MPLS Part II - Recovery



Similar documents
Recovery Modeling in MPLS Networks

A Hybrid Fault-Tolerant Algorithm for MPLS Networks. Maria Hadjiona, Chryssis Georgiou, Maria Papa, Vasos Vassiliou. University of Cyprus

Multiple Fault Tolerance in MPLS Network using Open Source Network Simulator

A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks

A Fast Path Recovery Mechanism for MPLS Networks

Comparison Analysis of Recovery Mechanism at MPLS Network

An Efficient Fault Tolerance Model for Path Recovery in MPLS Networks

PROTECTION ALGORITHMS FOR BANDWIDTH GUARANTEED CONNECTIONS IN MPLS NETWORKS WONG SHEK YOON

MPLS Traffic Engineering in ISP Network

Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang AT&T

Introducing Basic MPLS Concepts

Bandwidth Sharing with Primary Paths for Protection Routing in an MPLS Network

Network Design for Highly Available VoIP

Protection And Restoration In MPLS Networks

Multiprotocol Label Switching (MPLS)

Traffic protection in MPLS networks using an off-line flow optimization model

WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr Cisco Systems, Inc. All rights reserved.

RSVP- A Fault Tolerant Mechanism in MPLS Networks

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

MPLS Based Recovery Mechanisms

Multi Protocol Label Switching (MPLS) is a core networking technology that

Relationship between SMP, ASON, GMPLS and SDN

MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009

Fast Reroute Techniques in MPLS Networks. George Swallow

Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks

MPLS Basics. For details about MPLS architecture, refer to RFC 3031 Multiprotocol Label Switching Architecture.

MPLS TE Technology Overview

Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone

NAVAL POSTGRADUATE SCHOOL THESIS

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)

Project Report on Traffic Engineering and QoS with MPLS and its applications

IMPLEMENTING CISCO MPLS V3.0 (MPLS)

MPLS - A Choice of Signaling Protocol

A Hybrid Fault-Tolerant Algorithm for MPLS Networks

Object-Oriented Design and Implementation of Fault Management Function for MPLS network

New QOS Routing Algorithm for MPLS Networks Using Delay and Bandwidth Constraints

Cisco Configuring Basic MPLS Using OSPF

Bandwidth Management in MPLS Networks

Broadband Networks. Prof. Karandikar. Department of Electrical Engineering. Indian Institute of Technology, Bombay. Lecture - 26

MPLS Concepts. Overview. Objectives

Adapting MPLS Fast Reroute to Create Resilient Rings

Evaluating performance on an ISP MPLS network

MPLS Pseudowire Innovations: The Next Phase Technology for Today s Service Providers

Fast Re-Route in IP/MPLS networks using Ericsson s IP Operating System

Question 1. [7 points] Consider the following scenario and assume host H s routing table is the one given below:

H3C SR8800 RPR Technology White Paper

Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions

MPLS L2VPN (VLL) Technology White Paper

Building MPLS VPNs with QoS Routing Capability i

Policy-Based Fault Management for Integrating IP over Optical Networks

MENTER Overview. Prepared by Mark Shayman UMIACS Contract Review Laboratory for Telecommunications Science May 31, 2001

MPLS Environment. To allow more complex routing capabilities, MPLS permits attaching a

Path Selection Analysis in MPLS Network Based on QoS

Requirements for VoIP Header Compression over Multiple-Hop Paths (draft-ash-e2e-voip-hdr-comp-rqmts-01.txt)

MULTIPLE FAULT TOLERANCE IN MPLS NETWORK USING OPEN SOURCE NETWORK SIMULATOR

QoS Strategy in DiffServ aware MPLS environment

Quality of Service using Traffic Engineering over MPLS: An Analysis. Praveen Bhaniramka, Wei Sun, Raj Jain

Evolution of QoS routing in the Internet

A Network Recovery Scheme for Node or Link Failures using Multiple Routing Configurations

Offline path computation

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling

Multiple Layer Traffic Engineering in NTT Network Service

MPLS-TP. Future Ready. Today. Introduction. Connection Oriented Transport

IP Core Transport Network

November Defining the Value of MPLS VPNs

How To Provide Qos Based Routing In The Internet

Quality of Service for VoIP

QoS Implementation For MPLS Based Wireless Networks

Juniper Networks NorthStar Controller

IMPLEMENTING CISCO MPLS V2.3 (MPLS)

Enterprise Network Simulation Using MPLS- BGP

Master Course Computer Networks IN2097

HPSR 2002 Kobe, Japan. Towards Next Generation Internet. Bijan Jabbari, PhD Professor, George Mason University

Designing Reliable IP/MPLS Core Transport Networks

Lesson 13: MPLS Networks

End-to-End Dedicated Protection in Multi-Segment Optical Networks

ADAPTIVE RESOURCE ALLOCATION AND INTERNET TRAFFIC ENGINEERING ON DATA NETWORK

An Efficient Primary-Segmented Backup Scheme for Dependable Real-Time Communication in Multihop Networks

Network traffic engineering

OPNET simulation of voice over MPLS With Considering Traffic Engineering

Enhancing Converged MPLS Data Networks with ATM, Frame Relay and Ethernet Interworking

ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2

Implementing Cisco MPLS

Leveraging Advanced Load Sharing for Scaling Capacity to 100 Gbps and Beyond

Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1

Kingston University London

Chapter 10 Link-State Routing Protocols

Link Failure Recovery. for MPLS Networks with Multicasting

David Tipper Graduate Telecommunications and Networking Program. Telcom 2110 Network Design, Slides 11. WAN Network Design

Analysis of Link Utilization in MPLS Enabled Network using OPNET IT Guru

How To Understand The Benefits Of An Mpls Network

MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans

Transcription:

MPLS Part II - Recovery

Outline Introduction MPLS Recovery Framework MPLS Mechanism for Protection/Restoration Shared Backup LSP Restoration Fast reroute RSVP-TE Recovery A Heuristic Restoration Approach Analysis Simulations Comparison

Current Backbone Networks Protection Link layer protection (SONET/SDH) capable of service restoration within few tens of milliseconds The scope of the protection is limited, has no visibility into higher layer operations Layer 3 protection Routing protocol provide much greater flexibility restoration time in the order of seconds to minutes

Motivation: MPLS-Based Recovery MPLS is the lowest layer with the knowledge of the entire network topology MPLS provide necessary traffic engineering capabilities MPLS has desirable attributes when applied to the purpose of recovery for connectionless networks MPLS provide restoration times significantly shorter then the convergence times of IP routing protocols

1+1 (Dedicated) Protection

Link (vs Path) Protection Use an alternate detour if a link failed, or use a disjoint backup path (path protection)

Mesh Network Protection

Non-Dedicated Protection 1:1 Protection 1:N Protection

Path Mapping 1-to-1 Protection recovery path that is only to be used to recover that specific working path the recovery path can carry pre-emptable/low-priority traffic 1-to-n Protection n working paths are protected using only one recovery path As to backup bandwidth sharing, as long as the n working paths are disjoint (and hence at most one can fail at a time), their protection paths can share backup bandwidth on common links.

Model A LSP 2 B LSP 2 B LSP 2 B C LSP 1 B LSP 2 B D LSP 1 B LSP 1 B LSP 1 E F G LSP1 : E- F-G LSP2 : A- B LSP1 Backup : E-C-D-G LSP2 Backup : A-C-D-B

Restoration vs Protection Restoration the recovery path or path segments are created dynamically after the detection of a fault on the working path. (the recovery path is not pre- computed) Protection Switching In contrast to retoration, the recovery path is precomputed (but may not be pre-established).

Advantages & Disadvantages of Protection Simple and Quick: especailly if it uses 1+1 Do not require much extra process time, except to signal (set up) the switches along the pre-determined backup path (1:1 or 1:N) Usually can only recover from single link fault (what if the pre-computed path fails?) Inefficient usage of resource

Path Restoration Restoration Route can be computed after failure Link Restoration Path is discovered at the end nodes of the failed link More practical than path restoration Advantages & Disadvantages of Restoration Usually can recover from multiplex element faults More efficient usage of resource Complex Slow: require extra process time to setup path and reserve resource

Comparison between Protection & Restoration Characteristic: Protection -- the resource are reserved before the failure, they may be not used; Restoration -- the resource are reserved and used after the failure Route: Protection -- predetermined; Restoration -- can be dynamically computed Resource Efficiency: Protection -- Low; Restoration -- High

Comparison between Protection & Restoration (Cont ) Time used: Protection -- Short; Restoration -- Long Reliability: Protection -- mainly for single fault; Restoration -- can survive under multiplex faults Implementation: Protection -- Simple; Restoration -- Complex

Definitions and Terminology Path Switch LSR (PSL) The PSL is responsible for switching or replicating the traffic between the working path and the recovery path Normally chosen as the Ingress LSR or the nearest upstream LSR to the failure (link or node). Path Merge LSR (PML) The PML is responsible for receiving the recovery path traffic, and either merges the traffic back onto the working path, or, if it is itself the destination, passes the traffic on to the higher layer protocols Normally chosen as the Egress LSR

Definitions and Terminology Fault Indication Signal (FIS) A signal that indicates that a fault along a path has occurred. It is relayed by each intermediate LSR to its upstream or downstream neighbor, until it reaches the PSL Fault Recovery Signal (FIS) A signal that indicates a fault along a working path has been repaired.like the FIS,it is relayed by each intermediate LSR to its upstream or downstream neighbor, until is reaches the PSL

Fault Detection Link/Path Failure detected by a link probing mechanism (hello liveness message ) between neighbor LSRs Path failures can also be detected by Src/Dest (time-out, NAK etc) or by the Dest if 1+1 path protection is used. Path Degraded path has connectivity, but that the quality of the connection is unacceptable (e.g., high error bit rate, label mismatch or due to TTL errors). Need performance monitoring mechanisms. Link Degraded the link over which the working path is carried is performing below an acceptable level

Scope of Recovery Local Repair protect against a link or neighbor node fault and to minimize the amount of time required for failure propagation Fast but not optimized Global Repair the PSL is usually distant from the failure and needs to be notified by a FIS the recovery path can be made completely link and node disjoint with its working path slower than local repair

Post Recovery Operation When traffic is flowing on the recovery path, and the failure on the working path is repaired, one can Consider the recovery path as a new working path (Non-Revertive Mode) switch to the old working path (Revertive Mode) switch to a more preferred working path (make before break ----- RSVP TE Recovery)

Outline Introduction MPLS Recovery Framework MPLS Mechanism for Protection/Restoration Shared Backup LSP Restoration Fast reroute RSVP-TE Recovery A Heuristic Restoration Approach Analysis Simulations Comparison

MPLS-based Recovery Principles Configuration of Recovery Default-recovery (No MPLS-based recovery enabled) Recoverable (MPLS-based recovery enabled) Initiation of Path Setup Pre-established Pre Qualified Established-on-Demand Initiation of Resource Allocation Pre-reserved Reserved-on-Demand

MPLS Recovery Cycle Model Network Impairment Fault Detected Start of Notification Start of Recovery Operation Recovery Operation Complete Path Traffic Restored T1 T2 T3 T4 T5 T T1 Fault Detection Time T2 Hold-off Time T3 Notification Time T4 Recovery Operation Time T5 Traffic Restoration Time

Main Comparison Criteria Recovery Time the time required for a recovery path to be activated (and traffic flowing) after a fault Loss Recovery schemes may introduce a certain amount of packet loss during switchover to a recovery path. Backup Capacity : corresponding to ( Quality of Protection ) The capacity will be dependent on the traffic characteristics of the network, the particular protection plan selection algorithms as well as the signaling and re-routing methods. Re-ordering the action of putting traffic back on preferred paths might cause packet re-ordering State Overhead As the number of recovery paths in a protection plan grows, the state required to maintain them also grows

Outline Introduction MPLS Recovery Framework MPLS Mechanism for Protection/Restoration Shared Backup LSP Restoration Fast reroute RSVP-TE Recovery A Heuristic Restoration Approach Analysis Simulations Comparison

Shared Backup LSP Restoration links on the backup path can be shared between different active paths Single link failure restoration is guaranteed using only aggregate network usage information without requiring per-lsp routing information for all current active LSPs Aggregate information is obtainable by adding a few new information elements to the link state advertisement of a link state routing protocol like OSPF or ISIS

Model A LSP 2 B LSP 2 B LSP 2 B C LSP 1 B LSP 2 B D LSP 1 B LSP 1 B LSP 1 E F G LSP1 : E- F-G LSP2 : A- B LSP1 Backup : E-C-D-G LSP2 Backup : A-C-D-B

Algorithm With Aggregated For link (i,j) Partial Information the cumulative bandwidth allocated for active paths is A(i,j) the cumulative bandwidth allocated for backup paths is B(i,j) the residual bandwidth free for allocation is R(i,j)

Estimate the Additional Amt of Backup Bandwidth Needed (or link cost) For a request of bandwidth b the active path is calculated as the shortest path on the topology of links that have R(i,j) > b Let M be the max of the A values along the active path The backup path is calculated as follows. The cost of a link (u,v) is now taken as: 0 if { M+b < B(u,v) } else b if { B(u,v) <= M and b <= R(u,v) } else M+b - B(u,v) if { M <= B(u,v) and M+b <=B(u,v)+R(u,v) } else infinity in all other cases The backup path is calculated as the shortest path on the topology with the cost of links calculated as above

Fast Reroute Main Idea: reverse traffic at the point of failure of the protected LSP back to the source switch, where the traffic flow can be redirected Objective: provide a single failure protection with quick restoration comparable to the order of milliseconds Minimize the alternative path computation complexity and signaling requirements 1:1 protection and 1:N protection can be achieved

Fast Reroute Model 1:1 protection 24 46 12 LSR 2 LSR 4 LSR 6 67 31 53 75 13 35 57 LSR 1 LSR 3 LSR 5 LSR 7 From LSR 1 to LSR 7 LSR1: PSL, LSR7 : PML Working LSP: 13-35-57 alternative LSP: 53 31-12-24-46-67

Fast Reroute Model 1:N protection ( Using Label Stack ) 24 20 24 46 24 57 20 46 46 57 12 20 12 57 12 LSR 2 LSR 4 LSR 6 31 31 57 53 75 20 67 57 13 35 40 57 20 40 10 30 20 LSR 1 LSR 3 LSR 5 LSR 7 15 LSR 8 LSR 9

Restoration Shortcuts LSR B setup a shortcut alternative LSP Applied for Voice over IP service LSR D Source LSR A LSR B LSR C Destination

Pros. and Cons. Path computation complexity is greatly reduced both primary and alternative path computations can be localized at a single switch The amount of LSP setup signaling is minimized presence of traffic on the alternative segment path can be used as an FIS of the downstream primary path Data packets need reordering during the path rerouting process Less resource efficient (total length protection)

RSVP Detour To achieve timely detour path setup, using precomputed and pre- established detour path is essential for data traffic where packet loss is undesirable Detour decision must be made as close to the failure point as possible Ideal detour mechanism is to protect the entire LSP by establishing detour paths throughout the LSP To minimize the path computation overhead, it is desirable for the detour paths to merge back to the main LSP as soon as possible only protect unidirectional LSP

RSVP Detour Model detour ( Ingress,LSR2 ) Activate RSVP Tunnel (LSP) RSVP Detour (LSP) Ingress LSR 1 LSR 2 LSR 3 Egress

RSVP Extension Two new objects are defined to support LSP fast-reroute FAST_REROUTE object Setup (Holding) Priority: The priority of the detour with respect to taking(holding) resources Hop limit: The maximum number of extra hops the detour is allowed to take Bandwidth DETOUR object Source ID : IPv4 address identifying the beginning point of detour Downstream Node ID :IP address identifying the downstream node that source is trying to avoid

Make before break In general, it is highly desirable not to disrupt traffic, or adversely impact network operations while TE tunnel rerouting is in progress. This adaptive and smooth rerouting requirement necessitates establishing a new LSP tunnel and transferring traffic from the old LSP tunnel onto it before tearing down the old LSP tunnel The principle (implemented by RSVP Tunnel) applies not only in the case of failure but also when better routes are available than the existing ones.

Outline Introduction MPLS Recovery Framework MPLS Mechanism for Protection/Restoration Shared Backup LSP Restoration Fast reroute RSVP-TE Recovery A Heuristic Restoration Approach Analysis Simulations Comparison

Analysis Basic Idea Providing fault tolerance in MPLS networks based on the concept of domain protection In that domain, protection paths for all working paths that terminate in an egress router are calculated simultaneously The algorithm attempts to locate two trees in the domain such that no single link failure would disconnect a node form the root of the tree (the egress node) Permit the decoupling the protection path placement from the working path (much greater flexibility)

Analysis Conditions Assume MPLS domain represented by graph G(N,L) N is the set of n nodes L is the set of l links between the nodes Assume that graph G is two-edge redundant and therefore can be protected against any single link failure

Analysis Input : The MPLS domain D and the egress router e Output : two collections of protection path connecting ingress routers to egress router e Initialization: Find a spanning tree of graph G rooted in the egress router e. Let P be the set of nodes for which the protection paths have been established Initially it contains the egress router: p ={e}

Heuristic Algorithm Repeat until all nodes are protected (P=N): 1. Select one of the branches of the spanning tree attached to the egress node and mark all its nodes except for the egress node 2. Scan all marked nodes to find node i that has a link to an unmarked node j 3. Find a ring path consisting of the links of the spanning tree leading from e to i, the link between I and j, and the links of the spanning tree between j and e ( note that if j = e, this segment of the ring is empty )

Heuristic Algorithm (Cont.) 4. Place two ring paths along the ring: 1) one in clockwise, the other in counterclockwise direction 2) Merge the created protection paths with protection paths established in the previous iterations of the algorithm for the protected nodes that are now a part of the egress node 3) All nodes on the ring are added to p 5. Consider a new graph constructed by treating all nodes in P as a single node that will act as the egress node 6. Begin the subsequent iteration

Heuristic Model F 1. Find a branch C D E 2. Find node C has a link with an unmarked node D 3. construct the ring 4. All nodes on the ring are now a part of the egress node B A 5. Next iteration : Node F assume both node C and D as egress node, and setup the protection path respectively

Quality of a protection Scheme Finding optimal protection path The length of the protection path Indicate the delay of the traffic after a link failure Reflect the amount of the resources required to protect the domain The number of protection paths pre link Indicate the amount of resources (eg. Label table size, signalling overhead need to maintain the protection) Indicate that how well the protection paths are distributed throughout the network

Heuristic Decisions Spanning tree selection The protection paths are routed mostly along the branched of the spanning tree Try to find up a spanning tree with many short branches Using the Dijkstra s algorithm to calculate the shortest path spanning tree Finding the smallest possible ring Reduce the maximum and the average protection path lengths

Heuristic Decisions Example Find the short branch A-B-C (step 1) Comparison the length of the ring (step 2 &3) A-B-C-F selected Heuristic edge Decisions

Simulations Maximum length of protection paths for meshes Average length of protection paths for meshes

Simulations Number of protection paths per link for meshes Avg. number of protection paths per link for meshes

Comparison of MPLS Protection Schemes

Conclusion The scheme considers protection of all paths leading from ingress routers to a common egress router Protection using two paths allow for greater flexibility in protection path placement It provides the protection is better than Fast Reroute scheme The algorithmic complexity is less than that of RSVP Backup Tunnel while providing comparably good protection Unlike the FR and BT schemes, it guarantees independence of the working and protection path placement

MPLS Recovery Goals Using traffic engineering to optimal use of resources Aim to facilitate restoration times that are sufficiently fast for the end user application Aim to maximize network reliability and availability Aim to be applicable for protection of traffic at various granularities for a portion of the traffic on an individual path for all traffic on an individual path for all traffic on a group of paths Be applicable for segments or an entire end-to-end path

References Framework for MPLS-based recovery Vishal Sharma, Ben-Mack Crane, <Draft-ietf-mpls-recovery-framework-03>, July 2001 Extensions to RSVP-TE for MPLS Path Protection Ken Owens, Vishal Sharma <Draft-chang-mpls-path-protection-02>, July 2001 Shared Backup Label Switched Path Restoration Sriganesh Kini Murali Kodialam <Draft-kini-restoration-shared-backup-01>, May 2001 A Method for Setting an Alternative Label Switched Paths to Handle Fast Reroute Dimitry Haskin, Ram Krishnan <Draft-haskin-mpls-fast-reroute-05>, November 2000 A Method for MPLS LSP Fast-Reroute Using RSVP Detours Der-Hwa Gan, <Draft-gan-fast-reroute-00 > April 10, 2001 MPLS RSVP-TE Interoperability for Local Protection/Fast Reroute Alia Atlas,Curtis Villamizar <Draft-atlas-rsvp-local-protect-interop-01>, July 2001 A heuristic approach to service restoration in MPLS networks, in proc. Of the 2001 IEEE International Conference on Communications (ICC), Helsinki, Finland, June 2001