SlideShare une entreprise Scribd logo
1  sur  91
CORPORATE SERVICES
WWW.THECORPORATESERVICES.COM
CORPORATESERVICES@OUTLOOK.COM
MPLS Tutorial
Tutorial Outline
OverviewOverview
Label Encapsulations
Label Distribution Protocols
MPLS & ATM
Constraint Based Routing with CR-LDP
Summary
“Label Substitution” what is it?
•BROADCAST: Go everywhere, stop when you get to B, never ask for
directions.
•HOP BY HOP ROUTING: Continually ask who’s closer to B go there,
repeat … stop when you get to B.
“Going to B? You’d better go to X, its on the way”.
•SOURCE ROUTING: Ask for a list (that you carry with you) of places to
go that eventually lead you to B.
“Going to B? Go straight 5 blocks, take the next left, 6 more blocks and
take a right at the lights”.
One of the many ways of getting from A to B:
Label Substitution
•Have a friend go to B ahead of you using one of the
previous two techniques. At every road they reserve a
lane just for you. At ever intersection they post a big sign
that says for a given lane which way to turn and what new
lane to take.
LANE#1
LANE#2
LANE#1 TURN RIGHT USE LANE#2
A label by any other name ...
There are many examples of label substitution
protocols already in existence.
• ATM - label is called VPI/VCI and travels with cell.
• Frame Relay - label is called a DLCI and travels with frame.
• TDM - label is called a timeslot its implied, like a lane.
• X25 - a label is an LCN
• Proprietary PORS, TAG etc..
• One day perhaps Frequency substitution where label is a light
frequency?
SO WHAT IS MPLS ?
• Hop-by-hop or source routing
to establish labels
• Uses label native to the media
• Multi level label substitution transport
ROUTE AT EDGE, SWITCH IN CORE
IP ForwardingLABEL SWITCHINGIP Forwarding
IP IP #L1 IP #L2 IP #L3 IP
MPLS: HOW DOES IT WORK
UDP-Hello
UDP-Hello
TCP-open
TIME
TIME
Label request
IP
Label mapping
#L2
Initialization(s)
WHY MPLS ?
Leverage existing ATM hardware
Ultra fast forwarding
IP Traffic Engineering
 Constraint-based Routing
Virtual Private Networks
 Controllable tunneling mechanism
Voice/Video on IP
 Delay variation + QoS constraints
BEST OF BOTH WORLDS
PACKET
ROUTING
CIRCUIT
SWITCHING
•MPLS + IP form a middle ground that combines the best of
IP and the best of circuit switching technologies.
•ATM and Frame Relay cannot easily come to the middle
so IP has!!
MPLS
+IP
IP ATM
HYBRID
MPLS Terminology
• LDP: Label Distribution Protocol
• LSP: Label Switched Path
• FEC: Forwarding Equivalence Class
• LSR: Label Switching Router
• LER: Label Edge Router (Useful term not in standards)
Forwarding Equivalence Classes
•FEC = “A subset of packets that are all treated the same way by a router”
•The concept of FECs provides for a great deal of flexibility and scalability
•In conventional routing, a packet is assigned to a FEC at each hop (i.e. L3
look-up), in MPLS it is only done once at the network ingress
Packets are destined for different address prefixes, but can be
mapped to common path
Packets are destined for different address prefixes, but can be
mapped to common path
IP1
IP2
IP1
IP2
LSRLSR
LER LER
LSP
IP1 #L1
IP2 #L1
IP1 #L2
IP2 #L2
IP1 #L3
IP2 #L3
#216
#612
#5
#311
#14
#99
#963
#462
- A Vanilla LSP is actually part of a tree from
every source to that destination (unidirectional).
- Vanilla LDP builds that tree using existing IP
forwarding tables to route the control messages.
#963
#14
#99
#311
#311
#311
LABEL SWITCHED PATH (vanilla)
MPLS BUILT ON STANDARD IP
47.1
47.247.3
Dest Out
47.1 1
47.2 2
47.3 3
1
2
3
Dest Out
47.1 1
47.2 2
47.3 3
Dest Out
47.1 1
47.2 2
47.3 3
1
2
3
1
2
3
• Destination based forwarding tables as built by OSPF, IS-IS, RIP, etc.
IP FORWARDING USED BY HOP-BY-
HOP CONTROL
47.1
47.247.3
IP 47.1.1.1
Dest Out
47.1 1
47.2 2
47.3 3
1
2
3
Dest Out
47.1 1
47.2 2
47.3 3
1
2
1
2
3
IP 47.1.1.1
IP 47.1.1.1
IP 47.1.1.1
Dest Out
47.1 1
47.2 2
47.3 3
Intf
In
Label
In
Dest Intf
Out
3 0.40 47.1 1
Intf
In
Label
In
Dest Intf
Out
Label
Out
3 0.50 47.1 1 0.40
MPLS Label Distribution
47.1
47.247.3
1
2
3
1
2
1
2
3
3
Intf
In
Dest Intf
Out
Label
Out
3 47.1 1 0.50 Mapping: 0.40
Request: 47.1
Mapping: 0.50
Request: 47.1
Label Switched Path (LSP)
Intf
In
Label
In
Dest Intf
Out
3 0.40 47.1 1
Intf
In
Label
In
Dest Intf
Out
Label
Out
3 0.50 47.1 1 0.40
47.1
47.247.3
1
2
3
1
2
1
2
3
3Intf
In
Dest Intf
Out
Label
Out
3 47.1 1 0.50
IP 47.1.1.1
IP 47.1.1.1
#216
#14
#462
- ER-LSP follows route that source chooses. In
other words, the control message to establish
the LSP (label request) is source routed.
#972
#14 #972
A
B
C
Route=
{A,B,C}
EXPLICITLY ROUTED OR ER-LSP
Intf
In
Label
In
Dest Intf
Out
3 0.40 47.1 1
Intf
In
Label
In
Dest Intf
Out
Label
Out
3 0.50 47.1 1 0.40
47.1
47.247.3
1
2
3
1
2
1
2
3
3
Intf
In
Dest Intf
Out
Label
Out
3 47.1.1 2 1.33
3 47.1 1 0.50
IP 47.1.1.1
IP 47.1.1.1
EXPLICITLY ROUTED LSP ER-LSP
ER LSP - advantages
•Operator has routing flexibility (policy-based,
QoS-based)
•Can use routes other than shortest path
•Can compute routes based on constraints in
exactly the same manner as ATM based on
distributed topology database.
(traffic engineering)
ER LSP - discord!
•Two signaling options proposed in the standards:
CR-LDP, RSVP extensions:
— CR-LDP = LDP + Explicit Route
— RSVP ext = Traditional RSVP + Explicit Route +
Scalability Extensions
•Not going to be resolved any time soon, market
will probably have to resolve it.
•Survival of the fittest not such a bad thing.
Tutorial Outline
Overview
Label EncapsulationsLabel Encapsulations
Label Distribution Protocols
MPLS & ATM
Constraint Based Routing with CR-LDP
Summary
Label Encapsulation
ATM FR Ethernet PPP
MPLS Encapsulation is specified over various media
types. Top labels may use existing format, lower
label(s) use a new “shim” label format.
VPI VCI DLCI “Shim Label”
L2
Label
“Shim Label” …….
IP | PAYLOAD
MPLS Link Layers
•MPLS is intended to run over multiple link layers
•Specifications for the following link layers currently exist:
• ATM: label contained in VCI/VPI field of ATM header
• Frame Relay: label contained in DLCI field in FR header
• PPP/LAN: uses ‘shim’ header inserted between L2 and L3 headers
Translation between link layers types must be supported
MPLS intended to be “multi-protocol” below as well as aboveMPLS intended to be “multi-protocol” below as well as above
MPLS Encapsulation - ATM
ATM LSR constrained by the cell format imposed by existing ATM standardsATM LSR constrained by the cell format imposed by existing ATM standards
VPI PT CLP HEC
5 Octets
ATM Header
Format VCI
AAL5 Trailer
•••
Network Layer Header
and Packet (eg. IP)
1n
AAL 5 PDU Frame (nx48 bytes)
Generic Label Encap.
(PPP/LAN format)
ATM
SAR
ATM Header
ATM Payload • • •
• Top 1 or 2 labels are contained in the VPI/VCI fields of ATM header
- one in each or single label in combined field, negotiated by LDP
• Further fields in stack are encoded with ‘shim’ header in PPP/LAN format
- must be at least one, with bottom label distinguished with ‘explicit NULL’
• TTL is carried in top label in stack, as a proxy for ATM header (that lacks TTL)
48 Bytes
48 Bytes
Label LabelOption 1
Option 2 Combined Label
Option 3 LabelATM VPI (Tunnel)
MPLS Encapsulation - Frame Relay
•••n 1
DLCI
C/
R
E
A
DLCI
FE
CN
BE
CN
D
E
E
A
Q.922
Header
Generic Encap.
(PPP/LAN Format) Layer 3 Header and Packet
DLCI Size = 10, 17, 23 Bits
• Current label value carried in DLCI field of Frame Relay header
• Can use either 2 or 4 octet Q.922 Address (10, 17, 23 bytes)
• Generic encapsulation contains n labels for stack of depth n
- top label contains TTL (which FR header lacks), ‘explicit NULL’ label value
MPLS Encapsulation - PPP & LAN Data Links
Label Exp. S TTL
Label: Label Value, 20 bits (0-16 reserved)
Exp.: Experimental, 3 bits (was Class of Service)
S: Bottom of Stack, 1 bit (1 = last entry in label stack)
TTL: Time to Live, 8 bits
Layer 2 Header
(eg. PPP, 802.3)
•••
Network Layer Header
and Packet (eg. IP)
4 Octets
MPLS ‘Shim’ Headers (1-n)
1n
• Network layer must be inferable from value of bottom label of the stack
• TTL must be set to the value of the IP TTL field when packet is first labelled
• When last label is popped off stack, MPLS TTL to be copied to IP TTL field
• Pushing multiple labels may cause length of frame to exceed layer-2 MTU
- LSR must support “Max. IP Datagram Size for Labelling” parameter
- any unlabelled datagram greater in size than this parameter is to be fragmented
MPLS on PPP links and LANs uses ‘Shim’ Header Inserted
Between Layer 2 and Layer 3 Headers
MPLS on PPP links and LANs uses ‘Shim’ Header Inserted
Between Layer 2 and Layer 3 Headers
Label Stack
Entry Format
Tutorial Outline
Overview
Label Encapsulations
Label Distribution ProtocolsLabel Distribution Protocols
MPLS & ATM
IETF Status
Nortel’s Activity
Summary
Label Distribution Protocols
Overview of Hop-by-hop & Explicit
Label Distribution Protocol (LDP)
Constraint-based Routing LDP (CR-LDP)
Extensions to RSVP
Extensions to BGP
Comparison - Hop-by-Hop vs. Explicit Routing
Hop-by-Hop Routing Explicit Routing
•Source routing of control traffic
•Builds a path from source to dest
•Requires manual provisioning, or
automated creation mechanisms.
•LSPs can be ranked so some reroute
very quickly and/or backup paths may
be pre-provisioned for rapid restoration
•Operator has routing flexibility (policy-
based, QoS-based,
•Adapts well to traffic engineering
•Distributes routing of control traffic
•Builds a set of trees either fragment
by fragment like a random fill, or
backwards, or forwards in organized
manner.
•Reroute on failure impacted by
convergence time of routing protocol
•Existing routing protocols are
destination prefix based
•Difficult to perform traffic
engineering, QoS-based routing
Explicit routing shows great promise for traffic engineeringExplicit routing shows great promise for traffic engineering
Explicit Routing - MPLS vs. Traditional Routing
•Connectionless nature of IP implies that routing is based on information in
each packet header
•Source routing is possible, but path must be contained in each IP header
•Lengthy paths increase size of IP header, make it variable size, increase
overhead
•Some gigabit routers require ‘slow path’ option-based routing of IP packets
•Source routing has not been widely adopted in IP and is seen as impractical
•Some network operators may filter source routed packets for security
reasons
•MPLS’s enables the use of source routing by its connection-oriented
capabilities
- paths can be explicitly set up through the network
- the ‘label’ can now represent the explicitly routed path
•Loose and strict source routing can be supported
MPLS makes the use of source routing in the Internet practicalMPLS makes the use of source routing in the Internet practical
Label Distribution Protocols
Overview of Hop-by-hop & Explicit
Label Distribution Protocol (LDP)
Constraint-based Routing LDP (CR-LDP)
Extensions to RSVP
Extensions to BGP
Label Distribution Protocol (LDP) - Purpose
Label distribution ensures that adjacent routers have
a common view of FEC <-> label bindings
Routing Table:
Addr-prefix Next Hop
47.0.0.0/8 LSR2
Routing Table:
Addr-prefix Next Hop
47.0.0.0/8 LSR2
LSR1 LSR2 LSR3
IP Packet 47.80.55.3
Routing Table:
Addr-prefix Next Hop
47.0.0.0/8 LSR3
Routing Table:
Addr-prefix Next Hop
47.0.0.0/8 LSR3
For 47.0.0.0/8
use label ‘17’
Label Information Base:
Label-In FEC Label-Out
17 47.0.0.0/8 XX
Label Information Base:
Label-In FEC Label-Out
17 47.0.0.0/8 XX
Label Information Base:
Label-In FEC Label-Out
XX 47.0.0.0/8 17
Label Information Base:
Label-In FEC Label-Out
XX 47.0.0.0/8 17
Step 1: LSR creates binding
between FEC and label value
Step 2: LSR communicates
binding to adjacent LSR
Step 3: LSR inserts label
value into forwarding base
Common understanding of which FEC the label is referring to!
Label distribution can either piggyback on top of an existing routing protocol,
or a dedicated label distribution protocol (LDP) can be created
Label distribution can either piggyback on top of an existing routing protocol,
or a dedicated label distribution protocol (LDP) can be created
Label Distribution - Methods
LSR1 LSR2
Label Distribution can take place using one of two possible methodsLabel Distribution can take place using one of two possible methods
Downstream Label Distribution
Label-FEC Binding
• LSR2 and LSR1 are said to have an “LDP
adjacency” (LSR2 being the downstream LSR)
• LSR2 discovers a ‘next hop’ for a particular FEC
• LSR2 generates a label for the FEC and
communicates the binding to LSR1
• LSR1 inserts the binding into its forwarding tables
• If LSR2 is the next hop for the FEC, LSR1 can use
that label knowing that its meaning is understood
LSR1 LSR2
Downstream-on-Demand Label Distribution
Label-FEC Binding
• LSR1 recognizes LSR2 as its next-hop for an FEC
• A request is made to LSR2 for a binding between
the FEC and a label
• If LSR2 recognizes the FEC and has a next hop for
it, it creates a binding and replies to LSR1
• Both LSRs then have a common understanding
Request for Binding
Both methods are supported, even in the same network at the same time
For any single adjacency, LDP negotiation must agree on a common method
#963
#14
#99
#311
#311
#311
DOWNSTREAM MODE MAKING SPF
TREE COPY IN H/W
#462
D
#311
D
#963
D
#14 D
#99
D
#216
D
#612 D
#5 D
#963
#14
#99
#311
#311
#311
DOWNSTREAM ON DEMAND
MAKING SPF TREE COPY IN H/W
#462
D
#311
D
#963
D#14 D
#99
D
#216
D
#612 D
#5 D
D?
D? D?
D?
D?
D?
D?
D?
Distribution Control: Ordered v. Independent
Independent LSP ControlIndependent LSP Control Ordered LSP ControlOrdered LSP Control
Next Hop
(for FEC)
Outgoing
Label
Incoming
Label
MPLS path forms as associations
are made between FEC next-hops
and incoming and outgoing labels
• Each LSR makes independent decision on when to
generate labels and communicate them to
upstream peers
• Communicate label-FEC binding to peers once
next-hop has been recognized
• LSP is formed as incoming and outgoing labels are
spliced together
• Label-FEC binding is communicated to peers if:
- LSR is the ‘egress’ LSR to particular FEC
- label binding has been received from
upstream LSR
• LSP formation ‘flows’ from egress to ingress
DefinitionDefinition
ComparisonComparison • Labels can be exchanged with less delay
• Does not depend on availability of egress node
• Granularity may not be consistent across the nodes
at the start
• May require separate loop detection/mitigation
method
• Requires more delay before packets can be
forwarded along the LSP
• Depends on availability of egress node
• Mechanism for consistent granularity and freedom
from loops
• Used for explicit routing and multicast
Both methods are supported in the standard and can be fully interoperable
#963
#14
#99
#311
#311
#311
INDEPENDENT MODE
#462
D
#311
D
#963
D
#14 D
#99
D
#216
D
#612 D
#5 D
Label Retention Methods
LSR1
LSR2
LSR3
LSR4
LSR5
Binding
for LSR5
Binding for LSR5
Binding
for LSR5An LSR may receive label
bindings from multiple LSRs
Some bindings may come
from LSRs that are not the
valid next-hop for that FEC
Liberal Label Retention Conservative Label Retention
LSR1
LSR2
LSR3
LSR4
Label Bindings
for LSR5
Valid
Next Hop
LSR4’s Label
LSR3’s Label
LSR2’s Label
LSR1
LSR2
LSR3
LSR4
Label Bindings
for LSR5
Valid
Next Hop
LSR4’s Label
LSR3’s Label
LSR2’s Label
• LSR maintains bindings received from LSRs
other than the valid next hop
• If the next-hop changes, it may begin using
these bindings immediately
• May allow more rapid adaptation to routing
changes
• Requires an LSR to maintain many more
labels
• LSR only maintains bindings received from
valid next hop
• If the next-hop changes, binding must be
requested from new next hop
• Restricts adaptation to changes in routing
• Fewer labels must be maintained by LSR
Label Retention method trades off between label capacity and speed of adaptation to routing changes
LIBERAL RETENTION MODE
#462
D
#311
D
#963
D
#14 D
#99
D
#216
D
#612 D
#5 D
#422
D
#622 D
These labels are kept
incase they are needed
after a failure.
CONSERVATIVE RETENTION MODE
#462
D
#311
D
#963
D
#14 D
#99
D
#216
D
#612 D
#5 D
#422
D
#622 D
These labels are
released the moment
they are received.
LDP - STATUS
•Gone to last call
•Multi Vendor interoperability
demonstrated for DSOD on OC-3/ATM by
(Nortel Networks & Cisco) at Interop/99
•Source code for these PDUs publicly
available: www.NortelNetworks.com/mpls
Label Distribution Protocols
Overview of Hop-by-hop & Explicit
Label Distribution Protocol (LDP)
Constraint-based Routing LDP (CR-LDP)
Extensions to RSVP
Constraint-based LSP Setup using LDP
Uses LDP Messages (request, map, notify)
Shares TCP/IP connection with LDP
Can coexist with vanilla LDP and inter-work with it,
or can exist as an entity on its own
Introduces additional data to the vanilla LDP
messages to signal ER, and other “Constraints”
ER-LSP Setup using CR-LDP
LSR B LSR C LER DLER A
ER Label
Switched Path
Ingress Egress
4. Label mapping
message originates.
3. Request message
terminates.
2. Request message processed
and next node determined.
Path list modified to <C,D>
1. Label Request message. It
contains ER path < B,C,D>
5. LSR C receives label to
use for sending data to LER
D. Label table updated
6. When LER A
receives label mapping,
the ER established.
#216
#14
#612
#5
#311
#462
- It is possible to take a vanilla LDP label request
let it flow vanilla to the edge of the core, insert
an ER hop list at the core boundary at which
point it is CR-LDP to the far side of the core.
A
B
C
LDP CR-LDP
#99
INSERT ER{A,B,C}
LDP/CR-LDP INTERWORKING
Basic LDP Message additions
LSPID: A unique tunnel identifier within an MPLS
network.
ER: An explicit route, normally a list of IPV4
addresses to follow (source route) the label request
message.
Resource Class (Color): to constrain the route to only
links of this Color. Basically a 32 bit mask used for
constraint based computations.
Traffic Parameters: similar to ATM call setup, which
specify treatment and reserve resources.
Length
Peak Data Rate (PDR)
Peak Burst Size (PBS)
Committed Data Rate (CDR)
Committed Burst Size (CBS)
Excess Burst Size (EBS)
Traf. Param. TLVU F
Reserved WeightFrequencyFlags
Flags control “negotiability” of
parameters
Frequency constrains the variable
delay that may be introduced
Weight of the CRLSP in the
“relative share”
Peak rate (PDR+PBS) maximum
rate at which traffic should be sent
to the CRLSP
Committed rate (CDR+CBS) the
rate that the MPLS domain
commits to be available to the
CRLSP
Excess Burst Size (EBS) to
measure the extent by which the
traffic sent on a CRLSP exceeds
the committed rate
32 bit fields are short IEEE floating point
numbers
Any parameter may be used or not used by
selecting appropriate values
CR-LDP Traffic Parameters
CRLSP characteristics not edge functions
The approach is like diff-serv’s separation of PHB
from Edge
The parameters describe the “path behavior” of the
CRLSP, i.e. the CRLSP’s characteristics
Dropping behavior is not signaled
 Dropping may be controlled by DS packet markings
CRLSP characteristics may be combined with edge
functions (which are undefined in CRLDP) to create
services
 Edge functions can perform packet marking
 Example services are in an appendix
Peak rate
The maximum rate at which traffic should be sent to
the CRLSP
Defined by a token bucket with parameters
 Peak data rate (PDR)
 Peak burst size (PBS)
Useful for resource allocation
If a network uses the peak rate for resource
allocation then its edge function should regulate the
peak rate
May be unused by setting PDR or PBS or both to
positive infinity
Committed rate
The rate that the MPLS domain commits to be
available to the CRLSP
Defined by a token bucket with parameters
 Committed data rate (CDR)
 Committed burst size (CBS)
Committed rate is the bandwidth that should be
reserved for the CRLSP
CDR = 0 makes sense; CDR = +∞ less so
CBS describes the burstiness with which traffic may
be sent to the CRLSP
Excess burst size
Measure the extent by which the traffic sent on a
CRLSP exceeds the committed rate
Defined as an additional limit on the committed
rate’s token bucket
Can be useful for resource reservation
If a network uses the excess burst size for resource
allocation then its edge function should regulate the
parameter and perhaps mark or drop packets
EBS = 0 and EBS = +∞ both make sense
Frequency
 Specifies how frequently the committed rate should be given to CRLSP
 Defined in terms of “granularity” of allocation of rate
 Constrains the variable delay that the network may introduce
 Constrains the amount of buffering that a LSR may use
 Values:
 Very frequently: no more than one packet may be buffered
 Frequently: only a few packets may be buffered
 Unspecified: any amount of buffering is acceptable
Weight
Specifies the CRLSP’s weight in the “realtive share
algorithm”
Implied but not stated:
 CRLSPs with a larger weight get a bigger relative share of the “excess
bandwidth”
Values:
 0 — the weight is not specified
 1-255 — weights; larger numbers are larger weights
The definition of “relative share” is network specific
Negotiation flags
F1F2F3F4F5F6Res
PDRNegotiationFlag
PBSNegotiationFlag
CDRNegotiationFlag
CBSNegotiationFlag
EBSNegotiationFlag
WeightNegotiationFlag If a parameter is flagged as negotiable
then LSRs may replace the parameter
value with a smaller value in the label
request message. LSRs descover the
negotiated values in the label mapping
message.
Label request - possible
downward negotiation
Label mapping -
no negotiation
CR-LDP PREEMPTION
A CR-LSP carries an LSP priority. This
priority can be used to allow new LSPs to
bump existing LSPs of lower priority in
order to steal their resources.
This is especially useful during times of
failure and allows you to rank the LSPs
such that the most important obtain
resources before less important LSPs.
These are called the setupPriority and a
holdingPriority and 8 levels are provided.
CR-LDP PREEMPTION
When an LSP is established its
setupPriority is compared with the
holdingPriority of existing LSPs, any with
lower holdingPriority may be bumped to
obtain their resources.
This process may continue in a domino
fashion until the lowest holdingPriority
LSPs either clear or are on the worst
routes.
#216
#14
#462
#972
A
B
C
Route=
{A,B,C}
PREEMPTION A.K.A. BUMPING
TOPOLOGY DB FOR BUMPINGLOW PRI
HIGH PRI Topology Database sees 8 levels of bandwidth, depending on
the setup priority of the LSP, a subset of that bandwidth is
seen as available.
The highest priority sees all bandwidth used and free at
levels lower that it, etc. to the lowest priority which only sees
unused bandwidth.
CR-LDP Status
Going through last call
Demonstrated Interoperability Nov/98
Nortel Networks, Ericson, GDC
Extensions to CR-LDP now being proposed for:
Bandwidth Adjustment (AT&T)
Multicast ….
Source code for these PDUs publicly available:
www.NortelNetworks.com/mpls
Label Distribution Protocols
Overview of Hop-by-hop & Explicit
Label Distribution Protocol (LDP)
Constraint-based Routing LDP (CR-LDP)
Extensions to RSVP
ER-LSP setup using RSVP
LSR B LSR C LER DLER A
1. Path message. It contains
ER path < B,C,D>
2. New path state. Path
message sent to next node
3. Resv message originates.
Contain the label to use and the
required traffic/QoS para.
4. New reservation state.
Resv message propagated
upstream
5. When LER A
receives Resv, the ER
established.
Per-hop Path and
Resv refresh unless
suppressed
Per-hop Path and
Resv refresh unless
suppressed
Per-hop Path and
Resv refresh unless
suppressed
Tutorial Outline
Overview
Label Encapsulations
Label Distribution Protocols
MPLS & ATMMPLS & ATM
Constraint Based Routing with CR-LDP
Summary
MPLS & ATM
Various Modes of Operation
 Label-Controlled ATM
 Tunneling Through ATM
 Ships in the night with ATM
ATM Merge
 VC Merge
 VP Merge
MPLS & ATM
Several Models for running MPLS on ATM:
1. Label-Controlled ATM:
• Use ATM hardware for label switching
• Replace ATM Forum SW by IP/MPLS
IP Routing
MPLS
ATM HW
Label-Controlled ATM
• Label switching is used to forward network-layer packets
• It combines the fast, simple forwarding technique of ATM with network layer
routing and control of the TCP/IP protocol suite
IP Packet 17
IP Packet 05
B
A
D
C
Forwarding
Table
B 17 C 05
•
•
•
Port
Label Switching Router
Forwarding
Table
Network Layer
Routing
(eg. OSPF, BGP4)
Label
Packets forwarded
by swapping short,
fixed length labels
(I.e. ATM technique)
Packets forwarded
by swapping short,
fixed length labels
(I.e. ATM technique)
Switched path topology
formed using network
layer routing
(I.e. TCP/IP technique)
Switched path topology
formed using network
layer routing
(I.e. TCP/IP technique)
Label
ATM Label Switching is the combination of L3 routing and L2 ATM switchingATM Label Switching is the combination of L3 routing and L2 ATM switching
2. MPLS Over ATM
MPLS
ATM Network
MPLS
L
S
R
L
S
R
VCVP
Two Models
Internet Draft:
VCID notification over ATM Link
3. Ships in the Night
 ATM Forum and MPLS control planes both run on the same
hardware but are isolated from each other, i.e. they do not
interact.
 This allows a single device to simultaneously operate as both an
MPLS LSR and an ATM switch.
 Important for migrating MPLS into an ATM network
ATM
SW
L
S
R ATM
MPLS
ATM
SW
L
S
R
Ships in the night Requirements
Resource Management
 VPI.VCI Space Partitioning
 Traffic management
 Bandwidth Reservation
 Admission Control
 Queuing & Scheduling
 Shaping/Policing
 Processing Capacity
Bandwidth Management
• Bandwidth GuaranteesBandwidth Guarantees
• FlexibilityFlexibility
A.A. Full SharingFull Sharing
PortCapacityPortCapacity
Pool 1Pool 1
•MPLSMPLS
•ATMATM
MPLSMPLS
ATMATM
AvailableAvailable
B. Protocol PartitionB. Protocol Partition
Pool 2Pool 2
•50%50%
•rt-VBRrt-VBR
Pool 1Pool 1
•50%50%
•ATMATM
MPLSMPLS
ATMATM
AvailableAvailable
AvailableAvailable
C. Service PartitionC. Service Partition
Pool 2Pool 2
•50%50%
•nrt-VBRnrt-VBR
•COS1COS1
Pool 1Pool 1
•50%50%
•rt-VBRrt-VBR
•COS2COS2
MPLSMPLS
ATMATM
AvailableAvailable
MPLSMPLS
ATMATM
AvailableAvailable
ATM Merge
Multipoint-to-point capability
Motivation
 Stream Merge to achieve scalability in MPLS:
 O(n) VCs with Merge as opposed to O(n2
) for full mesh
 less labels required
 Reduce number of receive VCs on terminals
Alternatives
 Frame-based VC Merge
 Cell-based VP Merge
Stream Merge
111
2 2 2
3 3
111
2 2 2
3 3
Input cell streams
Input cell streams
in out
1
2
3
7
6
9
1
2
3
7
7
7
in out
Non-VC merging (Nin--Nout)
VC merging (Nin-1out)
7 7 7 7 7 777
6 7 9 6 7 79 6
7 7 7 7 7 77
No Cell Interleaving
7
AAL5 Cell Interleaving Problem
VC-Merge: Output Module
Merge
Reassembly buffers
Output buffer
VP-Merge
VPI=3
VPI=2
VCI=1
VPI=1
VCI=2
VCI=3
VCI=1
VCI=2
VCI=3
–merge multiple VPs into one VP
–use separate VCIs within VPs to distinguish frames
–less efficient use of VPI/VCI space, needs support of SVP
No Cell Interleaving Problem
Since VCI is unique
Option 1: Dynamic VCI Mapping
Option 2: Root
Assigned VCI
Tutorial Outline
Overview
Label Encapsulations
Label Distribution Protocols
MPLS & ATM
Constraint Based Routing with CR-
LDP
SummarySummary
- IP will over-utilize best paths and under-utilize
less good paths.
Dest=a.b.c.d
Dest=a.b.c.d
Dest=a.b.c.d
IP FOLLOWS A TREE TO DESTINATION
#216
#14
#612
#5 #99 #311
#963
#462
- Ultra fast, simple forwarding a.k.a switching
- Follows same route as normal IP datapath
- So like IP, LDP will over-utilize best paths and
under-utilize less good paths.
HOP-BY-HOP(A.K.A Vanilla) LDP
Two types of Label Switched Paths:
• Hop by hop (“Vanilla” LDP)
• Explicit Routing (LDP+”ER”)
#18
#427
#819
#216
#14
#612
#5 #99 #311
#963
#462
#77
Label Switched Path (Two Types)
• CR = “Constraint” based “Routing”
• eg: USE: (links with sufficient resources AND
(links of type “someColor”) AND
(links that have delay less than 200 ms)
&&
=
CR-LDP
1) A topology database that knows about link attributes.
2) A label distribution protocol that goes where it’s told.
z
{a,b,c}
ANSWER: OSPF/ISIS + attribs{a,b,c}
zmyx
ANSWER: LDP + Explicit Route{x,y,m,z}
z
{a,b,c}
Pieces Required for Constraint Based Routing
• Overview
• Label Encapsulations
• Label Distribution Protocols
• MPLS & ATM
• Constraint Based Routing with CR-LDP
• SummarySummary
Tutorial Outline
Summary of Motivations for MPLS
• Simplified forwarding based on exact match of fixed length label
- initial drive for MPLS was based on existance of cheap, fast ATM switches
• Separation of routing and forwarding in IP networks
- facilitates evolution of routing techniques by fixing the forwarding method
- new routing functionality can be deployed without changing the forwarding
techniques of every router in the Internet
• Facilitates the integration of ATM and IP
- allows carriers to leverage their large investment of ATM equipment
- eliminates the adjacency problem of VC-mesh over ATM
•Enables the use of explicit routing/source routing in IP networks
- can be easily used for such things as traffic management, QoS routing
•Promotes the partitioning of functionality within the network
- move granular processing of packets to edge; restrict core to packet forwarding
- assists in maintaining scalability of IP protocols in large networks
•Improved routing scalability through stacking of labels
- removes the need for full routing tables from interior routers in transit domain;
only routes to border routers are required
•Applicability to both cell and packet link-layers
- can be deployed on both cell (eg. ATM) and packet (eg. FR, Ethernet) media
- common management and techniques simplifies engineering
Many drivers exist for MPLS above and beyond high speed forwardingMany drivers exist for MPLS above and beyond high speed forwarding
IP and ATM Integration
IP over ATM VCsIP over ATM VCs
• ATM cloud invisible to Layer 3 Routing
• Full mesh of VCs within ATM cloud
• Many adjacencies between edge routers
• Topology change generates many route updates
• Routing algorithm made more complex
• ATM network visible to Layer 3 Routing
• Singe adjacency possible with edge router
• Hierachical network design possible
• Reduces route update traffic and power
needed to process them
IP over MPLSIP over MPLS
MPLS eliminates the “n-squared” problem of IP over ATM VCsMPLS eliminates the “n-squared” problem of IP over ATM VCs
Traffic Engineering
A
B C
D
Traffic engineering is the process of mapping traffic demand onto a networkTraffic engineering is the process of mapping traffic demand onto a network
Demand
Network
Topology
Purpose of traffic engineering:
• Maximize utilization of links and nodes throughout the network
• Engineer links to achieve required delay, grade-of-service
• Spread the network traffic across network links, minimize impact of single failure
• Ensure available spare link capacity for re-routing traffic on failure
• Meet policy requirements imposed by the network operator
Traffic engineering key to optimizing cost/performance
Traffic Engineering Alternatives
Current methods of traffic engineering:
Manipulating routing metrics
Use PVCs over an ATM backbone
Over-provision bandwidth
Difficult to manage
Not scalable
Not economical
MPLS combines benefits of ATM and IP-layer traffic engineering
Chosen by routing protocol
(least cost)
Chosen by Traffic Eng.
(least congestion)
Example Network:
MPLS provides a new method to do traffic engineering (traffic steering)
Ingress node
explicitly routes
traffic over
uncongested path
Potential benefits of MPLS for traffic engineering:
- allows explicitly routed paths
- no “n-squared” problem
- per FEC traffic monitoring
- backup paths may be configured
operator control
scalable
granularity of feedback
redundancy/restoration
Congested Node
MPLS Traffic Engineering Methods
• MPLS can use the source routing capability to steer traffic on desired path
• Operator may manually configure these in each LSR along the desired path
- analogous to setting up PVCs in ATM switches
• Ingress LSR may be configured with the path, RSVP used to set up LSP
- some vendors have extended RSVP for MPLS path set-up
• Ingress LSR may be configured with the path, LDP used to set up LSP
- many vendors believe RSVP not suited
• Ingress LSR may be configured with one or more LSRs along the desired path,
hop-by-hop routing may be used to set up the rest of the path
- a.k.a loose source routing, less configuration required
• If desired for control, route discovered by hop-by-hop routing can be frozen
- a.k.a “route pinning”
• In the future, constraint-based routing will offload traffic engineering tasks from
the operator to the network itself
MPLS: Scalability Through Routing Hierarchy
BR1
BR2
BR3
BR4
TR1 TR2
TR3TR4
AS1
AS2 AS3
• Border routers BR1-4 run an EGP, providing inter-domain routing
• Interior transit routers TR1-4 run an IGP, providing intra-domain routing
• Normal layer 3 forwarding requires interior routers to carry full routing tables
- transit router must be able to identify the correct destination ASBR (BR1-4)
• Carrying full routing tables in all routers limits scalability of interior routing
- slower convergence, larger routing tables, poorer fault isolation
• MPLS enables ingress node to identify egress router, label packet based on interior route
• Interior LSRs would only require enough information to forward packet to egress
Ingress router
receives packet
Ingress router
receives packet
Packet labelled
based on
egress router
Packet labelled
based on
egress router
Forwarding in the interior
based on IGP route
Forwarding in the interior
based on IGP route
Egress border
router pops
label and fwds.
Egress border
router pops
label and fwds.
MPLS increases scalability by partitioning exterior routing from interior routing
MPLS: Partitioning Routing and Forwarding
Routing
Forwarding
OSPF, IS-IS, BGP, RIP
MPLS
Forwarding Table
Based on:
Classful Addr. Prefix?
Classless Addr. Prefix?
Multicast Addr.?
Port No.?
ToS Field?
Based on:
Exact Match on Fixed Length Label
• Current network has multiple forwarding paradigms
- class-ful longest prefix match (Class A,B,C boundaries)
- classless longest prefix match (variable boundaries)
- multicast (exact match on source and destination)
- type-of-service (longest prefix. match on addr. + exact match on ToS)
• As new routing methods change, new route look-up algorithms are required
- introduction of CIDR
• Next generation routers will be based on hardware for route look-up
- changes will require new hardware with new algorithm
• MPLS has a consistent algorithm for all types of forwarding; partitions routing/fwding
- minimizes impact of the introduction of new forwarding methods
MPLS introduces flexibility through consistent forwarding paradigmMPLS introduces flexibility through consistent forwarding paradigm
Upper Layer Consistency Across Link Layers
Ethernet PPP
(SONET, DS-3 etc.)
ATM Frame
Relay
• MPLS is “multiprotocol” below (link layer) as well as above (network layer)
• Provides for consistent operations, engineering across multiple technologies
• Allows operators to leverage existing infrastructure
• Co-existence with other protocols is provided for
- eg. “Ships in the Night” operation with ATM, muxing over PPP
MPLS positioned as end-to-end forwarding paradigmMPLS positioned as end-to-end forwarding paradigm
Summary
MPLS is an exciting promising emerging technology
Basic functionality (Encapsulation and basic Label
Distribution) has been defined by the IETF
Traffic engineering based on MPLS/IP is just round
the corner.
Convergence is one step closer …...
Thank You
Corporate Services
www.thecorporateservices.com
corporateservices@outlook.com

Contenu connexe

En vedette

Linux firewall-201503
Linux firewall-201503Linux firewall-201503
Linux firewall-201503Kenduest Lee
 
An Overview of Border Gateway Protocol (BGP)
An Overview of Border Gateway Protocol (BGP)An Overview of Border Gateway Protocol (BGP)
An Overview of Border Gateway Protocol (BGP)Jasim Alam
 
MPLS (Multi-Protocol Label Switching)
MPLS (Multi-Protocol Label Switching)MPLS (Multi-Protocol Label Switching)
MPLS (Multi-Protocol Label Switching)Vipin Sahu
 
Multi-Protocol Label Switching: Basics and Applications
Multi-Protocol Label Switching: Basics and ApplicationsMulti-Protocol Label Switching: Basics and Applications
Multi-Protocol Label Switching: Basics and ApplicationsVishal Sharma, Ph.D.
 
What is Artificial Intelligence | Artificial Intelligence Tutorial For Beginn...
What is Artificial Intelligence | Artificial Intelligence Tutorial For Beginn...What is Artificial Intelligence | Artificial Intelligence Tutorial For Beginn...
What is Artificial Intelligence | Artificial Intelligence Tutorial For Beginn...Edureka!
 

En vedette (12)

Linux firewall-201503
Linux firewall-201503Linux firewall-201503
Linux firewall-201503
 
bgp(border gateway protocol)
bgp(border gateway protocol)bgp(border gateway protocol)
bgp(border gateway protocol)
 
BGP Overview
BGP OverviewBGP Overview
BGP Overview
 
Mpls
MplsMpls
Mpls
 
MPLS: Multiprotocol Label Switching
MPLS: Multiprotocol Label SwitchingMPLS: Multiprotocol Label Switching
MPLS: Multiprotocol Label Switching
 
Bgp protocol
Bgp protocolBgp protocol
Bgp protocol
 
An Overview of Border Gateway Protocol (BGP)
An Overview of Border Gateway Protocol (BGP)An Overview of Border Gateway Protocol (BGP)
An Overview of Border Gateway Protocol (BGP)
 
MPLS (Multi-Protocol Label Switching)
MPLS (Multi-Protocol Label Switching)MPLS (Multi-Protocol Label Switching)
MPLS (Multi-Protocol Label Switching)
 
BGP protocol presentation
BGP protocol  presentationBGP protocol  presentation
BGP protocol presentation
 
Multi-Protocol Label Switching: Basics and Applications
Multi-Protocol Label Switching: Basics and ApplicationsMulti-Protocol Label Switching: Basics and Applications
Multi-Protocol Label Switching: Basics and Applications
 
MPLS Presentation
MPLS PresentationMPLS Presentation
MPLS Presentation
 
What is Artificial Intelligence | Artificial Intelligence Tutorial For Beginn...
What is Artificial Intelligence | Artificial Intelligence Tutorial For Beginn...What is Artificial Intelligence | Artificial Intelligence Tutorial For Beginn...
What is Artificial Intelligence | Artificial Intelligence Tutorial For Beginn...
 

Plus de Corporate Services

Google seo- (search engine optimization)- Corporate Services
Google seo- (search engine optimization)- Corporate ServicesGoogle seo- (search engine optimization)- Corporate Services
Google seo- (search engine optimization)- Corporate ServicesCorporate Services
 
Automatic school,Collage,Fectory etc Timer ( Automatic school bell) www.theco...
Automatic school,Collage,Fectory etc Timer ( Automatic school bell) www.theco...Automatic school,Collage,Fectory etc Timer ( Automatic school bell) www.theco...
Automatic school,Collage,Fectory etc Timer ( Automatic school bell) www.theco...Corporate Services
 
Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)
Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)
Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)Corporate Services
 
Interactive Voice Response (IVR)
Interactive Voice Response (IVR) Interactive Voice Response (IVR)
Interactive Voice Response (IVR) Corporate Services
 
Software Company Profile -Corporate services
Software Company Profile -Corporate services Software Company Profile -Corporate services
Software Company Profile -Corporate services Corporate Services
 
Telecommunications systems/Products
Telecommunications systems/ProductsTelecommunications systems/Products
Telecommunications systems/ProductsCorporate Services
 
Hospital Management System/Software
Hospital Management System/SoftwareHospital Management System/Software
Hospital Management System/SoftwareCorporate Services
 
Elecronics and Computer Dealer System
Elecronics and Computer Dealer SystemElecronics and Computer Dealer System
Elecronics and Computer Dealer SystemCorporate Services
 
Drycleaner's Automation Software
Drycleaner's Automation Software Drycleaner's Automation Software
Drycleaner's Automation Software Corporate Services
 

Plus de Corporate Services (13)

Google seo- (search engine optimization)- Corporate Services
Google seo- (search engine optimization)- Corporate ServicesGoogle seo- (search engine optimization)- Corporate Services
Google seo- (search engine optimization)- Corporate Services
 
Automatic school,Collage,Fectory etc Timer ( Automatic school bell) www.theco...
Automatic school,Collage,Fectory etc Timer ( Automatic school bell) www.theco...Automatic school,Collage,Fectory etc Timer ( Automatic school bell) www.theco...
Automatic school,Collage,Fectory etc Timer ( Automatic school bell) www.theco...
 
Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)
Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)
Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)
 
Interactive Voice Response (IVR)
Interactive Voice Response (IVR) Interactive Voice Response (IVR)
Interactive Voice Response (IVR)
 
Software Company Profile -Corporate services
Software Company Profile -Corporate services Software Company Profile -Corporate services
Software Company Profile -Corporate services
 
Internet Leased lines
Internet Leased linesInternet Leased lines
Internet Leased lines
 
Telecommunications systems/Products
Telecommunications systems/ProductsTelecommunications systems/Products
Telecommunications systems/Products
 
CSI Manual
CSI ManualCSI Manual
CSI Manual
 
Hospital Management System/Software
Hospital Management System/SoftwareHospital Management System/Software
Hospital Management System/Software
 
Pharma Software
Pharma SoftwarePharma Software
Pharma Software
 
Elecronics and Computer Dealer System
Elecronics and Computer Dealer SystemElecronics and Computer Dealer System
Elecronics and Computer Dealer System
 
Drycleaner's Automation Software
Drycleaner's Automation Software Drycleaner's Automation Software
Drycleaner's Automation Software
 
School Management System
School Management SystemSchool Management System
School Management System
 

Dernier

👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperityhemanthkumar470700
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...lizamodels9
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...amitlee9823
 

Dernier (20)

👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 

Multiprotocol Label Switching (MPLS)

  • 2. Tutorial Outline OverviewOverview Label Encapsulations Label Distribution Protocols MPLS & ATM Constraint Based Routing with CR-LDP Summary
  • 3. “Label Substitution” what is it? •BROADCAST: Go everywhere, stop when you get to B, never ask for directions. •HOP BY HOP ROUTING: Continually ask who’s closer to B go there, repeat … stop when you get to B. “Going to B? You’d better go to X, its on the way”. •SOURCE ROUTING: Ask for a list (that you carry with you) of places to go that eventually lead you to B. “Going to B? Go straight 5 blocks, take the next left, 6 more blocks and take a right at the lights”. One of the many ways of getting from A to B:
  • 4. Label Substitution •Have a friend go to B ahead of you using one of the previous two techniques. At every road they reserve a lane just for you. At ever intersection they post a big sign that says for a given lane which way to turn and what new lane to take. LANE#1 LANE#2 LANE#1 TURN RIGHT USE LANE#2
  • 5. A label by any other name ... There are many examples of label substitution protocols already in existence. • ATM - label is called VPI/VCI and travels with cell. • Frame Relay - label is called a DLCI and travels with frame. • TDM - label is called a timeslot its implied, like a lane. • X25 - a label is an LCN • Proprietary PORS, TAG etc.. • One day perhaps Frequency substitution where label is a light frequency?
  • 6. SO WHAT IS MPLS ? • Hop-by-hop or source routing to establish labels • Uses label native to the media • Multi level label substitution transport
  • 7. ROUTE AT EDGE, SWITCH IN CORE IP ForwardingLABEL SWITCHINGIP Forwarding IP IP #L1 IP #L2 IP #L3 IP
  • 8. MPLS: HOW DOES IT WORK UDP-Hello UDP-Hello TCP-open TIME TIME Label request IP Label mapping #L2 Initialization(s)
  • 9. WHY MPLS ? Leverage existing ATM hardware Ultra fast forwarding IP Traffic Engineering  Constraint-based Routing Virtual Private Networks  Controllable tunneling mechanism Voice/Video on IP  Delay variation + QoS constraints
  • 10. BEST OF BOTH WORLDS PACKET ROUTING CIRCUIT SWITCHING •MPLS + IP form a middle ground that combines the best of IP and the best of circuit switching technologies. •ATM and Frame Relay cannot easily come to the middle so IP has!! MPLS +IP IP ATM HYBRID
  • 11. MPLS Terminology • LDP: Label Distribution Protocol • LSP: Label Switched Path • FEC: Forwarding Equivalence Class • LSR: Label Switching Router • LER: Label Edge Router (Useful term not in standards)
  • 12. Forwarding Equivalence Classes •FEC = “A subset of packets that are all treated the same way by a router” •The concept of FECs provides for a great deal of flexibility and scalability •In conventional routing, a packet is assigned to a FEC at each hop (i.e. L3 look-up), in MPLS it is only done once at the network ingress Packets are destined for different address prefixes, but can be mapped to common path Packets are destined for different address prefixes, but can be mapped to common path IP1 IP2 IP1 IP2 LSRLSR LER LER LSP IP1 #L1 IP2 #L1 IP1 #L2 IP2 #L2 IP1 #L3 IP2 #L3
  • 13. #216 #612 #5 #311 #14 #99 #963 #462 - A Vanilla LSP is actually part of a tree from every source to that destination (unidirectional). - Vanilla LDP builds that tree using existing IP forwarding tables to route the control messages. #963 #14 #99 #311 #311 #311 LABEL SWITCHED PATH (vanilla)
  • 14. MPLS BUILT ON STANDARD IP 47.1 47.247.3 Dest Out 47.1 1 47.2 2 47.3 3 1 2 3 Dest Out 47.1 1 47.2 2 47.3 3 Dest Out 47.1 1 47.2 2 47.3 3 1 2 3 1 2 3 • Destination based forwarding tables as built by OSPF, IS-IS, RIP, etc.
  • 15. IP FORWARDING USED BY HOP-BY- HOP CONTROL 47.1 47.247.3 IP 47.1.1.1 Dest Out 47.1 1 47.2 2 47.3 3 1 2 3 Dest Out 47.1 1 47.2 2 47.3 3 1 2 1 2 3 IP 47.1.1.1 IP 47.1.1.1 IP 47.1.1.1 Dest Out 47.1 1 47.2 2 47.3 3
  • 16. Intf In Label In Dest Intf Out 3 0.40 47.1 1 Intf In Label In Dest Intf Out Label Out 3 0.50 47.1 1 0.40 MPLS Label Distribution 47.1 47.247.3 1 2 3 1 2 1 2 3 3 Intf In Dest Intf Out Label Out 3 47.1 1 0.50 Mapping: 0.40 Request: 47.1 Mapping: 0.50 Request: 47.1
  • 17. Label Switched Path (LSP) Intf In Label In Dest Intf Out 3 0.40 47.1 1 Intf In Label In Dest Intf Out Label Out 3 0.50 47.1 1 0.40 47.1 47.247.3 1 2 3 1 2 1 2 3 3Intf In Dest Intf Out Label Out 3 47.1 1 0.50 IP 47.1.1.1 IP 47.1.1.1
  • 18. #216 #14 #462 - ER-LSP follows route that source chooses. In other words, the control message to establish the LSP (label request) is source routed. #972 #14 #972 A B C Route= {A,B,C} EXPLICITLY ROUTED OR ER-LSP
  • 19. Intf In Label In Dest Intf Out 3 0.40 47.1 1 Intf In Label In Dest Intf Out Label Out 3 0.50 47.1 1 0.40 47.1 47.247.3 1 2 3 1 2 1 2 3 3 Intf In Dest Intf Out Label Out 3 47.1.1 2 1.33 3 47.1 1 0.50 IP 47.1.1.1 IP 47.1.1.1 EXPLICITLY ROUTED LSP ER-LSP
  • 20. ER LSP - advantages •Operator has routing flexibility (policy-based, QoS-based) •Can use routes other than shortest path •Can compute routes based on constraints in exactly the same manner as ATM based on distributed topology database. (traffic engineering)
  • 21. ER LSP - discord! •Two signaling options proposed in the standards: CR-LDP, RSVP extensions: — CR-LDP = LDP + Explicit Route — RSVP ext = Traditional RSVP + Explicit Route + Scalability Extensions •Not going to be resolved any time soon, market will probably have to resolve it. •Survival of the fittest not such a bad thing.
  • 22. Tutorial Outline Overview Label EncapsulationsLabel Encapsulations Label Distribution Protocols MPLS & ATM Constraint Based Routing with CR-LDP Summary
  • 23. Label Encapsulation ATM FR Ethernet PPP MPLS Encapsulation is specified over various media types. Top labels may use existing format, lower label(s) use a new “shim” label format. VPI VCI DLCI “Shim Label” L2 Label “Shim Label” ……. IP | PAYLOAD
  • 24. MPLS Link Layers •MPLS is intended to run over multiple link layers •Specifications for the following link layers currently exist: • ATM: label contained in VCI/VPI field of ATM header • Frame Relay: label contained in DLCI field in FR header • PPP/LAN: uses ‘shim’ header inserted between L2 and L3 headers Translation between link layers types must be supported MPLS intended to be “multi-protocol” below as well as aboveMPLS intended to be “multi-protocol” below as well as above
  • 25. MPLS Encapsulation - ATM ATM LSR constrained by the cell format imposed by existing ATM standardsATM LSR constrained by the cell format imposed by existing ATM standards VPI PT CLP HEC 5 Octets ATM Header Format VCI AAL5 Trailer ••• Network Layer Header and Packet (eg. IP) 1n AAL 5 PDU Frame (nx48 bytes) Generic Label Encap. (PPP/LAN format) ATM SAR ATM Header ATM Payload • • • • Top 1 or 2 labels are contained in the VPI/VCI fields of ATM header - one in each or single label in combined field, negotiated by LDP • Further fields in stack are encoded with ‘shim’ header in PPP/LAN format - must be at least one, with bottom label distinguished with ‘explicit NULL’ • TTL is carried in top label in stack, as a proxy for ATM header (that lacks TTL) 48 Bytes 48 Bytes Label LabelOption 1 Option 2 Combined Label Option 3 LabelATM VPI (Tunnel)
  • 26. MPLS Encapsulation - Frame Relay •••n 1 DLCI C/ R E A DLCI FE CN BE CN D E E A Q.922 Header Generic Encap. (PPP/LAN Format) Layer 3 Header and Packet DLCI Size = 10, 17, 23 Bits • Current label value carried in DLCI field of Frame Relay header • Can use either 2 or 4 octet Q.922 Address (10, 17, 23 bytes) • Generic encapsulation contains n labels for stack of depth n - top label contains TTL (which FR header lacks), ‘explicit NULL’ label value
  • 27. MPLS Encapsulation - PPP & LAN Data Links Label Exp. S TTL Label: Label Value, 20 bits (0-16 reserved) Exp.: Experimental, 3 bits (was Class of Service) S: Bottom of Stack, 1 bit (1 = last entry in label stack) TTL: Time to Live, 8 bits Layer 2 Header (eg. PPP, 802.3) ••• Network Layer Header and Packet (eg. IP) 4 Octets MPLS ‘Shim’ Headers (1-n) 1n • Network layer must be inferable from value of bottom label of the stack • TTL must be set to the value of the IP TTL field when packet is first labelled • When last label is popped off stack, MPLS TTL to be copied to IP TTL field • Pushing multiple labels may cause length of frame to exceed layer-2 MTU - LSR must support “Max. IP Datagram Size for Labelling” parameter - any unlabelled datagram greater in size than this parameter is to be fragmented MPLS on PPP links and LANs uses ‘Shim’ Header Inserted Between Layer 2 and Layer 3 Headers MPLS on PPP links and LANs uses ‘Shim’ Header Inserted Between Layer 2 and Layer 3 Headers Label Stack Entry Format
  • 28. Tutorial Outline Overview Label Encapsulations Label Distribution ProtocolsLabel Distribution Protocols MPLS & ATM IETF Status Nortel’s Activity Summary
  • 29. Label Distribution Protocols Overview of Hop-by-hop & Explicit Label Distribution Protocol (LDP) Constraint-based Routing LDP (CR-LDP) Extensions to RSVP Extensions to BGP
  • 30. Comparison - Hop-by-Hop vs. Explicit Routing Hop-by-Hop Routing Explicit Routing •Source routing of control traffic •Builds a path from source to dest •Requires manual provisioning, or automated creation mechanisms. •LSPs can be ranked so some reroute very quickly and/or backup paths may be pre-provisioned for rapid restoration •Operator has routing flexibility (policy- based, QoS-based, •Adapts well to traffic engineering •Distributes routing of control traffic •Builds a set of trees either fragment by fragment like a random fill, or backwards, or forwards in organized manner. •Reroute on failure impacted by convergence time of routing protocol •Existing routing protocols are destination prefix based •Difficult to perform traffic engineering, QoS-based routing Explicit routing shows great promise for traffic engineeringExplicit routing shows great promise for traffic engineering
  • 31. Explicit Routing - MPLS vs. Traditional Routing •Connectionless nature of IP implies that routing is based on information in each packet header •Source routing is possible, but path must be contained in each IP header •Lengthy paths increase size of IP header, make it variable size, increase overhead •Some gigabit routers require ‘slow path’ option-based routing of IP packets •Source routing has not been widely adopted in IP and is seen as impractical •Some network operators may filter source routed packets for security reasons •MPLS’s enables the use of source routing by its connection-oriented capabilities - paths can be explicitly set up through the network - the ‘label’ can now represent the explicitly routed path •Loose and strict source routing can be supported MPLS makes the use of source routing in the Internet practicalMPLS makes the use of source routing in the Internet practical
  • 32. Label Distribution Protocols Overview of Hop-by-hop & Explicit Label Distribution Protocol (LDP) Constraint-based Routing LDP (CR-LDP) Extensions to RSVP Extensions to BGP
  • 33. Label Distribution Protocol (LDP) - Purpose Label distribution ensures that adjacent routers have a common view of FEC <-> label bindings Routing Table: Addr-prefix Next Hop 47.0.0.0/8 LSR2 Routing Table: Addr-prefix Next Hop 47.0.0.0/8 LSR2 LSR1 LSR2 LSR3 IP Packet 47.80.55.3 Routing Table: Addr-prefix Next Hop 47.0.0.0/8 LSR3 Routing Table: Addr-prefix Next Hop 47.0.0.0/8 LSR3 For 47.0.0.0/8 use label ‘17’ Label Information Base: Label-In FEC Label-Out 17 47.0.0.0/8 XX Label Information Base: Label-In FEC Label-Out 17 47.0.0.0/8 XX Label Information Base: Label-In FEC Label-Out XX 47.0.0.0/8 17 Label Information Base: Label-In FEC Label-Out XX 47.0.0.0/8 17 Step 1: LSR creates binding between FEC and label value Step 2: LSR communicates binding to adjacent LSR Step 3: LSR inserts label value into forwarding base Common understanding of which FEC the label is referring to! Label distribution can either piggyback on top of an existing routing protocol, or a dedicated label distribution protocol (LDP) can be created Label distribution can either piggyback on top of an existing routing protocol, or a dedicated label distribution protocol (LDP) can be created
  • 34. Label Distribution - Methods LSR1 LSR2 Label Distribution can take place using one of two possible methodsLabel Distribution can take place using one of two possible methods Downstream Label Distribution Label-FEC Binding • LSR2 and LSR1 are said to have an “LDP adjacency” (LSR2 being the downstream LSR) • LSR2 discovers a ‘next hop’ for a particular FEC • LSR2 generates a label for the FEC and communicates the binding to LSR1 • LSR1 inserts the binding into its forwarding tables • If LSR2 is the next hop for the FEC, LSR1 can use that label knowing that its meaning is understood LSR1 LSR2 Downstream-on-Demand Label Distribution Label-FEC Binding • LSR1 recognizes LSR2 as its next-hop for an FEC • A request is made to LSR2 for a binding between the FEC and a label • If LSR2 recognizes the FEC and has a next hop for it, it creates a binding and replies to LSR1 • Both LSRs then have a common understanding Request for Binding Both methods are supported, even in the same network at the same time For any single adjacency, LDP negotiation must agree on a common method
  • 35. #963 #14 #99 #311 #311 #311 DOWNSTREAM MODE MAKING SPF TREE COPY IN H/W #462 D #311 D #963 D #14 D #99 D #216 D #612 D #5 D
  • 36. #963 #14 #99 #311 #311 #311 DOWNSTREAM ON DEMAND MAKING SPF TREE COPY IN H/W #462 D #311 D #963 D#14 D #99 D #216 D #612 D #5 D D? D? D? D? D? D? D? D?
  • 37. Distribution Control: Ordered v. Independent Independent LSP ControlIndependent LSP Control Ordered LSP ControlOrdered LSP Control Next Hop (for FEC) Outgoing Label Incoming Label MPLS path forms as associations are made between FEC next-hops and incoming and outgoing labels • Each LSR makes independent decision on when to generate labels and communicate them to upstream peers • Communicate label-FEC binding to peers once next-hop has been recognized • LSP is formed as incoming and outgoing labels are spliced together • Label-FEC binding is communicated to peers if: - LSR is the ‘egress’ LSR to particular FEC - label binding has been received from upstream LSR • LSP formation ‘flows’ from egress to ingress DefinitionDefinition ComparisonComparison • Labels can be exchanged with less delay • Does not depend on availability of egress node • Granularity may not be consistent across the nodes at the start • May require separate loop detection/mitigation method • Requires more delay before packets can be forwarded along the LSP • Depends on availability of egress node • Mechanism for consistent granularity and freedom from loops • Used for explicit routing and multicast Both methods are supported in the standard and can be fully interoperable
  • 39. Label Retention Methods LSR1 LSR2 LSR3 LSR4 LSR5 Binding for LSR5 Binding for LSR5 Binding for LSR5An LSR may receive label bindings from multiple LSRs Some bindings may come from LSRs that are not the valid next-hop for that FEC Liberal Label Retention Conservative Label Retention LSR1 LSR2 LSR3 LSR4 Label Bindings for LSR5 Valid Next Hop LSR4’s Label LSR3’s Label LSR2’s Label LSR1 LSR2 LSR3 LSR4 Label Bindings for LSR5 Valid Next Hop LSR4’s Label LSR3’s Label LSR2’s Label • LSR maintains bindings received from LSRs other than the valid next hop • If the next-hop changes, it may begin using these bindings immediately • May allow more rapid adaptation to routing changes • Requires an LSR to maintain many more labels • LSR only maintains bindings received from valid next hop • If the next-hop changes, binding must be requested from new next hop • Restricts adaptation to changes in routing • Fewer labels must be maintained by LSR Label Retention method trades off between label capacity and speed of adaptation to routing changes
  • 40. LIBERAL RETENTION MODE #462 D #311 D #963 D #14 D #99 D #216 D #612 D #5 D #422 D #622 D These labels are kept incase they are needed after a failure.
  • 41. CONSERVATIVE RETENTION MODE #462 D #311 D #963 D #14 D #99 D #216 D #612 D #5 D #422 D #622 D These labels are released the moment they are received.
  • 42. LDP - STATUS •Gone to last call •Multi Vendor interoperability demonstrated for DSOD on OC-3/ATM by (Nortel Networks & Cisco) at Interop/99 •Source code for these PDUs publicly available: www.NortelNetworks.com/mpls
  • 43. Label Distribution Protocols Overview of Hop-by-hop & Explicit Label Distribution Protocol (LDP) Constraint-based Routing LDP (CR-LDP) Extensions to RSVP
  • 44. Constraint-based LSP Setup using LDP Uses LDP Messages (request, map, notify) Shares TCP/IP connection with LDP Can coexist with vanilla LDP and inter-work with it, or can exist as an entity on its own Introduces additional data to the vanilla LDP messages to signal ER, and other “Constraints”
  • 45. ER-LSP Setup using CR-LDP LSR B LSR C LER DLER A ER Label Switched Path Ingress Egress 4. Label mapping message originates. 3. Request message terminates. 2. Request message processed and next node determined. Path list modified to <C,D> 1. Label Request message. It contains ER path < B,C,D> 5. LSR C receives label to use for sending data to LER D. Label table updated 6. When LER A receives label mapping, the ER established.
  • 46. #216 #14 #612 #5 #311 #462 - It is possible to take a vanilla LDP label request let it flow vanilla to the edge of the core, insert an ER hop list at the core boundary at which point it is CR-LDP to the far side of the core. A B C LDP CR-LDP #99 INSERT ER{A,B,C} LDP/CR-LDP INTERWORKING
  • 47. Basic LDP Message additions LSPID: A unique tunnel identifier within an MPLS network. ER: An explicit route, normally a list of IPV4 addresses to follow (source route) the label request message. Resource Class (Color): to constrain the route to only links of this Color. Basically a 32 bit mask used for constraint based computations. Traffic Parameters: similar to ATM call setup, which specify treatment and reserve resources.
  • 48. Length Peak Data Rate (PDR) Peak Burst Size (PBS) Committed Data Rate (CDR) Committed Burst Size (CBS) Excess Burst Size (EBS) Traf. Param. TLVU F Reserved WeightFrequencyFlags Flags control “negotiability” of parameters Frequency constrains the variable delay that may be introduced Weight of the CRLSP in the “relative share” Peak rate (PDR+PBS) maximum rate at which traffic should be sent to the CRLSP Committed rate (CDR+CBS) the rate that the MPLS domain commits to be available to the CRLSP Excess Burst Size (EBS) to measure the extent by which the traffic sent on a CRLSP exceeds the committed rate 32 bit fields are short IEEE floating point numbers Any parameter may be used or not used by selecting appropriate values CR-LDP Traffic Parameters
  • 49. CRLSP characteristics not edge functions The approach is like diff-serv’s separation of PHB from Edge The parameters describe the “path behavior” of the CRLSP, i.e. the CRLSP’s characteristics Dropping behavior is not signaled  Dropping may be controlled by DS packet markings CRLSP characteristics may be combined with edge functions (which are undefined in CRLDP) to create services  Edge functions can perform packet marking  Example services are in an appendix
  • 50. Peak rate The maximum rate at which traffic should be sent to the CRLSP Defined by a token bucket with parameters  Peak data rate (PDR)  Peak burst size (PBS) Useful for resource allocation If a network uses the peak rate for resource allocation then its edge function should regulate the peak rate May be unused by setting PDR or PBS or both to positive infinity
  • 51. Committed rate The rate that the MPLS domain commits to be available to the CRLSP Defined by a token bucket with parameters  Committed data rate (CDR)  Committed burst size (CBS) Committed rate is the bandwidth that should be reserved for the CRLSP CDR = 0 makes sense; CDR = +∞ less so CBS describes the burstiness with which traffic may be sent to the CRLSP
  • 52. Excess burst size Measure the extent by which the traffic sent on a CRLSP exceeds the committed rate Defined as an additional limit on the committed rate’s token bucket Can be useful for resource reservation If a network uses the excess burst size for resource allocation then its edge function should regulate the parameter and perhaps mark or drop packets EBS = 0 and EBS = +∞ both make sense
  • 53. Frequency  Specifies how frequently the committed rate should be given to CRLSP  Defined in terms of “granularity” of allocation of rate  Constrains the variable delay that the network may introduce  Constrains the amount of buffering that a LSR may use  Values:  Very frequently: no more than one packet may be buffered  Frequently: only a few packets may be buffered  Unspecified: any amount of buffering is acceptable
  • 54. Weight Specifies the CRLSP’s weight in the “realtive share algorithm” Implied but not stated:  CRLSPs with a larger weight get a bigger relative share of the “excess bandwidth” Values:  0 — the weight is not specified  1-255 — weights; larger numbers are larger weights The definition of “relative share” is network specific
  • 55. Negotiation flags F1F2F3F4F5F6Res PDRNegotiationFlag PBSNegotiationFlag CDRNegotiationFlag CBSNegotiationFlag EBSNegotiationFlag WeightNegotiationFlag If a parameter is flagged as negotiable then LSRs may replace the parameter value with a smaller value in the label request message. LSRs descover the negotiated values in the label mapping message. Label request - possible downward negotiation Label mapping - no negotiation
  • 56. CR-LDP PREEMPTION A CR-LSP carries an LSP priority. This priority can be used to allow new LSPs to bump existing LSPs of lower priority in order to steal their resources. This is especially useful during times of failure and allows you to rank the LSPs such that the most important obtain resources before less important LSPs. These are called the setupPriority and a holdingPriority and 8 levels are provided.
  • 57. CR-LDP PREEMPTION When an LSP is established its setupPriority is compared with the holdingPriority of existing LSPs, any with lower holdingPriority may be bumped to obtain their resources. This process may continue in a domino fashion until the lowest holdingPriority LSPs either clear or are on the worst routes.
  • 59. TOPOLOGY DB FOR BUMPINGLOW PRI HIGH PRI Topology Database sees 8 levels of bandwidth, depending on the setup priority of the LSP, a subset of that bandwidth is seen as available. The highest priority sees all bandwidth used and free at levels lower that it, etc. to the lowest priority which only sees unused bandwidth.
  • 60. CR-LDP Status Going through last call Demonstrated Interoperability Nov/98 Nortel Networks, Ericson, GDC Extensions to CR-LDP now being proposed for: Bandwidth Adjustment (AT&T) Multicast …. Source code for these PDUs publicly available: www.NortelNetworks.com/mpls
  • 61. Label Distribution Protocols Overview of Hop-by-hop & Explicit Label Distribution Protocol (LDP) Constraint-based Routing LDP (CR-LDP) Extensions to RSVP
  • 62. ER-LSP setup using RSVP LSR B LSR C LER DLER A 1. Path message. It contains ER path < B,C,D> 2. New path state. Path message sent to next node 3. Resv message originates. Contain the label to use and the required traffic/QoS para. 4. New reservation state. Resv message propagated upstream 5. When LER A receives Resv, the ER established. Per-hop Path and Resv refresh unless suppressed Per-hop Path and Resv refresh unless suppressed Per-hop Path and Resv refresh unless suppressed
  • 63. Tutorial Outline Overview Label Encapsulations Label Distribution Protocols MPLS & ATMMPLS & ATM Constraint Based Routing with CR-LDP Summary
  • 64. MPLS & ATM Various Modes of Operation  Label-Controlled ATM  Tunneling Through ATM  Ships in the night with ATM ATM Merge  VC Merge  VP Merge
  • 65. MPLS & ATM Several Models for running MPLS on ATM: 1. Label-Controlled ATM: • Use ATM hardware for label switching • Replace ATM Forum SW by IP/MPLS IP Routing MPLS ATM HW
  • 66. Label-Controlled ATM • Label switching is used to forward network-layer packets • It combines the fast, simple forwarding technique of ATM with network layer routing and control of the TCP/IP protocol suite IP Packet 17 IP Packet 05 B A D C Forwarding Table B 17 C 05 • • • Port Label Switching Router Forwarding Table Network Layer Routing (eg. OSPF, BGP4) Label Packets forwarded by swapping short, fixed length labels (I.e. ATM technique) Packets forwarded by swapping short, fixed length labels (I.e. ATM technique) Switched path topology formed using network layer routing (I.e. TCP/IP technique) Switched path topology formed using network layer routing (I.e. TCP/IP technique) Label ATM Label Switching is the combination of L3 routing and L2 ATM switchingATM Label Switching is the combination of L3 routing and L2 ATM switching
  • 67. 2. MPLS Over ATM MPLS ATM Network MPLS L S R L S R VCVP Two Models Internet Draft: VCID notification over ATM Link
  • 68. 3. Ships in the Night  ATM Forum and MPLS control planes both run on the same hardware but are isolated from each other, i.e. they do not interact.  This allows a single device to simultaneously operate as both an MPLS LSR and an ATM switch.  Important for migrating MPLS into an ATM network ATM SW L S R ATM MPLS ATM SW L S R
  • 69. Ships in the night Requirements Resource Management  VPI.VCI Space Partitioning  Traffic management  Bandwidth Reservation  Admission Control  Queuing & Scheduling  Shaping/Policing  Processing Capacity
  • 70. Bandwidth Management • Bandwidth GuaranteesBandwidth Guarantees • FlexibilityFlexibility A.A. Full SharingFull Sharing PortCapacityPortCapacity Pool 1Pool 1 •MPLSMPLS •ATMATM MPLSMPLS ATMATM AvailableAvailable B. Protocol PartitionB. Protocol Partition Pool 2Pool 2 •50%50% •rt-VBRrt-VBR Pool 1Pool 1 •50%50% •ATMATM MPLSMPLS ATMATM AvailableAvailable AvailableAvailable C. Service PartitionC. Service Partition Pool 2Pool 2 •50%50% •nrt-VBRnrt-VBR •COS1COS1 Pool 1Pool 1 •50%50% •rt-VBRrt-VBR •COS2COS2 MPLSMPLS ATMATM AvailableAvailable MPLSMPLS ATMATM AvailableAvailable
  • 71. ATM Merge Multipoint-to-point capability Motivation  Stream Merge to achieve scalability in MPLS:  O(n) VCs with Merge as opposed to O(n2 ) for full mesh  less labels required  Reduce number of receive VCs on terminals Alternatives  Frame-based VC Merge  Cell-based VP Merge
  • 72. Stream Merge 111 2 2 2 3 3 111 2 2 2 3 3 Input cell streams Input cell streams in out 1 2 3 7 6 9 1 2 3 7 7 7 in out Non-VC merging (Nin--Nout) VC merging (Nin-1out) 7 7 7 7 7 777 6 7 9 6 7 79 6 7 7 7 7 7 77 No Cell Interleaving 7 AAL5 Cell Interleaving Problem
  • 74. VP-Merge VPI=3 VPI=2 VCI=1 VPI=1 VCI=2 VCI=3 VCI=1 VCI=2 VCI=3 –merge multiple VPs into one VP –use separate VCIs within VPs to distinguish frames –less efficient use of VPI/VCI space, needs support of SVP No Cell Interleaving Problem Since VCI is unique Option 1: Dynamic VCI Mapping Option 2: Root Assigned VCI
  • 75. Tutorial Outline Overview Label Encapsulations Label Distribution Protocols MPLS & ATM Constraint Based Routing with CR- LDP SummarySummary
  • 76. - IP will over-utilize best paths and under-utilize less good paths. Dest=a.b.c.d Dest=a.b.c.d Dest=a.b.c.d IP FOLLOWS A TREE TO DESTINATION
  • 77. #216 #14 #612 #5 #99 #311 #963 #462 - Ultra fast, simple forwarding a.k.a switching - Follows same route as normal IP datapath - So like IP, LDP will over-utilize best paths and under-utilize less good paths. HOP-BY-HOP(A.K.A Vanilla) LDP
  • 78. Two types of Label Switched Paths: • Hop by hop (“Vanilla” LDP) • Explicit Routing (LDP+”ER”) #18 #427 #819 #216 #14 #612 #5 #99 #311 #963 #462 #77 Label Switched Path (Two Types)
  • 79. • CR = “Constraint” based “Routing” • eg: USE: (links with sufficient resources AND (links of type “someColor”) AND (links that have delay less than 200 ms) && = CR-LDP
  • 80. 1) A topology database that knows about link attributes. 2) A label distribution protocol that goes where it’s told. z {a,b,c} ANSWER: OSPF/ISIS + attribs{a,b,c} zmyx ANSWER: LDP + Explicit Route{x,y,m,z} z {a,b,c} Pieces Required for Constraint Based Routing
  • 81. • Overview • Label Encapsulations • Label Distribution Protocols • MPLS & ATM • Constraint Based Routing with CR-LDP • SummarySummary Tutorial Outline
  • 82. Summary of Motivations for MPLS • Simplified forwarding based on exact match of fixed length label - initial drive for MPLS was based on existance of cheap, fast ATM switches • Separation of routing and forwarding in IP networks - facilitates evolution of routing techniques by fixing the forwarding method - new routing functionality can be deployed without changing the forwarding techniques of every router in the Internet • Facilitates the integration of ATM and IP - allows carriers to leverage their large investment of ATM equipment - eliminates the adjacency problem of VC-mesh over ATM •Enables the use of explicit routing/source routing in IP networks - can be easily used for such things as traffic management, QoS routing •Promotes the partitioning of functionality within the network - move granular processing of packets to edge; restrict core to packet forwarding - assists in maintaining scalability of IP protocols in large networks •Improved routing scalability through stacking of labels - removes the need for full routing tables from interior routers in transit domain; only routes to border routers are required •Applicability to both cell and packet link-layers - can be deployed on both cell (eg. ATM) and packet (eg. FR, Ethernet) media - common management and techniques simplifies engineering Many drivers exist for MPLS above and beyond high speed forwardingMany drivers exist for MPLS above and beyond high speed forwarding
  • 83. IP and ATM Integration IP over ATM VCsIP over ATM VCs • ATM cloud invisible to Layer 3 Routing • Full mesh of VCs within ATM cloud • Many adjacencies between edge routers • Topology change generates many route updates • Routing algorithm made more complex • ATM network visible to Layer 3 Routing • Singe adjacency possible with edge router • Hierachical network design possible • Reduces route update traffic and power needed to process them IP over MPLSIP over MPLS MPLS eliminates the “n-squared” problem of IP over ATM VCsMPLS eliminates the “n-squared” problem of IP over ATM VCs
  • 84. Traffic Engineering A B C D Traffic engineering is the process of mapping traffic demand onto a networkTraffic engineering is the process of mapping traffic demand onto a network Demand Network Topology Purpose of traffic engineering: • Maximize utilization of links and nodes throughout the network • Engineer links to achieve required delay, grade-of-service • Spread the network traffic across network links, minimize impact of single failure • Ensure available spare link capacity for re-routing traffic on failure • Meet policy requirements imposed by the network operator Traffic engineering key to optimizing cost/performance
  • 85. Traffic Engineering Alternatives Current methods of traffic engineering: Manipulating routing metrics Use PVCs over an ATM backbone Over-provision bandwidth Difficult to manage Not scalable Not economical MPLS combines benefits of ATM and IP-layer traffic engineering Chosen by routing protocol (least cost) Chosen by Traffic Eng. (least congestion) Example Network: MPLS provides a new method to do traffic engineering (traffic steering) Ingress node explicitly routes traffic over uncongested path Potential benefits of MPLS for traffic engineering: - allows explicitly routed paths - no “n-squared” problem - per FEC traffic monitoring - backup paths may be configured operator control scalable granularity of feedback redundancy/restoration Congested Node
  • 86. MPLS Traffic Engineering Methods • MPLS can use the source routing capability to steer traffic on desired path • Operator may manually configure these in each LSR along the desired path - analogous to setting up PVCs in ATM switches • Ingress LSR may be configured with the path, RSVP used to set up LSP - some vendors have extended RSVP for MPLS path set-up • Ingress LSR may be configured with the path, LDP used to set up LSP - many vendors believe RSVP not suited • Ingress LSR may be configured with one or more LSRs along the desired path, hop-by-hop routing may be used to set up the rest of the path - a.k.a loose source routing, less configuration required • If desired for control, route discovered by hop-by-hop routing can be frozen - a.k.a “route pinning” • In the future, constraint-based routing will offload traffic engineering tasks from the operator to the network itself
  • 87. MPLS: Scalability Through Routing Hierarchy BR1 BR2 BR3 BR4 TR1 TR2 TR3TR4 AS1 AS2 AS3 • Border routers BR1-4 run an EGP, providing inter-domain routing • Interior transit routers TR1-4 run an IGP, providing intra-domain routing • Normal layer 3 forwarding requires interior routers to carry full routing tables - transit router must be able to identify the correct destination ASBR (BR1-4) • Carrying full routing tables in all routers limits scalability of interior routing - slower convergence, larger routing tables, poorer fault isolation • MPLS enables ingress node to identify egress router, label packet based on interior route • Interior LSRs would only require enough information to forward packet to egress Ingress router receives packet Ingress router receives packet Packet labelled based on egress router Packet labelled based on egress router Forwarding in the interior based on IGP route Forwarding in the interior based on IGP route Egress border router pops label and fwds. Egress border router pops label and fwds. MPLS increases scalability by partitioning exterior routing from interior routing
  • 88. MPLS: Partitioning Routing and Forwarding Routing Forwarding OSPF, IS-IS, BGP, RIP MPLS Forwarding Table Based on: Classful Addr. Prefix? Classless Addr. Prefix? Multicast Addr.? Port No.? ToS Field? Based on: Exact Match on Fixed Length Label • Current network has multiple forwarding paradigms - class-ful longest prefix match (Class A,B,C boundaries) - classless longest prefix match (variable boundaries) - multicast (exact match on source and destination) - type-of-service (longest prefix. match on addr. + exact match on ToS) • As new routing methods change, new route look-up algorithms are required - introduction of CIDR • Next generation routers will be based on hardware for route look-up - changes will require new hardware with new algorithm • MPLS has a consistent algorithm for all types of forwarding; partitions routing/fwding - minimizes impact of the introduction of new forwarding methods MPLS introduces flexibility through consistent forwarding paradigmMPLS introduces flexibility through consistent forwarding paradigm
  • 89. Upper Layer Consistency Across Link Layers Ethernet PPP (SONET, DS-3 etc.) ATM Frame Relay • MPLS is “multiprotocol” below (link layer) as well as above (network layer) • Provides for consistent operations, engineering across multiple technologies • Allows operators to leverage existing infrastructure • Co-existence with other protocols is provided for - eg. “Ships in the Night” operation with ATM, muxing over PPP MPLS positioned as end-to-end forwarding paradigmMPLS positioned as end-to-end forwarding paradigm
  • 90. Summary MPLS is an exciting promising emerging technology Basic functionality (Encapsulation and basic Label Distribution) has been defined by the IETF Traffic engineering based on MPLS/IP is just round the corner. Convergence is one step closer …...

Notes de l'éditeur

  1. The “Forwarding Equivalence Class” is an important concept in MPLS. An FEC is any subset of packets that are treated the same way by a router. By “treated” this can mean, forwarded out the same interface with the same next hop and label. It can also mean given the same class of service, output on same queue, given same drop preference, and any other option available to the network operator. When a packet enters the MPLS network at the ingress node, the packet is mapped into an FEC. The mapping can also be done on a wide variety of parameters, address prefix (or host), source/destination address pair, or ingress interface. This greater flexibility adds functionality to MPLS that is not available in traditional IP routing. FECs also allow for greater scalability in MPLS. In Ipsilon’s implementation of IP Switching or in MPOA, their equivalent to an FEC maps to a data flow (source/destination address pair, or source/destination address plus port no.). The limited flexibility and large numbers of (short lived) flows in the Internet limits the applicability of both IP Switching and MPOA. With MPLS, the aggregation of flows into FECs of variable granularity provides scalability that meets the demands of the public Internet as well as enterprise applications. In the current Label Distribution Protocol specification, only three types of FECs are specified: - IP Address Prefix - Router ID - Flow (port, dest-addr, src-addr etc.) The spec. states that new elements can be added as required.
  2. Labels are created based on the forwarding equivalence classes (FECs) created through the layer 3 routing protocol. In order for label swapping to be possible, common understanding of which FECs map to which labels must be achieved between adjacent routers. The communication of label binding information (I.e. the binding of an FEC to a specific label value) between LSRs is accomplished by label distribution. Label distribution can occur either by piggybacking binding information on an existing routing protocol, or through the creation of a dedicated label distribution protocol (LDP). In either case, a router would communicate binding information after a specific label value is assigned to an FEC. The LSR receiving this binding information would, assuming the information comes from the correct next hop, insert the label value into the label information base associated with the corresponding FEC. After this information is communicated, the upstream LSR knows that if it is forwarding a packet associated with the particular FEC, it can use the associated label value and the downstream LSR that the packet is forwarded to will recognize it as belonging to that FEC. As this information is communicated along a chain of LSRs, a path will be set up along which a number of hops can use label swapping and avoid the full layer 3 look-up. This is a much simplified view of label distribution, in reality there are a number of options and techniques by which this can be implemented.
  3. CR-LDP is an open standard protocol, proposed and accepted by the IETF MPLS working group. It does not have any dependencies on other protocols that are outside the scope or control of the MPLS working group. This provides two major benefits for CR-LDP: a) it can easily be enhanced to accommodate new network requirements, b) it promotes interoperability. In fact, recent interoperability demonstrations have proven CR-LDP to be a true multivendor networking protocol. CR-LDP software is also publicly available. The CR-LDP signaling builds on the LDP protocol, and provides ER-LSP setup with optional resource reservation in a simple hard state control and messaging manner. The transport mechanism is UDP for peer discovery and TCP for session, advertisement, notification and CR-LDP messages. Building the CR-LDP signaling on TCP ensures a reliable transport mechanism for the signaling of ER-LSPs. Interoperability of CR-LDP has already been proven and publicly demonstrated by a multi-vendor interoperability trial. The software of the protocol is also publicly available for the promotion of network interoperability. CR-LDP is a true open standard, which starts from a clean slate and has no backward compatibility issue to be concerned with. This makes CR-LDP easy to enhance and standardize. CR-LDP is part of LDP and uses the same mechanisms and messages as LDP for peer discovery, session establishment/maintenance, label distribution/management and error handling. Therefore, LDP/CR-LDP offers a unified signaling protocol system that provides network operators with the complete label distribution and path setup modes needed for MPLS. This certainly maximizes operational efficiency and results in lower operational costs.
  4. VP merge stream merge when it is applied to VPs, specifically so as to allow multiple VPs to merge into one single VP. In this case the VCIs need to be unique. This allows cells from different sources to be distinguished via the VCI. An issue with VP merge is that unique VCIs need to be configured/negotiated/derived for each ingress on a mp2p VP tree. Congestion issue at merging points, how much bandwidth to allocate, the node doing the merge may need to have knowledge about the number of leaves being meged (fan-in) in order to allocate resources (buffers, bandwidth) appropriately. So this information is carried in the LDP with ingress based label allocation where sources advertise their existence towards the root. EPD on VCCs inside the VPC? this requires hardware changes? Lucent presented a contribution in the atm forum meting in july where they calculated the extra latency and buffer utilization caused by vcmerge and result was the the negative effect is very small. in fact so small which makes vp merge not worth the trouble. VP space is limited to 256/4K (UNI/NNI) and may be limited to a few hundred edge routers (depending on how it is done). VP merging also has other unsolved problems with regard to label consumption and label setup protocol. Ascend/Cascade argues for the benefits of VP-merge (IP Navigator does that and they claim a patent for it)