SlideShare a Scribd company logo
1 of 27
Analysis on Two Methods
in Ingress Local Protection
Contents
• Introduction
• Descriptions on Two Methods
• Analysis on Two Methods
Introduction
Important to have Ingress/Egress Local Protection
• Faster than E2E global protection for ingress/egress
• More Scalable since keeping less states and using less
resources
• Easier to operate and maintain
In Ingress Local Protection:
Relay-Message or Proxy-Ingress can be used to
transfer information about ingress local protection from
primary ingress to backup ingress
They are described in the following slides
Detailed analysis on them are given for your reference
Contents
• Introduction
• Descriptions on Two Methods
 Changes for Relay-Message vs. Proxy-
Ingress
 Relay-Message with Example
 Proxy-Ingress with Example
• Analysis on Two Methods
Changes for Relay-Message vs. Proxy-Ingress
Changes for Relay-Message Changes for Proxy-Ingress
1) Primary ingress sends Path messages with
Ingress-Protection object to backup ingress after the
primary LSP is set up.
1) Primary ingress handles the configuration of proxy-ingress or
generates the information for the proxy-ingress and makes sure that the
proxy-ingress address generated does not cause a loop.
2) Backup ingress creates backup LSP to locally
protect the primary ingress after receiving Path
message with Ingress-Protection object, and sends
Resv message with Ingress-Protection object to
primary ingress.
2) Primary ingress specially processes all possible abnormal cases
happening in the backup ingress and in the path segment between the
proxy ingress (i.e., the primary ingress), backup ingress and the primary
ingress. These are changes to the existing RSVP-TE protocol, especially
mixed with signaling for the primary LSP.
3) Primary ingress records the status of ingress
protection after receiving Resv message with
Ingress-Protection object.
3) Primary ingress changes the path for the primary LSP. The new path
for the LSP will be: the proxy-ingress (i.e., the primary ingress), the
backup ingress, the primary ingress, the next hop(s) of the primary
ingress, and so on.
4) Primary ingress adds a new object (Ingress-Protection) into the Path
and Resv messages for the primary LSP to the backup ingress.
5) Primary ingress specially handles the Path and Resv messages w/
Ingress-Protection for the primary LSP from and/or to the backup ingress.
6) Backup ingress specially handles the Path and Resv messages w/
Ingress-Protection for the primary LSP from and/or to the primary
ingress. The procedures on the backup ingress for specially handling the
Path and Resv messages are different from those on the primary ingress.
When the primary ingress fails, the backup ingress can not get any Path messages from the primary ingress (i.e., the proxy-
ingress or the primary ingress), thus it must keep the Path message(s) originally received from the primary ingress, update the
message(s) and put the message(s) into the bypass LSP tunnel to the next hop(s) of the primary ingress.
When the primary ingress fails, the backup ingress can not send any Resv message(s) to its primary ingress (i.e., its previous
hop proxy-ingress or the primary ingress), thus it should keep the Resv message(s) originally received and update the
message(s) such as setting Protection-in-use.
5
6
Relay-Message Method with Example
PE1
PE2
PE6
PE5
PE4
PE3
1. Ingress PE5 sends Path w/ INGRESS_PROTECTION
to backup ingress PE6 after primary LSP is set up
2. PE6 creates backup LSP to protect PE5
through calling existing functions
3. PE6 sends PE5 Resv w/ INGRESS_PROTECTION
Primary LSP
Backup LSP
Path Msg
Resv Msg
PE7
P1
1
2
3
0
7
LSP Path (ERO):
PE5’—PE6—PE5—NHs …
1. Proxy Ingress PE5’ (i.e., primary
ingress PE5 acting as PE5’) sends
Path w/ INGRESS_PROTECTION
to backup ingress PE6
2. Backup ingress PE6 sends
Path w/ INGRESS_PROTECTION
to primary ingress PE5
PE1
PE2
PE6
PE5
PE4
PE3
PE5’
Primary ingress PE5 :
• Detects failures of backup ingress PE6, handles failures and
abnormal cases in PE6 and path segments between proxy
ingress and backup ingress (and between primary ingress
and backup ingress), and changes the signaling path for the
primary LSP when a failure or abnormal event happens in
the backup ingress or the path segments.
• Processes configuration for Proxy-ingress or generates the
information for the proxy-ingress and makes sure that the
proxy-ingress address generated does not cause a loop
3. PE5 sends Path w/o
INGRESS_PROTECTION to NHs
(NHs send Resv to primary
ingress PE5)
5. PE6 creates backup LSP
to protect ingress PE5
reusing FRR with changes
to existing procedures
Proxy-Ingress Method with Example
Primary LSP
Backup LSP
Path Msg
Resv Msg
4. Primary ingress PE5 sends
Resv w/ INGESS_PROTECTION
to backup ingress PE6 after
receiving Resv from NHs
6. Backup ingress PE6 sends Resv
w/ INGRESS_PROTECTION to
proxy ingress PE5’ (i.e., PE5 acting
as PE5’)
PE7
P1
1
2
3
4
5
6
Contents
• Introduction
• Descriptions on Two Methods
• Analysis on Two Methods
 Configurations
 Primary LSP Dependency
 Message Overhead
 Special Handlings on Primary Ingress
 Special Handlings on Backup Ingress
 Backup LSP Creation
 Primary LSP Setup Time
 Session Maintenance
 Scalability
 Summary on Analysis
Configurations
Relay-Message Method:
• Configure backup ingress
Proxy-Ingress Method:
• Configure backup ingress
• Configure proxy-ingress or generate the
information for the proxy-ingress and make
sure that the proxy-ingress address
generated does not cause a loop
Primary LSP Dependency
Relay-Message Method:
• Primary LSP is independent of the
backup ingress. The establishment of
primary LSP is not touched by adding
ingress protection
Proxy-Ingress Method:
• The primary LSP depends on the backup ingress somehow. The creation of primary
LSP is changed for providing ingress protection. For example, the signaling
messages for the primary LSP goes from the primary ingress (acting as the proxy
ingress) to the backup ingress, to the primary ingress and then to the next hop(s) of
the primary ingress. Thus abnormal events on backup ingress may affect the primary
LSP.
PE1
P
PE6
PE5
P
1. Ingress PE5 sends Path w/
INGRESS_PROTECTION to
backup ingress PE6 after
primary LSP is set up
3. PE6 sends PE5 Resv w/
INGRESS_PROTECTION
Primary LSP
Backup LSP
Path M
Resv M
PE7
P1
1
3
2. PE6 creates backup LSP to protect
PE5 through calling existing functions
2
0
LSP Path (ERO):
PE5’—PE6—PE5—NHs …
1. Proxy Ingress PE5’ (i.e., primary ingress PE5
acting as PE5’) sends Path w/
INGRESS_PROTECTION to backup ingress PE6
2. Backup ingress PE6 sends Path w/
INGRESS_PROTECTION to primary ingress PE5
PE1
PE2
PE6
PE5
PE4
PE3
PE5’
3. PE5 sends Path w/o INGRESS_PROTECTION to
NHs
(NHs send Resv to primary ingress PE5)
5. PE6 creates backup LSP to protect
ingress PE5 reusing FRR with changes to
existing procedures
Primary LSP
Backup LSP
Path Msg
Resv Msg
4. Primary ingress PE5 sends Resv w/
INGESS_PROTECTION to backup ingress PE6
after receiving Resv from NHs
6. Backup ingress PE6 sends Resv w/
INGRESS_PROTECTION to proxy ingress PE5’ (i.e.,
PE5 acting as PE5’)
PE7
P1
1
2
3
4
5
6
Message Overhead
Relay-Message Method (2 messages):
• Path Message with INGRESS_PROTECTION is sent
 from primary ingress to backup ingress
• Resv Message with INGRESS_PROTECTION is sent
 from backup ingress to primary ingress
Proxy-Ingress Method (4 messages):
• Path Message with INGRESS_PROTECTION is sent
 from proxy-ingress (i.e., primary ingress) to backup ingress and
 from backup ingress to primary ingress
• Resv Message with INGRESS_PROTECTION is sent
 from primary ingress to backup ingress and
 from backup ingress to proxy-ingress (i.e., primary ingress)
PE
PE6
PE5
1. Ingress PE5 sends Path w/
INGRESS_PROTECTION to
backup ingress PE6 after
primary LSP is set up
3. PE6 sends PE5 Resv w/
INGRESS_PROTECTION
Primary LSP
Backup LSP
PE7
P1
1
3
2
0
LSP Path (ERO):
PE5’—PE6—PE5—NHs …
1. Proxy Ingress PE5’ (i.e., primary ingress PE5
acting as PE5’) sends Path w/
INGRESS_PROTECTION to backup ingress PE6
2. Backup ingress PE6 sends Path w/
INGRESS_PROTECTION to primary ingress PE5
PE1
PE2
PE6
PE5
PE4
PE3
PE5’
Primary LSP
Backup LSP
Path Msg
Resv Msg
4. Primary ingress PE5 sends Resv w/
INGESS_PROTECTION to backup ingress PE6
after receiving Resv from NHs
6. Backup ingress PE6 sends Resv w/
INGRESS_PROTECTION to proxy ingress PE5’ (i.e.,
PE5 acting as PE5’)
PE7
P1
1
2
3
4
5
6
Special Handlings on Primary Ingress
Relay-Message Method:
1. sends Path with INGRESS_PROTECTION to backup ingress
after primary LSP is set up
2. stores states after receiving Resv with INGRESS_PROTECTION
from backup ingress
3. removes session to backup ingress when tearing down primary
LSP (or failure or abnormal events in backup ingress occur)
4. refreshes session to backup ingress when refreshing primary LSP
Proxy-Ingress Method:
1. changes the ERO for primary LSP (ERO: proxy-ingress  backup ingress primary ingress  next hop  …)
2. sends Path with INGRESS_PROTECTION to backup ingress after changing the ERO
3. sends Path without INGRESS_PROTECTION to next hop after receiving Path with INGRESS_PROTECTION from backup
ingress
4. After receiving Resv without INGRESS_PROTECTION from next hop, it does not assign a normal label for the interface from
its upstream node (backup ingress), or write a cross connect from its upstream node to its next hop; it sends Resv with
INGRESS_PROTECTION to its upstream node (i.e., backup ingress).
5. After receiving Resv with INGRESS_PROTECTION from backup ingress, stores states and write LFIB for primary LSP
6. detects failures of the backup ingress, handles failures and other abnormal events happening in the backup ingress and the
path segments between proxy ingress and backup ingress (and between primary ingress and backup ingress), and changes
the signaling path for the primary LSP when a failure or abnormal event happens in the backup ingress or the path segments.
P
PE6
PE5
1. Ingress PE5 sends Path w/
INGRESS_PROTECTION to
backup ingress PE6 after
primary LSP is set up
3. PE6 sends PE5 Resv w/
INGRESS_PROTECTION
Primary LSP
Backup LSP
PE7
P1
1
3
2. PE6 creates backup LSP to protect
PE5 through calling existing functions
2
0
LSP Path (ERO):
PE5’—PE6—PE5—NHs …
1. Proxy Ingress PE5’ (i.e., primary ingress PE5
acting as PE5’) sends Path w/
INGRESS_PROTECTION to backup ingress PE6
2. Backup ingress PE6 sends Path w/
INGRESS_PROTECTION to primary ingress PE5
PE1
PE2
PE6
PE5
PE4
PE3
PE5’
3. PE5 sends Path w/o INGRESS_PROTECTION to
NHs
(NHs send Resv to primary ingress PE5)
5. PE6 creates backup LSP to protect
ingress PE5 reusing FRR with changes to
existing procedures
Primary LSP
Backup LSP
Path Msg
Resv Msg
4. Primary ingress PE5 sends Resv w/
INGESS_PROTECTION to backup ingress PE6
after receiving Resv from NHs
6. Backup ingress PE6 sends Resv w/
INGRESS_PROTECTION to proxy ingress PE5’ (i.e.,
PE5 acting as PE5’)
PE7
P1
1
2
3
4
5
6
Special Handlings on Backup Ingress
Relay-Message Method:
1. After receiving Path with INGRESS_PROTECTION from primary ingress, it sends Resv with
INGRESS_PROTECTION to primary ingress, but does not reserve any resources
2. When detecting primary ingress failure, it must keep the state for the Path
message(s) originally received from the primary ingress, update the message(s) and put the message(s)
into the bypass LSP tunnel to the next hop(s) of the primary ingress. It keeps the state for the
Resv message(s) and update the message(s) such as setting Protection-in-use.
3. When the state for the Path message(s) is to be removed by Path Tear from primary ingress or refresh timer
expiration with primary ingress up, it tears down the backup LSP(s) through calling
existing functions
Proxy-Ingress Method:
1. After receiving Path with INGRESS_PROTECTION from proxy-ingress, it sends Path with INGRESS_PROTECTION to primary ingress, but does not reserve any
resources
2. After receiving Resv with INGRESS_PROTECTION from its next hop (i.e., primary ingress), it considers the case that no normal label is assigned by its next hop
(i.e., primary ingress). It does not assign a normal label for the interface from its upstream node (i.e., proxy ingress or primary
ingress), or write a cross connect from its upstream node to its next hop. It sends a Resv with INGRESS_PROTECTION to its upstream node (proxy-
ingress), but does not reserve any resource.
3. When detecting primary ingress failure, it can not get any Path messages from its previous hop (i.e., the proxy-ingress or the primary ingress), thus it must keep the state
for the Path message(s) originally received from the primary ingress, update the message(s) and put the message(s) into the bypass LSP tunnel to the next hop(s) of the
primary ingress. It can not send any Resv message(s) to its previous hop (i.e., the proxy-ingress or the primary ingress), thus it keeps the state for the Resv message(s)
originally received from its next hop (i.e., primary ingress) and update the message(s) such as setting Protection-in-use.
4. When the state for the Path message(s) is to be removed by Path Tear from primary ingress or refresh timer expiration with primary ingress up, it tears down the backup
LSP(s) through reusing FRR with changes
PE6
PE5
1. Ingress PE5 sends Path w/
INGRESS_PROTECTION to
backup ingress PE6 after
primary LSP is set up
3. PE6 sends PE5 Resv w/
INGRESS_PROTECTION
Primary LSP
Backup LSP
Path Msg
Resv Msg
PE7
P1
1
3
2. PE6 creates backup LSP to protect
PE5 through calling existing functions
2
0
LSP Path (ERO):
PE5’—PE6—PE5—NHs …
1. Proxy Ingress PE5’ (i.e., primary ingress PE5
acting as PE5’) sends Path w/
INGRESS_PROTECTION to backup ingress PE6
2. Backup ingress PE6 sends Path w/
INGRESS_PROTECTION to primary ingress PE5
PE1
PE2
PE6
PE5
PE4
PE3
PE5’
3. PE5 sends Path w/o INGRESS_PROTECTION to
NHs
(NHs send Resv to primary ingress PE5)
5. PE6 creates backup LSP to protect
ingress PE5 reusing FRR with changes to
existing procedures
Primary LSP
Backup LSP
Path Msg
Resv Msg
4. Primary ingress PE5 sends Resv w/
INGESS_PROTECTION to backup ingress PE6
after receiving Resv from NHs
6. Backup ingress PE6 sends Resv w/
INGRESS_PROTECTION to proxy ingress PE5’ (i.e.,
PE5 acting as PE5’)
PE7
P1
1
2
3
4
5
6
Backup LSP Creation
Relay-Message Method:
• Backup LSP creation through calling backup LSP
creation function and LFIB entry writing function to
import traffic from source into backup LSP.
Proxy-Ingress Method:
• Backup LSP creation reusing FRR with changes to existing procedures. The changes include: 1)
writing LFIB entry to import traffic from source into backup LSP instead of writing LFIB entry to
swap incoming label to outgoing label in date packet from upstream hop (i.e., proxy-ingress or
primary ingress, when primary ingress fails, traffic from source is imported to backup LSP on
backup ingress); 2) getting around the procedure that sets a flag in the LFIB entry indicating
inactive. The flag is used to activate the LFIB entry after failure of primary ingress is detected by
backup ingress. When source detect is used, the LFIB entry for backup LSP is active always and
thus setting the inactive flag needs to be prevented.
PE1
PE6
PE5
1. Ingress PE5 sends Path w/
INGRESS_PROTECTION to
backup ingress PE6 after
primary LSP is set up
3. PE6 sends PE5 Resv w/
INGRESS_PROTECTION
Primary LSP
Backup LSP
PE7
P1
1
3
2. PE6 creates backup LSP to protect
PE5 through calling existing functions
2
0
LSP Path (ERO):
PE5’—PE6—PE5—NHs …
1. Proxy Ingress PE5’ (i.e., primary ingress PE5
acting as PE5’) sends Path w/
INGRESS_PROTECTION to backup ingress PE6
2. Backup ingress PE6 sends Path w/
INGRESS_PROTECTION to primary ingress PE5
PE1
PE2
PE6
PE5
PE4
PE3
PE5’
3. PE5 sends Path w/o INGRESS_PROTECTION to
NHs
(NHs send Resv to primary ingress PE5)
5. PE6 creates backup LSP to protect
ingress PE5 reusing FRR with changes to
existing procedures
Primary LSP
Backup LSP
Path Msg
Resv Msg
4. Primary ingress PE5 sends Resv w/
INGESS_PROTECTION to backup ingress PE6
after receiving Resv from NHs
6. Backup ingress PE6 sends Resv w/
INGRESS_PROTECTION to proxy ingress PE5’ (i.e.,
PE5 acting as PE5’)
PE7
P1
1
2
3
4
5
6
Primary LSP Setup Time
Relay-Message Method:
• Primary LSP setup time after adding
ingress protection is the same as
before (i.e., without adding ingress
protection). The setup of primary LSP is
not touched after adding ingress
protection.
LSP Path (ERO):
PE5’—PE6—PE5—NHs …
1. Proxy Ingress PE5’ (i.e., primary ingress PE5
acting as PE5’) sends Path w/
INGRESS_PROTECTION to backup ingress PE6
2. Backup ingress PE6 sends Path w/
INGRESS_PROTECTION to primary ingress PE5
PE1
PE2
PE6
PE5
PE4
PE3
PE5’
3. PE5 sends Path w/o INGRESS_PROTECTION to
NHs
(NHs send Resv to primary ingress PE5)
5. PE6 creates backup LSP to protect
ingress PE5 reusing FRR with changes to
existing procedures
Primary LSP
Backup LSP
Path Msg
Resv Msg
4. Primary ingress PE5 sends Resv w/
INGESS_PROTECTION to backup ingress PE6
after receiving Resv from NHs
6. Backup ingress PE6 sends Resv w/
INGRESS_PROTECTION to proxy ingress PE5’ (i.e.,
PE5 acting as PE5’)
PE7
P1
1
2
3
4
5
6
Proxy-Ingress Method:
• Primary LSP setup time is longer after adding ingress protection. After adding ingress protection,
the signalling of primary LSP is changed and goes through two extra hops via backup ingress (i.e.,
from proxy-ingress (i.e., primary ingress) to backup ingress, from backup ingress to primary
ingress, and then from primary ingress to next hops of primary ingress).
PE1
PE2
PE6
PE5
PE4
PE3
1. Ingress PE5 sends Path w/
INGRESS_PROTECTION to
backup ingress PE6 after
primary LSP is set up
3. PE6 sends PE5 Resv w/
INGRESS_PROTECTION
Primary LSP
Backup LSP
Path Msg
Resv Msg
PE7
P1
1
3
2. PE6 creates backup LSP to protect
PE5 through calling existing functions
2
0
Session Maintenance on Primary Ingress
Relay-Message Method: (1 session)
1. Session (state) to backup ingress
(refer to 1 and 3)
Proxy-Ingress Method: (2 sessions)
1. Session (state) to backup ingress from proxy-ingress (i.e., “primary ingress”) (refer to 1 and 6)
2. Session (state) from backup ingress (refer to 2 and 4)
PE1
PE2
PE6
PE5
PE4
PE3
1. Ingress PE5 sends Path w/
INGRESS_PROTECTION to
backup ingress PE6 after
primary LSP is set up
3. PE6 sends PE5 Resv w/
INGRESS_PROTECTION
Primary LSP
Backup LSP
Path Msg
Resv Msg
PE7
P1
1
3
2. PE6 creates backup LSP to protect
PE5 through calling existing functions
2
LSP Path (ERO):
PE5’—PE6—PE5—NHs …
1. Proxy Ingress PE5’ (i.e., primary ingress PE5
acting as PE5’) sends Path w/
INGRESS_PROTECTION to backup ingress PE6
2. Backup ingress PE6 sends Path w/
INGRESS_PROTECTION to primary ingress PE5
PE1
PE2
PE6
PE5
PE4
PE3
PE5’
3. PE5 sends Path w/o INGRESS_PROTECTION to
NHs
(NHs send Resv to primary ingress PE5)
5. PE6 creates backup LSP to protect
ingress PE5 reusing FRR with changes to
existing procedures
Primary LSP
Backup LSP
Path Msg
Resv Msg
4. Primary ingress PE5 sends Resv w/
INGESS_PROTECTION to backup ingress PE6
after receiving Resv from NHs
6. Backup ingress PE6 sends Resv w/
INGRESS_PROTECTION to proxy ingress PE5’ (i.e.,
PE5 acting as PE5’)
PE7
P1
1
2
3
4
5
6
Session Maintenance on Backup Ingress
Relay-Message Method: (1 session)
1. Session (state) from primary ingress
(refer to 1 and 3)
Proxy-Ingress Method: (2 sessions)
1. Session (state) from (upstream node) proxy-ingress (i.e., “primary ingress”) (refer to 1 and 6)
2. Session (state) to (next hop) primary ingress (refer to 2 and 4)
LSP Path (ERO):
PE5’—PE6—PE5—NHs …
1. Proxy Ingress PE5’ (i.e., primary ingress PE5
acting as PE5’) sends Path w/
INGRESS_PROTECTION to backup ingress PE6
2. Backup ingress PE6 sends Path w/
INGRESS_PROTECTION to primary ingress PE5
PE1
PE2
PE6
PE5
PE4
PE3
PE5’
3. PE5 sends Path w/o INGRESS_PROTECTION to
NHs
(NHs send Resv to primary ingress PE5)
5. PE6 creates backup LSP to protect
ingress PE5 reusing FRR with changes to
existing procedures
Primary LSP
Backup LSP
Path Msg
Resv Msg
4. Primary ingress PE5 sends Resv w/
INGESS_PROTECTION to backup ingress PE6
after receiving Resv from NHs
6. Backup ingress PE6 sends Resv w/
INGRESS_PROTECTION to proxy ingress PE5’ (i.e.,
PE5 acting as PE5’)
PE7
P1
1
2
3
4
5
6
PE1
PE2
PE6
PE5
PE4
PE3
1. Ingress PE5 sends Path w/
INGRESS_PROTECTION to
backup ingress PE6 after
primary LSP is set up
3. PE6 sends PE5 Resv w/
INGRESS_PROTECTION
Primary LSP
Backup LSP
Path Msg
Resv Msg
PE7
P1
2
3
1
2. PE6 creates backup LSP to protect
PE5 through calling existing functions
Scalability
Relay-Message Method: (2 messages, 2 session states)
1. 2 session states
• one state for session on primary ingress (from primary ingress to backup ingress)
• one state for session on backup ingress (from primary ingress to backup ingress)
2. 2 messages
• Path Message with INGRESS_PROTECTION is sent
from primary ingress to backup ingress
• Resv Message with INGRESS_PROTECTION is sent
from backup ingress to primary ingress
Proxy-Ingress Method: (4 messages, 4 session states)
1. 4 session states
• 2 session states on primary ingress (one state for session from proxy-ingress (i.e., “primary
ingress”) to backup ingress; one state for session from backup ingress to primary ingress)
• 2 session states on backup ingress (one state for session from proxy-ingress (i.e., “primary
ingress”) to backup ingress; one state for session from backup ingress to primary ingress)
2. 4 messages
• Path Message with INGRESS_PROTECTION is sent
1) from proxy-ingress (i.e., primary ingress) to backup ingress and
2) from backup ingress to primary ingress
• Resv Message with INGRESS_PROTECTION is sent
1) from primary ingress to backup ingress and
2) from backup ingress to proxy-ingress (i.e., primary ingress)
Summary
Item  Method Relay-Message Proxy-Ingress
Configurations Less More
Primary LSP depends on backup
ingress somehow
No Yes
Control Message Overhead Less (2) More (4)
Special Handlings on Primary Ingress Less More
Special Handlings on Backup Ingress Less More
Backup LSP creation and deletion Through calling
existing functions
Reusing FRR with changes
to existing procedures
Primary LSP setup time after adding
ingress protection
Same as before Longer
Session State Overhead Less (2) More (4)
Scalability Higher(less
overheads)
Lower(more overheads)
Local Repair, Global Repair, On-Path
Procedure, Revert to Primary
Ingress, Backwards Compatibility,
Security Considerations
Common for two methods (with minor difference
for some cases)
Thanks
Local Repair on Backup Ingress
After detecting primary ingress failure, backup ingress does the followings
Relay-Message Method:
1. must keep the Path message(s) originally received from the primary ingress, update the message(s) and
put the message(s) into the bypass LSP tunnel to the next hop(s) of the primary ingress.
2. keep the Resv message(s) and update the message(s) such as setting Protection-in-use.
3. keep session from primary ingress (inactive)
Proxy-Ingress Method:
1. must keep the Path message(s) originally received from the primary ingress, update the message(s) and
put the message(s) into the bypass LSP tunnel to the next hop(s) of the primary ingress.
(since it can not get any Path messages from its previous hop (i.e., the proxy-ingress or the primary
ingress),
2. keep the Resv message(s) originally received from its next hop (i.e., primary ingress) and update the
message(s) such as setting Protection-in-use.
(since it can not send any Resv message(s) to its previous hop (i.e., the proxy-ingress or the primary
ingress)
3. keep session from (upstream node) proxy-ingress (i.e., “primary ingress”) (inactive)
4. Let session to (next hop) primary ingress down
1, 2 and 3 are common for two methods (note 3 considered to be common)
In summary, common for two methods with minor difference
Global Repair
After detecting primary ingress failure, backup ingress does the followings for global repair
(common for two methods)
Relay-Message Method:
Proxy-Ingress Method:
1. Compute a global optimal path
2. Set up a new LSP along the path with a different LSP ID
3. Switch traffic to the new LSP
4. Tear down the old LSP
Backwards Compatibility
Primary ingress sends Path message with INGRESS_PROTECTION to backup ingress.
If backup ingress does not support the extensions for ingress protection, then
Relay-Message Method:
• Primary ingress receives Path Err from backup ingress and sends Path Tear
to backup ingress
Proxy-Ingress Method:
• Proxy-ingress (i.e., “Primary ingress”) receives Path Err from backup ingress
and sends Path Tear to backup ingress
• Primary ingress changes the ERO and sends Path message with the
updated ERO to its next hops after determining that backup ingress does not
support ingress protection
common for two methods with minor difference
Details in Existing P2MP LSP Ingress &
Egress Protections
 To provide E2E P2MP LSP protection,a current
way (detail in next page)
Redundant Root and Every Leaf
Create two P2MP LSPs from root to leaves, carry the same data at
same time.
For each leaf, create a P2P LSP from the leaf to root and configure
BFD with it
Run iBGP on every leaf node and use P2P LSP as its next hop
When BFD detects P2P LSP failure, BGP withdraws route to root and
this makes the receiver switch to another leaf to get the data.
Details in Existing P2MP LSP Ingress & Egress
Protections (Cont)
P2MP
Multicast
Source
Multicast
Receiver
PE2
PE1
PE10
PE9CE2
CE1
CE4
CE1
Primary P2MP LSP
Backup P2MP LSP
PE7
PE8
CE3
IGMP Join
PE3
PE4
PE5
PE6
1. Double leaves
2. Two P2MP
LSP carry data
3. P2P LSP
(leafroot) with BFD
4. P2P LSP as NH
to SA, export route
for SA to receiver
5. Receiver
selects a leaf
accordingly
P2P LSP
Issues in Existing P2MP LSP Ingress
& Egress Protections
 Not easy to operate
– For each P2MP LSP branch/sub-LSP,
• need configure a reverse P2P LSP from leaf to root with BFD
• P2P LSP with BFD is used to detect failure of its corresponding P2MP sub-
LSP
 Not reliable
– The failure of reverse P2P LSP from leaf to root does not mean the failure of its
corresponding P2MP sub-LSP from root to leaf
 Consume lots of resource
– Reserve/use double bandwidth
 Speed of Global Recovery
– Depends on convergence of IGP and BGP
Advantages of P2MP LSP Ingress and Egress Local
Protection
 All parts of P2MP LSP are locally protected
 Only one P2MP LSP is used to implement an E2E protection
Normally two P2MP LSPs are used
 Big saving on resource : 50% bandwidth saving
No need to reserve/use double bandwidth
 Faster recovery
Speed of local protection recovery
Flow recovery within 50ms when a failure happens
 Easier to operate

More Related Content

Viewers also liked

Phân tích hoạt động sản xuất kinh doanh của công ty cổ phần đầu tư phát triển...
Phân tích hoạt động sản xuất kinh doanh của công ty cổ phần đầu tư phát triển...Phân tích hoạt động sản xuất kinh doanh của công ty cổ phần đầu tư phát triển...
Phân tích hoạt động sản xuất kinh doanh của công ty cổ phần đầu tư phát triển...Dương Hà
 
Quan tri lu hanh
Quan tri lu hanhQuan tri lu hanh
Quan tri lu hanhheoiu_9x
 
saigontourist
saigontouristsaigontourist
saigontouristHuy Vu
 
Nescafe collagen PR Plan - BMG
Nescafe collagen PR Plan - BMGNescafe collagen PR Plan - BMG
Nescafe collagen PR Plan - BMGIceCy Min
 
Marketing mix trong công ty lữ hành
Marketing mix trong công ty lữ hànhMarketing mix trong công ty lữ hành
Marketing mix trong công ty lữ hànhVương Hùng Vũ
 
GIỚI THIỆU, ĐỊNH VỊ, 4P CỦA SAIGONTOURIST
GIỚI THIỆU, ĐỊNH VỊ, 4P CỦA SAIGONTOURISTGIỚI THIỆU, ĐỊNH VỊ, 4P CỦA SAIGONTOURIST
GIỚI THIỆU, ĐỊNH VỊ, 4P CỦA SAIGONTOURISTSnownflake
 
Marketing dịch vụ - Xây dựng chiến lược marketing cho công ty du lịch Young T...
Marketing dịch vụ - Xây dựng chiến lược marketing cho công ty du lịch Young T...Marketing dịch vụ - Xây dựng chiến lược marketing cho công ty du lịch Young T...
Marketing dịch vụ - Xây dựng chiến lược marketing cho công ty du lịch Young T...Ngọc Hưng
 
Phân tích môi trường kinh doanh của công ty saigontourist
Phân tích môi trường kinh doanh của công ty saigontouristPhân tích môi trường kinh doanh của công ty saigontourist
Phân tích môi trường kinh doanh của công ty saigontouristIceCy Min
 
Phân tích môi trường vĩ mô của tour du lịch Nhật Bản
Phân tích môi trường vĩ mô của tour du lịch Nhật BảnPhân tích môi trường vĩ mô của tour du lịch Nhật Bản
Phân tích môi trường vĩ mô của tour du lịch Nhật Bảnmubiuhuong
 

Viewers also liked (9)

Phân tích hoạt động sản xuất kinh doanh của công ty cổ phần đầu tư phát triển...
Phân tích hoạt động sản xuất kinh doanh của công ty cổ phần đầu tư phát triển...Phân tích hoạt động sản xuất kinh doanh của công ty cổ phần đầu tư phát triển...
Phân tích hoạt động sản xuất kinh doanh của công ty cổ phần đầu tư phát triển...
 
Quan tri lu hanh
Quan tri lu hanhQuan tri lu hanh
Quan tri lu hanh
 
saigontourist
saigontouristsaigontourist
saigontourist
 
Nescafe collagen PR Plan - BMG
Nescafe collagen PR Plan - BMGNescafe collagen PR Plan - BMG
Nescafe collagen PR Plan - BMG
 
Marketing mix trong công ty lữ hành
Marketing mix trong công ty lữ hànhMarketing mix trong công ty lữ hành
Marketing mix trong công ty lữ hành
 
GIỚI THIỆU, ĐỊNH VỊ, 4P CỦA SAIGONTOURIST
GIỚI THIỆU, ĐỊNH VỊ, 4P CỦA SAIGONTOURISTGIỚI THIỆU, ĐỊNH VỊ, 4P CỦA SAIGONTOURIST
GIỚI THIỆU, ĐỊNH VỊ, 4P CỦA SAIGONTOURIST
 
Marketing dịch vụ - Xây dựng chiến lược marketing cho công ty du lịch Young T...
Marketing dịch vụ - Xây dựng chiến lược marketing cho công ty du lịch Young T...Marketing dịch vụ - Xây dựng chiến lược marketing cho công ty du lịch Young T...
Marketing dịch vụ - Xây dựng chiến lược marketing cho công ty du lịch Young T...
 
Phân tích môi trường kinh doanh của công ty saigontourist
Phân tích môi trường kinh doanh của công ty saigontouristPhân tích môi trường kinh doanh của công ty saigontourist
Phân tích môi trường kinh doanh của công ty saigontourist
 
Phân tích môi trường vĩ mô của tour du lịch Nhật Bản
Phân tích môi trường vĩ mô của tour du lịch Nhật BảnPhân tích môi trường vĩ mô của tour du lịch Nhật Bản
Phân tích môi trường vĩ mô của tour du lịch Nhật Bản
 

Similar to Analysis 2-methods-02p

Analysis 2-methods
Analysis 2-methodsAnalysis 2-methods
Analysis 2-methodsHuaimo Chen
 
ROPInjector-Slides - Using-Return-Oriented-Programming-For-Polymorphism-And-A...
ROPInjector-Slides - Using-Return-Oriented-Programming-For-Polymorphism-And-A...ROPInjector-Slides - Using-Return-Oriented-Programming-For-Polymorphism-And-A...
ROPInjector-Slides - Using-Return-Oriented-Programming-For-Polymorphism-And-A...distortdistort
 
White Paper: Perforce Administration Optimization, Scalability, Availability ...
White Paper: Perforce Administration Optimization, Scalability, Availability ...White Paper: Perforce Administration Optimization, Scalability, Availability ...
White Paper: Perforce Administration Optimization, Scalability, Availability ...Perforce
 
[MathWorks] Versioning Infrastructure
[MathWorks] Versioning Infrastructure[MathWorks] Versioning Infrastructure
[MathWorks] Versioning InfrastructurePerforce
 
Riding the Overflow - Then and Now
Riding the Overflow - Then and NowRiding the Overflow - Then and Now
Riding the Overflow - Then and NowMiroslav Stampar
 
Reversing malware analysis training part4 assembly programming basics
Reversing malware analysis training part4 assembly programming basicsReversing malware analysis training part4 assembly programming basics
Reversing malware analysis training part4 assembly programming basicsCysinfo Cyber Security Community
 
LTE paging.ppt
LTE paging.pptLTE paging.ppt
LTE paging.pptmravi423
 
Everybody Polyglot! - Cross-Language RPC with Erlang
Everybody Polyglot! - Cross-Language RPC with ErlangEverybody Polyglot! - Cross-Language RPC with Erlang
Everybody Polyglot! - Cross-Language RPC with ErlangRusty Klophaus
 
Exploit techniques - a quick review
Exploit techniques - a quick reviewExploit techniques - a quick review
Exploit techniques - a quick reviewCe.Se.N.A. Security
 
Protecting the Privacy of the Network – Using P4 to Prototype and Extend Netw...
Protecting the Privacy of the Network – Using P4 to Prototype and Extend Netw...Protecting the Privacy of the Network – Using P4 to Prototype and Extend Netw...
Protecting the Privacy of the Network – Using P4 to Prototype and Extend Netw...Open-NFP
 
MPLS Deployment Chapter 1 - Basic
MPLS Deployment Chapter 1 - BasicMPLS Deployment Chapter 1 - Basic
MPLS Deployment Chapter 1 - BasicEricsson
 
PLNOG 7: Rafał Szarecki - MPLS in an advanced version
PLNOG 7: Rafał Szarecki - MPLS in an advanced versionPLNOG 7: Rafał Szarecki - MPLS in an advanced version
PLNOG 7: Rafał Szarecki - MPLS in an advanced versionPROIDEA
 
Resource reservation protocol
Resource reservation protocolResource reservation protocol
Resource reservation protocolAtakan ATAK
 
Genomics Is Not Special: Towards Data Intensive Biology
Genomics Is Not Special: Towards Data Intensive BiologyGenomics Is Not Special: Towards Data Intensive Biology
Genomics Is Not Special: Towards Data Intensive BiologyUri Laserson
 
ACI MultiFabric 소개
ACI MultiFabric 소개ACI MultiFabric 소개
ACI MultiFabric 소개Woo Hyung Choi
 
iptable casestudy by sans.pdf
iptable casestudy by sans.pdfiptable casestudy by sans.pdf
iptable casestudy by sans.pdfAdmin621695
 

Similar to Analysis 2-methods-02p (20)

Analysis 2-methods
Analysis 2-methodsAnalysis 2-methods
Analysis 2-methods
 
ROPInjector-Slides - Using-Return-Oriented-Programming-For-Polymorphism-And-A...
ROPInjector-Slides - Using-Return-Oriented-Programming-For-Polymorphism-And-A...ROPInjector-Slides - Using-Return-Oriented-Programming-For-Polymorphism-And-A...
ROPInjector-Slides - Using-Return-Oriented-Programming-For-Polymorphism-And-A...
 
White Paper: Perforce Administration Optimization, Scalability, Availability ...
White Paper: Perforce Administration Optimization, Scalability, Availability ...White Paper: Perforce Administration Optimization, Scalability, Availability ...
White Paper: Perforce Administration Optimization, Scalability, Availability ...
 
[MathWorks] Versioning Infrastructure
[MathWorks] Versioning Infrastructure[MathWorks] Versioning Infrastructure
[MathWorks] Versioning Infrastructure
 
Hadoop - Apache Pig
Hadoop - Apache PigHadoop - Apache Pig
Hadoop - Apache Pig
 
Riding the Overflow - Then and Now
Riding the Overflow - Then and NowRiding the Overflow - Then and Now
Riding the Overflow - Then and Now
 
netLec2.pdf
netLec2.pdfnetLec2.pdf
netLec2.pdf
 
OSPFv2 on IOS XR
OSPFv2 on IOS XROSPFv2 on IOS XR
OSPFv2 on IOS XR
 
Reversing malware analysis training part4 assembly programming basics
Reversing malware analysis training part4 assembly programming basicsReversing malware analysis training part4 assembly programming basics
Reversing malware analysis training part4 assembly programming basics
 
LTE paging.ppt
LTE paging.pptLTE paging.ppt
LTE paging.ppt
 
Everybody Polyglot! - Cross-Language RPC with Erlang
Everybody Polyglot! - Cross-Language RPC with ErlangEverybody Polyglot! - Cross-Language RPC with Erlang
Everybody Polyglot! - Cross-Language RPC with Erlang
 
Exploit techniques - a quick review
Exploit techniques - a quick reviewExploit techniques - a quick review
Exploit techniques - a quick review
 
What`s new in Java 7
What`s new in Java 7What`s new in Java 7
What`s new in Java 7
 
Protecting the Privacy of the Network – Using P4 to Prototype and Extend Netw...
Protecting the Privacy of the Network – Using P4 to Prototype and Extend Netw...Protecting the Privacy of the Network – Using P4 to Prototype and Extend Netw...
Protecting the Privacy of the Network – Using P4 to Prototype and Extend Netw...
 
MPLS Deployment Chapter 1 - Basic
MPLS Deployment Chapter 1 - BasicMPLS Deployment Chapter 1 - Basic
MPLS Deployment Chapter 1 - Basic
 
PLNOG 7: Rafał Szarecki - MPLS in an advanced version
PLNOG 7: Rafał Szarecki - MPLS in an advanced versionPLNOG 7: Rafał Szarecki - MPLS in an advanced version
PLNOG 7: Rafał Szarecki - MPLS in an advanced version
 
Resource reservation protocol
Resource reservation protocolResource reservation protocol
Resource reservation protocol
 
Genomics Is Not Special: Towards Data Intensive Biology
Genomics Is Not Special: Towards Data Intensive BiologyGenomics Is Not Special: Towards Data Intensive Biology
Genomics Is Not Special: Towards Data Intensive Biology
 
ACI MultiFabric 소개
ACI MultiFabric 소개ACI MultiFabric 소개
ACI MultiFabric 소개
 
iptable casestudy by sans.pdf
iptable casestudy by sans.pdfiptable casestudy by sans.pdf
iptable casestudy by sans.pdf
 

Recently uploaded

Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxMuhammadAsimMuhammad6
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...gragchanchal546
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiessarkmank1
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 

Recently uploaded (20)

Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 

Analysis 2-methods-02p

  • 1. Analysis on Two Methods in Ingress Local Protection
  • 2. Contents • Introduction • Descriptions on Two Methods • Analysis on Two Methods
  • 3. Introduction Important to have Ingress/Egress Local Protection • Faster than E2E global protection for ingress/egress • More Scalable since keeping less states and using less resources • Easier to operate and maintain In Ingress Local Protection: Relay-Message or Proxy-Ingress can be used to transfer information about ingress local protection from primary ingress to backup ingress They are described in the following slides Detailed analysis on them are given for your reference
  • 4. Contents • Introduction • Descriptions on Two Methods  Changes for Relay-Message vs. Proxy- Ingress  Relay-Message with Example  Proxy-Ingress with Example • Analysis on Two Methods
  • 5. Changes for Relay-Message vs. Proxy-Ingress Changes for Relay-Message Changes for Proxy-Ingress 1) Primary ingress sends Path messages with Ingress-Protection object to backup ingress after the primary LSP is set up. 1) Primary ingress handles the configuration of proxy-ingress or generates the information for the proxy-ingress and makes sure that the proxy-ingress address generated does not cause a loop. 2) Backup ingress creates backup LSP to locally protect the primary ingress after receiving Path message with Ingress-Protection object, and sends Resv message with Ingress-Protection object to primary ingress. 2) Primary ingress specially processes all possible abnormal cases happening in the backup ingress and in the path segment between the proxy ingress (i.e., the primary ingress), backup ingress and the primary ingress. These are changes to the existing RSVP-TE protocol, especially mixed with signaling for the primary LSP. 3) Primary ingress records the status of ingress protection after receiving Resv message with Ingress-Protection object. 3) Primary ingress changes the path for the primary LSP. The new path for the LSP will be: the proxy-ingress (i.e., the primary ingress), the backup ingress, the primary ingress, the next hop(s) of the primary ingress, and so on. 4) Primary ingress adds a new object (Ingress-Protection) into the Path and Resv messages for the primary LSP to the backup ingress. 5) Primary ingress specially handles the Path and Resv messages w/ Ingress-Protection for the primary LSP from and/or to the backup ingress. 6) Backup ingress specially handles the Path and Resv messages w/ Ingress-Protection for the primary LSP from and/or to the primary ingress. The procedures on the backup ingress for specially handling the Path and Resv messages are different from those on the primary ingress. When the primary ingress fails, the backup ingress can not get any Path messages from the primary ingress (i.e., the proxy- ingress or the primary ingress), thus it must keep the Path message(s) originally received from the primary ingress, update the message(s) and put the message(s) into the bypass LSP tunnel to the next hop(s) of the primary ingress. When the primary ingress fails, the backup ingress can not send any Resv message(s) to its primary ingress (i.e., its previous hop proxy-ingress or the primary ingress), thus it should keep the Resv message(s) originally received and update the message(s) such as setting Protection-in-use. 5
  • 6. 6 Relay-Message Method with Example PE1 PE2 PE6 PE5 PE4 PE3 1. Ingress PE5 sends Path w/ INGRESS_PROTECTION to backup ingress PE6 after primary LSP is set up 2. PE6 creates backup LSP to protect PE5 through calling existing functions 3. PE6 sends PE5 Resv w/ INGRESS_PROTECTION Primary LSP Backup LSP Path Msg Resv Msg PE7 P1 1 2 3 0
  • 7. 7 LSP Path (ERO): PE5’—PE6—PE5—NHs … 1. Proxy Ingress PE5’ (i.e., primary ingress PE5 acting as PE5’) sends Path w/ INGRESS_PROTECTION to backup ingress PE6 2. Backup ingress PE6 sends Path w/ INGRESS_PROTECTION to primary ingress PE5 PE1 PE2 PE6 PE5 PE4 PE3 PE5’ Primary ingress PE5 : • Detects failures of backup ingress PE6, handles failures and abnormal cases in PE6 and path segments between proxy ingress and backup ingress (and between primary ingress and backup ingress), and changes the signaling path for the primary LSP when a failure or abnormal event happens in the backup ingress or the path segments. • Processes configuration for Proxy-ingress or generates the information for the proxy-ingress and makes sure that the proxy-ingress address generated does not cause a loop 3. PE5 sends Path w/o INGRESS_PROTECTION to NHs (NHs send Resv to primary ingress PE5) 5. PE6 creates backup LSP to protect ingress PE5 reusing FRR with changes to existing procedures Proxy-Ingress Method with Example Primary LSP Backup LSP Path Msg Resv Msg 4. Primary ingress PE5 sends Resv w/ INGESS_PROTECTION to backup ingress PE6 after receiving Resv from NHs 6. Backup ingress PE6 sends Resv w/ INGRESS_PROTECTION to proxy ingress PE5’ (i.e., PE5 acting as PE5’) PE7 P1 1 2 3 4 5 6
  • 8. Contents • Introduction • Descriptions on Two Methods • Analysis on Two Methods  Configurations  Primary LSP Dependency  Message Overhead  Special Handlings on Primary Ingress  Special Handlings on Backup Ingress  Backup LSP Creation  Primary LSP Setup Time  Session Maintenance  Scalability  Summary on Analysis
  • 9. Configurations Relay-Message Method: • Configure backup ingress Proxy-Ingress Method: • Configure backup ingress • Configure proxy-ingress or generate the information for the proxy-ingress and make sure that the proxy-ingress address generated does not cause a loop
  • 10. Primary LSP Dependency Relay-Message Method: • Primary LSP is independent of the backup ingress. The establishment of primary LSP is not touched by adding ingress protection Proxy-Ingress Method: • The primary LSP depends on the backup ingress somehow. The creation of primary LSP is changed for providing ingress protection. For example, the signaling messages for the primary LSP goes from the primary ingress (acting as the proxy ingress) to the backup ingress, to the primary ingress and then to the next hop(s) of the primary ingress. Thus abnormal events on backup ingress may affect the primary LSP. PE1 P PE6 PE5 P 1. Ingress PE5 sends Path w/ INGRESS_PROTECTION to backup ingress PE6 after primary LSP is set up 3. PE6 sends PE5 Resv w/ INGRESS_PROTECTION Primary LSP Backup LSP Path M Resv M PE7 P1 1 3 2. PE6 creates backup LSP to protect PE5 through calling existing functions 2 0 LSP Path (ERO): PE5’—PE6—PE5—NHs … 1. Proxy Ingress PE5’ (i.e., primary ingress PE5 acting as PE5’) sends Path w/ INGRESS_PROTECTION to backup ingress PE6 2. Backup ingress PE6 sends Path w/ INGRESS_PROTECTION to primary ingress PE5 PE1 PE2 PE6 PE5 PE4 PE3 PE5’ 3. PE5 sends Path w/o INGRESS_PROTECTION to NHs (NHs send Resv to primary ingress PE5) 5. PE6 creates backup LSP to protect ingress PE5 reusing FRR with changes to existing procedures Primary LSP Backup LSP Path Msg Resv Msg 4. Primary ingress PE5 sends Resv w/ INGESS_PROTECTION to backup ingress PE6 after receiving Resv from NHs 6. Backup ingress PE6 sends Resv w/ INGRESS_PROTECTION to proxy ingress PE5’ (i.e., PE5 acting as PE5’) PE7 P1 1 2 3 4 5 6
  • 11. Message Overhead Relay-Message Method (2 messages): • Path Message with INGRESS_PROTECTION is sent  from primary ingress to backup ingress • Resv Message with INGRESS_PROTECTION is sent  from backup ingress to primary ingress Proxy-Ingress Method (4 messages): • Path Message with INGRESS_PROTECTION is sent  from proxy-ingress (i.e., primary ingress) to backup ingress and  from backup ingress to primary ingress • Resv Message with INGRESS_PROTECTION is sent  from primary ingress to backup ingress and  from backup ingress to proxy-ingress (i.e., primary ingress) PE PE6 PE5 1. Ingress PE5 sends Path w/ INGRESS_PROTECTION to backup ingress PE6 after primary LSP is set up 3. PE6 sends PE5 Resv w/ INGRESS_PROTECTION Primary LSP Backup LSP PE7 P1 1 3 2 0 LSP Path (ERO): PE5’—PE6—PE5—NHs … 1. Proxy Ingress PE5’ (i.e., primary ingress PE5 acting as PE5’) sends Path w/ INGRESS_PROTECTION to backup ingress PE6 2. Backup ingress PE6 sends Path w/ INGRESS_PROTECTION to primary ingress PE5 PE1 PE2 PE6 PE5 PE4 PE3 PE5’ Primary LSP Backup LSP Path Msg Resv Msg 4. Primary ingress PE5 sends Resv w/ INGESS_PROTECTION to backup ingress PE6 after receiving Resv from NHs 6. Backup ingress PE6 sends Resv w/ INGRESS_PROTECTION to proxy ingress PE5’ (i.e., PE5 acting as PE5’) PE7 P1 1 2 3 4 5 6
  • 12. Special Handlings on Primary Ingress Relay-Message Method: 1. sends Path with INGRESS_PROTECTION to backup ingress after primary LSP is set up 2. stores states after receiving Resv with INGRESS_PROTECTION from backup ingress 3. removes session to backup ingress when tearing down primary LSP (or failure or abnormal events in backup ingress occur) 4. refreshes session to backup ingress when refreshing primary LSP Proxy-Ingress Method: 1. changes the ERO for primary LSP (ERO: proxy-ingress  backup ingress primary ingress  next hop  …) 2. sends Path with INGRESS_PROTECTION to backup ingress after changing the ERO 3. sends Path without INGRESS_PROTECTION to next hop after receiving Path with INGRESS_PROTECTION from backup ingress 4. After receiving Resv without INGRESS_PROTECTION from next hop, it does not assign a normal label for the interface from its upstream node (backup ingress), or write a cross connect from its upstream node to its next hop; it sends Resv with INGRESS_PROTECTION to its upstream node (i.e., backup ingress). 5. After receiving Resv with INGRESS_PROTECTION from backup ingress, stores states and write LFIB for primary LSP 6. detects failures of the backup ingress, handles failures and other abnormal events happening in the backup ingress and the path segments between proxy ingress and backup ingress (and between primary ingress and backup ingress), and changes the signaling path for the primary LSP when a failure or abnormal event happens in the backup ingress or the path segments. P PE6 PE5 1. Ingress PE5 sends Path w/ INGRESS_PROTECTION to backup ingress PE6 after primary LSP is set up 3. PE6 sends PE5 Resv w/ INGRESS_PROTECTION Primary LSP Backup LSP PE7 P1 1 3 2. PE6 creates backup LSP to protect PE5 through calling existing functions 2 0 LSP Path (ERO): PE5’—PE6—PE5—NHs … 1. Proxy Ingress PE5’ (i.e., primary ingress PE5 acting as PE5’) sends Path w/ INGRESS_PROTECTION to backup ingress PE6 2. Backup ingress PE6 sends Path w/ INGRESS_PROTECTION to primary ingress PE5 PE1 PE2 PE6 PE5 PE4 PE3 PE5’ 3. PE5 sends Path w/o INGRESS_PROTECTION to NHs (NHs send Resv to primary ingress PE5) 5. PE6 creates backup LSP to protect ingress PE5 reusing FRR with changes to existing procedures Primary LSP Backup LSP Path Msg Resv Msg 4. Primary ingress PE5 sends Resv w/ INGESS_PROTECTION to backup ingress PE6 after receiving Resv from NHs 6. Backup ingress PE6 sends Resv w/ INGRESS_PROTECTION to proxy ingress PE5’ (i.e., PE5 acting as PE5’) PE7 P1 1 2 3 4 5 6
  • 13. Special Handlings on Backup Ingress Relay-Message Method: 1. After receiving Path with INGRESS_PROTECTION from primary ingress, it sends Resv with INGRESS_PROTECTION to primary ingress, but does not reserve any resources 2. When detecting primary ingress failure, it must keep the state for the Path message(s) originally received from the primary ingress, update the message(s) and put the message(s) into the bypass LSP tunnel to the next hop(s) of the primary ingress. It keeps the state for the Resv message(s) and update the message(s) such as setting Protection-in-use. 3. When the state for the Path message(s) is to be removed by Path Tear from primary ingress or refresh timer expiration with primary ingress up, it tears down the backup LSP(s) through calling existing functions Proxy-Ingress Method: 1. After receiving Path with INGRESS_PROTECTION from proxy-ingress, it sends Path with INGRESS_PROTECTION to primary ingress, but does not reserve any resources 2. After receiving Resv with INGRESS_PROTECTION from its next hop (i.e., primary ingress), it considers the case that no normal label is assigned by its next hop (i.e., primary ingress). It does not assign a normal label for the interface from its upstream node (i.e., proxy ingress or primary ingress), or write a cross connect from its upstream node to its next hop. It sends a Resv with INGRESS_PROTECTION to its upstream node (proxy- ingress), but does not reserve any resource. 3. When detecting primary ingress failure, it can not get any Path messages from its previous hop (i.e., the proxy-ingress or the primary ingress), thus it must keep the state for the Path message(s) originally received from the primary ingress, update the message(s) and put the message(s) into the bypass LSP tunnel to the next hop(s) of the primary ingress. It can not send any Resv message(s) to its previous hop (i.e., the proxy-ingress or the primary ingress), thus it keeps the state for the Resv message(s) originally received from its next hop (i.e., primary ingress) and update the message(s) such as setting Protection-in-use. 4. When the state for the Path message(s) is to be removed by Path Tear from primary ingress or refresh timer expiration with primary ingress up, it tears down the backup LSP(s) through reusing FRR with changes PE6 PE5 1. Ingress PE5 sends Path w/ INGRESS_PROTECTION to backup ingress PE6 after primary LSP is set up 3. PE6 sends PE5 Resv w/ INGRESS_PROTECTION Primary LSP Backup LSP Path Msg Resv Msg PE7 P1 1 3 2. PE6 creates backup LSP to protect PE5 through calling existing functions 2 0 LSP Path (ERO): PE5’—PE6—PE5—NHs … 1. Proxy Ingress PE5’ (i.e., primary ingress PE5 acting as PE5’) sends Path w/ INGRESS_PROTECTION to backup ingress PE6 2. Backup ingress PE6 sends Path w/ INGRESS_PROTECTION to primary ingress PE5 PE1 PE2 PE6 PE5 PE4 PE3 PE5’ 3. PE5 sends Path w/o INGRESS_PROTECTION to NHs (NHs send Resv to primary ingress PE5) 5. PE6 creates backup LSP to protect ingress PE5 reusing FRR with changes to existing procedures Primary LSP Backup LSP Path Msg Resv Msg 4. Primary ingress PE5 sends Resv w/ INGESS_PROTECTION to backup ingress PE6 after receiving Resv from NHs 6. Backup ingress PE6 sends Resv w/ INGRESS_PROTECTION to proxy ingress PE5’ (i.e., PE5 acting as PE5’) PE7 P1 1 2 3 4 5 6
  • 14. Backup LSP Creation Relay-Message Method: • Backup LSP creation through calling backup LSP creation function and LFIB entry writing function to import traffic from source into backup LSP. Proxy-Ingress Method: • Backup LSP creation reusing FRR with changes to existing procedures. The changes include: 1) writing LFIB entry to import traffic from source into backup LSP instead of writing LFIB entry to swap incoming label to outgoing label in date packet from upstream hop (i.e., proxy-ingress or primary ingress, when primary ingress fails, traffic from source is imported to backup LSP on backup ingress); 2) getting around the procedure that sets a flag in the LFIB entry indicating inactive. The flag is used to activate the LFIB entry after failure of primary ingress is detected by backup ingress. When source detect is used, the LFIB entry for backup LSP is active always and thus setting the inactive flag needs to be prevented. PE1 PE6 PE5 1. Ingress PE5 sends Path w/ INGRESS_PROTECTION to backup ingress PE6 after primary LSP is set up 3. PE6 sends PE5 Resv w/ INGRESS_PROTECTION Primary LSP Backup LSP PE7 P1 1 3 2. PE6 creates backup LSP to protect PE5 through calling existing functions 2 0 LSP Path (ERO): PE5’—PE6—PE5—NHs … 1. Proxy Ingress PE5’ (i.e., primary ingress PE5 acting as PE5’) sends Path w/ INGRESS_PROTECTION to backup ingress PE6 2. Backup ingress PE6 sends Path w/ INGRESS_PROTECTION to primary ingress PE5 PE1 PE2 PE6 PE5 PE4 PE3 PE5’ 3. PE5 sends Path w/o INGRESS_PROTECTION to NHs (NHs send Resv to primary ingress PE5) 5. PE6 creates backup LSP to protect ingress PE5 reusing FRR with changes to existing procedures Primary LSP Backup LSP Path Msg Resv Msg 4. Primary ingress PE5 sends Resv w/ INGESS_PROTECTION to backup ingress PE6 after receiving Resv from NHs 6. Backup ingress PE6 sends Resv w/ INGRESS_PROTECTION to proxy ingress PE5’ (i.e., PE5 acting as PE5’) PE7 P1 1 2 3 4 5 6
  • 15. Primary LSP Setup Time Relay-Message Method: • Primary LSP setup time after adding ingress protection is the same as before (i.e., without adding ingress protection). The setup of primary LSP is not touched after adding ingress protection. LSP Path (ERO): PE5’—PE6—PE5—NHs … 1. Proxy Ingress PE5’ (i.e., primary ingress PE5 acting as PE5’) sends Path w/ INGRESS_PROTECTION to backup ingress PE6 2. Backup ingress PE6 sends Path w/ INGRESS_PROTECTION to primary ingress PE5 PE1 PE2 PE6 PE5 PE4 PE3 PE5’ 3. PE5 sends Path w/o INGRESS_PROTECTION to NHs (NHs send Resv to primary ingress PE5) 5. PE6 creates backup LSP to protect ingress PE5 reusing FRR with changes to existing procedures Primary LSP Backup LSP Path Msg Resv Msg 4. Primary ingress PE5 sends Resv w/ INGESS_PROTECTION to backup ingress PE6 after receiving Resv from NHs 6. Backup ingress PE6 sends Resv w/ INGRESS_PROTECTION to proxy ingress PE5’ (i.e., PE5 acting as PE5’) PE7 P1 1 2 3 4 5 6 Proxy-Ingress Method: • Primary LSP setup time is longer after adding ingress protection. After adding ingress protection, the signalling of primary LSP is changed and goes through two extra hops via backup ingress (i.e., from proxy-ingress (i.e., primary ingress) to backup ingress, from backup ingress to primary ingress, and then from primary ingress to next hops of primary ingress). PE1 PE2 PE6 PE5 PE4 PE3 1. Ingress PE5 sends Path w/ INGRESS_PROTECTION to backup ingress PE6 after primary LSP is set up 3. PE6 sends PE5 Resv w/ INGRESS_PROTECTION Primary LSP Backup LSP Path Msg Resv Msg PE7 P1 1 3 2. PE6 creates backup LSP to protect PE5 through calling existing functions 2 0
  • 16. Session Maintenance on Primary Ingress Relay-Message Method: (1 session) 1. Session (state) to backup ingress (refer to 1 and 3) Proxy-Ingress Method: (2 sessions) 1. Session (state) to backup ingress from proxy-ingress (i.e., “primary ingress”) (refer to 1 and 6) 2. Session (state) from backup ingress (refer to 2 and 4) PE1 PE2 PE6 PE5 PE4 PE3 1. Ingress PE5 sends Path w/ INGRESS_PROTECTION to backup ingress PE6 after primary LSP is set up 3. PE6 sends PE5 Resv w/ INGRESS_PROTECTION Primary LSP Backup LSP Path Msg Resv Msg PE7 P1 1 3 2. PE6 creates backup LSP to protect PE5 through calling existing functions 2 LSP Path (ERO): PE5’—PE6—PE5—NHs … 1. Proxy Ingress PE5’ (i.e., primary ingress PE5 acting as PE5’) sends Path w/ INGRESS_PROTECTION to backup ingress PE6 2. Backup ingress PE6 sends Path w/ INGRESS_PROTECTION to primary ingress PE5 PE1 PE2 PE6 PE5 PE4 PE3 PE5’ 3. PE5 sends Path w/o INGRESS_PROTECTION to NHs (NHs send Resv to primary ingress PE5) 5. PE6 creates backup LSP to protect ingress PE5 reusing FRR with changes to existing procedures Primary LSP Backup LSP Path Msg Resv Msg 4. Primary ingress PE5 sends Resv w/ INGESS_PROTECTION to backup ingress PE6 after receiving Resv from NHs 6. Backup ingress PE6 sends Resv w/ INGRESS_PROTECTION to proxy ingress PE5’ (i.e., PE5 acting as PE5’) PE7 P1 1 2 3 4 5 6
  • 17. Session Maintenance on Backup Ingress Relay-Message Method: (1 session) 1. Session (state) from primary ingress (refer to 1 and 3) Proxy-Ingress Method: (2 sessions) 1. Session (state) from (upstream node) proxy-ingress (i.e., “primary ingress”) (refer to 1 and 6) 2. Session (state) to (next hop) primary ingress (refer to 2 and 4) LSP Path (ERO): PE5’—PE6—PE5—NHs … 1. Proxy Ingress PE5’ (i.e., primary ingress PE5 acting as PE5’) sends Path w/ INGRESS_PROTECTION to backup ingress PE6 2. Backup ingress PE6 sends Path w/ INGRESS_PROTECTION to primary ingress PE5 PE1 PE2 PE6 PE5 PE4 PE3 PE5’ 3. PE5 sends Path w/o INGRESS_PROTECTION to NHs (NHs send Resv to primary ingress PE5) 5. PE6 creates backup LSP to protect ingress PE5 reusing FRR with changes to existing procedures Primary LSP Backup LSP Path Msg Resv Msg 4. Primary ingress PE5 sends Resv w/ INGESS_PROTECTION to backup ingress PE6 after receiving Resv from NHs 6. Backup ingress PE6 sends Resv w/ INGRESS_PROTECTION to proxy ingress PE5’ (i.e., PE5 acting as PE5’) PE7 P1 1 2 3 4 5 6 PE1 PE2 PE6 PE5 PE4 PE3 1. Ingress PE5 sends Path w/ INGRESS_PROTECTION to backup ingress PE6 after primary LSP is set up 3. PE6 sends PE5 Resv w/ INGRESS_PROTECTION Primary LSP Backup LSP Path Msg Resv Msg PE7 P1 2 3 1 2. PE6 creates backup LSP to protect PE5 through calling existing functions
  • 18. Scalability Relay-Message Method: (2 messages, 2 session states) 1. 2 session states • one state for session on primary ingress (from primary ingress to backup ingress) • one state for session on backup ingress (from primary ingress to backup ingress) 2. 2 messages • Path Message with INGRESS_PROTECTION is sent from primary ingress to backup ingress • Resv Message with INGRESS_PROTECTION is sent from backup ingress to primary ingress Proxy-Ingress Method: (4 messages, 4 session states) 1. 4 session states • 2 session states on primary ingress (one state for session from proxy-ingress (i.e., “primary ingress”) to backup ingress; one state for session from backup ingress to primary ingress) • 2 session states on backup ingress (one state for session from proxy-ingress (i.e., “primary ingress”) to backup ingress; one state for session from backup ingress to primary ingress) 2. 4 messages • Path Message with INGRESS_PROTECTION is sent 1) from proxy-ingress (i.e., primary ingress) to backup ingress and 2) from backup ingress to primary ingress • Resv Message with INGRESS_PROTECTION is sent 1) from primary ingress to backup ingress and 2) from backup ingress to proxy-ingress (i.e., primary ingress)
  • 19. Summary Item Method Relay-Message Proxy-Ingress Configurations Less More Primary LSP depends on backup ingress somehow No Yes Control Message Overhead Less (2) More (4) Special Handlings on Primary Ingress Less More Special Handlings on Backup Ingress Less More Backup LSP creation and deletion Through calling existing functions Reusing FRR with changes to existing procedures Primary LSP setup time after adding ingress protection Same as before Longer Session State Overhead Less (2) More (4) Scalability Higher(less overheads) Lower(more overheads) Local Repair, Global Repair, On-Path Procedure, Revert to Primary Ingress, Backwards Compatibility, Security Considerations Common for two methods (with minor difference for some cases)
  • 21. Local Repair on Backup Ingress After detecting primary ingress failure, backup ingress does the followings Relay-Message Method: 1. must keep the Path message(s) originally received from the primary ingress, update the message(s) and put the message(s) into the bypass LSP tunnel to the next hop(s) of the primary ingress. 2. keep the Resv message(s) and update the message(s) such as setting Protection-in-use. 3. keep session from primary ingress (inactive) Proxy-Ingress Method: 1. must keep the Path message(s) originally received from the primary ingress, update the message(s) and put the message(s) into the bypass LSP tunnel to the next hop(s) of the primary ingress. (since it can not get any Path messages from its previous hop (i.e., the proxy-ingress or the primary ingress), 2. keep the Resv message(s) originally received from its next hop (i.e., primary ingress) and update the message(s) such as setting Protection-in-use. (since it can not send any Resv message(s) to its previous hop (i.e., the proxy-ingress or the primary ingress) 3. keep session from (upstream node) proxy-ingress (i.e., “primary ingress”) (inactive) 4. Let session to (next hop) primary ingress down 1, 2 and 3 are common for two methods (note 3 considered to be common) In summary, common for two methods with minor difference
  • 22. Global Repair After detecting primary ingress failure, backup ingress does the followings for global repair (common for two methods) Relay-Message Method: Proxy-Ingress Method: 1. Compute a global optimal path 2. Set up a new LSP along the path with a different LSP ID 3. Switch traffic to the new LSP 4. Tear down the old LSP
  • 23. Backwards Compatibility Primary ingress sends Path message with INGRESS_PROTECTION to backup ingress. If backup ingress does not support the extensions for ingress protection, then Relay-Message Method: • Primary ingress receives Path Err from backup ingress and sends Path Tear to backup ingress Proxy-Ingress Method: • Proxy-ingress (i.e., “Primary ingress”) receives Path Err from backup ingress and sends Path Tear to backup ingress • Primary ingress changes the ERO and sends Path message with the updated ERO to its next hops after determining that backup ingress does not support ingress protection common for two methods with minor difference
  • 24. Details in Existing P2MP LSP Ingress & Egress Protections  To provide E2E P2MP LSP protection,a current way (detail in next page) Redundant Root and Every Leaf Create two P2MP LSPs from root to leaves, carry the same data at same time. For each leaf, create a P2P LSP from the leaf to root and configure BFD with it Run iBGP on every leaf node and use P2P LSP as its next hop When BFD detects P2P LSP failure, BGP withdraws route to root and this makes the receiver switch to another leaf to get the data.
  • 25. Details in Existing P2MP LSP Ingress & Egress Protections (Cont) P2MP Multicast Source Multicast Receiver PE2 PE1 PE10 PE9CE2 CE1 CE4 CE1 Primary P2MP LSP Backup P2MP LSP PE7 PE8 CE3 IGMP Join PE3 PE4 PE5 PE6 1. Double leaves 2. Two P2MP LSP carry data 3. P2P LSP (leafroot) with BFD 4. P2P LSP as NH to SA, export route for SA to receiver 5. Receiver selects a leaf accordingly P2P LSP
  • 26. Issues in Existing P2MP LSP Ingress & Egress Protections  Not easy to operate – For each P2MP LSP branch/sub-LSP, • need configure a reverse P2P LSP from leaf to root with BFD • P2P LSP with BFD is used to detect failure of its corresponding P2MP sub- LSP  Not reliable – The failure of reverse P2P LSP from leaf to root does not mean the failure of its corresponding P2MP sub-LSP from root to leaf  Consume lots of resource – Reserve/use double bandwidth  Speed of Global Recovery – Depends on convergence of IGP and BGP
  • 27. Advantages of P2MP LSP Ingress and Egress Local Protection  All parts of P2MP LSP are locally protected  Only one P2MP LSP is used to implement an E2E protection Normally two P2MP LSPs are used  Big saving on resource : 50% bandwidth saving No need to reserve/use double bandwidth  Faster recovery Speed of local protection recovery Flow recovery within 50ms when a failure happens  Easier to operate