnel locally repaired notification causes to switch to the more optimal path ring steer Provides protection to all LS-based services: IP routing, pseudo-wire, VPLS, BGP/LS VPN, Combine with emerging LS OAM for improved visibility and manageability 12

Pros & Cons Pros Reduce network complexity One technology for enabling services, and offering resiliency Avoid excessive and confusing resiliency at different layers No lower layer technology operating in a ships in the night mode No need to worry about interaction between those layers Simplify training and operations No need to learn another L-2 mechanism like RPR, or RSTP, Operates on any LS capable hardware No need for additional costly hardware provisions Reduce TCO TCO k. Complexity More scalable and viable and than many would think Cons Requires set up of the LSPs not the backup paths For large number of nodes (N), N 2 in a worst case*: each node shares service instances with every other node An external tool, or mesh membership discovery can help rapidly set up those LSPs Each LSP requires maintaining state in the protected path direction, and its opposite direction * Classical LS problem. Not specific to the resiliency mechanism used * Using advertisement of membership in IGP (draft-ietf-ccamp-automesh) 13 Scoping the Viability of this Approach The Metro Network MTU Metro Ethernet Network Overlay Pseudowire H-VPLS BGP/LS VPN MTU Use VLAN H-VPLS Spoke (Q-in-Q / PW).1Q-based Multi-VRF Attractive solution for Metro Ethernet Networks Can be easily extended to span multiple rings Contrary to common perceptions, an optimized implementation can offer Well groomed signaling, paths, cross connects Optimized paths and backup paths Backup paths contained within their own rings simplifies manageability 14

Scoping the Viability of this Approach Beyond the Metro Network Metro Ethernet Network Backbone Metro Ethernet Network It is recommended to break up the LSP and resiliency domains Better manageability Allow for autonomous control within the different markets/regions Choice of backbone resiliency mechanism is independent of the metro May use same approach in case of rings Utilize emerging services that inherently support inter-domain connectivity MS-PW, BGP/LS VPN, inter-as VPLS 15 Summary LS Fast Reroute is a powerful and viable approach for providing ring resiliency Provides rapid protection and optimization equivalent to the well known Wrap then Steer behavior Can be set up with minimum effort using today s automatic detour/bypass tunnels Far scalable than many would think Simplify overall design and operation No need for an additional resiliency layer for handling ring resiliency No need for an additional OAM layer rely on LS OAM Reduce cost Many service providers invest in LS capable hardware to offer next generation services No need for special hardware designed specifically for addressing ring resiliency 16

Thank You!