SlideShare a Scribd company logo
1 of 17
MPLS-TE FaultTolerance
MPLS- TE PROTECTION OR FAST REROUTE (FRR)
Sakkhor Chowdhury
What is MPLS?
From MPLS Resource center:
“MPLS stands for "Multiprotocol Label Switching". In an MPLS network, incoming packets are assigned a
"label" by a "label edge router (LER)". Packets are forwarded along a "label switch path (LSP)" where each
"label switch router (LSR)" makes forwarding decisions based solely on the contents of the label. At each
hop, the LSR strips off the existing label and applies a new label which tells the next hop how to forward
the packet.
Label Switch Paths (LSPs) are established by network operators for a variety of purposes, such as to
guarantee a certain level of performance, to route around network congestion, or to create IP tunnels for
network-based virtual private networks. In many ways, LSPs are no different than circuit-switched paths in
ATM or Frame Relay networks, except that they are not dependent on a particular Layer 2 technology.
An LSP can be established that crosses multiple Layer 2 transports such as ATM, Frame Relay or
Ethernet. Thus, one of the true promises of MPLS is the ability to create end-to-end circuits, with specific
performance characteristics, across any type of transport medium, eliminating the need for overlay
networks or Layer 2 only control mechanisms.”
MPLS process
Label removal
Classification
Label assignment
Routing Protocol
Label Switch Path
LFIB
Layer 2
Layer 1
Layer 2
Layer 1
Layer 2
Layer 1
LFIB
Layer 2
Layer 1
Layer 2
Layer 1
FEC FEC FEC
LFIB
Label Swapping
Traffic Engineering
• Traffic engineering allows a network administrator to make the path deterministic and bypass
the normal routed hop-by-hop paths. An administrator may elect to explicitly define the path
between stations to ensure QoS or have the traffic follow a specified path to reduce traffic
loading across certain hops.
• The network administrator can reduce congestion by forcing the frame to travel around the
overloaded segments. Traffic engineering, then, enables an administrator to define a policy
for forwarding frames rather than depending upon dynamic routing protocols.
• Traffic engineering is similar to source-routing in that an explicit path is defined for the frame
to travel. However, unlike source-routing, the hop-by-hop definition is not carried with every
frame. Rather, the hops are configured in the LSRs ahead of time along with the appropriate
label values.
MPLS – Traffic Engineering
 End-to-End forwarding decision determined by ingress node.
 Enables Traffic Engineering
LER
1
LSR
2
LSR
3
LER
4
LIP
Forward
to
LSR 2
LSR 3
LSR 4
LSR X
Overload
!!
Overload
!!
IP
IP
LIP
LIP
NetworkFailures
• Node failures
Hardware Failures
Maintenance
Electrical Problems
• Link failures
Loose Cables
Fiber Cuts
ADM Problems
PacketLost
PossibleSolutions
• Interior GatewayProtocol(IGP)
• OSPF
• IS-IS
Convergence/Rapid Convergence
Congestion
SPF
• SONETAutomatic Protection Switching
(APS)
• Active Link
• Passive/Standby Link
~50msDelaybetween link
changes
IGPConvergence
ADM Required
Insufficient FaultTolerance
Background
• RFC2702 “Requirementsfor TrafficEngineeringOverMPLS”
• LSP reroute/Headendreroute
New TELSP(RSVP)Signaling
SFP
Substantial TrafficLost
PacketLost
MPLS-TEProtection
or
FastReroute (FRR)
Protection
• Procedures
• Resources
• Physical
• Links
• Nodes
• Logical
• LSP
Minimal TrafficLost
• Protection
 Preset LSPBackup
 Pre-computed
 Pre-signaled
ProtectionSchemes
• Path Protection
• End-to-End Protection
• LocalProtection
• Link Protection
• Node Protection
PathProtection
• Backup/SecondaryLSP
• Parallel to Primary LSP
• Distinct route
• Pre-signaled
• BWproperties similar to primary LSP
 Better Convergencevs.IGP& TELSPreroute
1:1
Bit Scalable
LocalProtection
• BackupLSPfor asegment of the primary
LSP
• Pre-signaled
• Around the affected link (link protection)
• Around the affected node (node protection)
• Encapsulatesprimary LSP
 FastFailure Recovery
 1:N
 High Scalability
LabelStacking
•12008a – 12008c link failure
•12008a switch traffic to backup LSP
•12008a stack label 38 to 33, {38,33}
•12008a switch to 12008b {38,33}
•12008b relieve {38,33} & switch to 12008d based on high
level label (38), replacing 38 by 35, {35,33}
•12008d receive {35,33}, performs PHPremoving 35 & switch
to 12008c,{33}
•12008c receive {33}, performs PHP& resend to7200c• Required
• Label Stacking
• Global Label Space
LinkProtection
• BackupTunnel or LSP
• Avoids "protected link"
 Protects against linkfailures.
Vulnerable against node failures
• NHopTunnels
• From PLRto NHopNode
• PLRknows MPexpectedlabel
Node Protection
• BackupTunnel or LSP
• Avoids "protected node"
• NNHopTunnels
• From PLRto NNHop
• Label Recording required
 Protects against link and nodefailures
Advanced Methods ofProtection
• Multiple backuptunnels
• BackupBWReservation
• Promotion
Conclusions
Slow andInsufficient
• Real-timeApplications
• VoIP
• Live Meeting
• etc.
• IGP
• MPLS-TEheadend
reroute
• FRR
• Local Protection

More Related Content

What's hot

Valiant Load Balancing and Traffic Oblivious Routing
Valiant Load Balancing and Traffic Oblivious RoutingValiant Load Balancing and Traffic Oblivious Routing
Valiant Load Balancing and Traffic Oblivious RoutingJason TC HOU (侯宗成)
 
Network on chip by shoeb
Network on chip by shoebNetwork on chip by shoeb
Network on chip by shoebShoeb Ahmed
 
FATTREE: A scalable Commodity Data Center Network Architecture
FATTREE: A scalable Commodity Data Center Network ArchitectureFATTREE: A scalable Commodity Data Center Network Architecture
FATTREE: A scalable Commodity Data Center Network ArchitectureAnkita Mahajan
 
Fundamental of Quality of Service(QoS)
Fundamental of Quality of Service(QoS) Fundamental of Quality of Service(QoS)
Fundamental of Quality of Service(QoS) Reza Farahani
 
Broadband Network Presentation
Broadband Network PresentationBroadband Network Presentation
Broadband Network PresentationMuhammad Faisal
 
A Scalable, Commodity Data Center Network Architecture
A Scalable, Commodity Data Center Network ArchitectureA Scalable, Commodity Data Center Network Architecture
A Scalable, Commodity Data Center Network ArchitectureGunawan Jusuf
 
Application-Driven Flow Control in Network-on-Chip for Many-Core Architectures
Application-Driven Flow Control in Network-on-Chip for Many-Core ArchitecturesApplication-Driven Flow Control in Network-on-Chip for Many-Core Architectures
Application-Driven Flow Control in Network-on-Chip for Many-Core ArchitecturesIvonne Liu
 
integrated and diffrentiated services
 integrated and diffrentiated services integrated and diffrentiated services
integrated and diffrentiated servicesRishabh Gupta
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocolsMenaga Selvaraj
 
Optimal multicast capacity and delay tradeoffs in mane ts
Optimal multicast capacity and delay tradeoffs in mane tsOptimal multicast capacity and delay tradeoffs in mane ts
Optimal multicast capacity and delay tradeoffs in mane tsJPINFOTECH JAYAPRAKASH
 
Webinar Slides: Tungsten Connector / Proxy – The Secret Sauce Behind Zero-Dow...
Webinar Slides: Tungsten Connector / Proxy – The Secret Sauce Behind Zero-Dow...Webinar Slides: Tungsten Connector / Proxy – The Secret Sauce Behind Zero-Dow...
Webinar Slides: Tungsten Connector / Proxy – The Secret Sauce Behind Zero-Dow...Continuent
 
Traffic-adaptive Medium Access Protocol
Traffic-adaptive Medium Access ProtocolTraffic-adaptive Medium Access Protocol
Traffic-adaptive Medium Access ProtocolGaurav Chauhan
 
Performance Improved Network on Chip Router for Low Power Applications
Performance Improved Network on Chip Router for Low Power ApplicationsPerformance Improved Network on Chip Router for Low Power Applications
Performance Improved Network on Chip Router for Low Power ApplicationsIJTET Journal
 
WSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient RoutingWSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient RoutingArunChokkalingam
 

What's hot (20)

Valiant Load Balancing and Traffic Oblivious Routing
Valiant Load Balancing and Traffic Oblivious RoutingValiant Load Balancing and Traffic Oblivious Routing
Valiant Load Balancing and Traffic Oblivious Routing
 
Network on Chip
Network on ChipNetwork on Chip
Network on Chip
 
Network on chip by shoeb
Network on chip by shoebNetwork on chip by shoeb
Network on chip by shoeb
 
FATTREE: A scalable Commodity Data Center Network Architecture
FATTREE: A scalable Commodity Data Center Network ArchitectureFATTREE: A scalable Commodity Data Center Network Architecture
FATTREE: A scalable Commodity Data Center Network Architecture
 
Fundamental of Quality of Service(QoS)
Fundamental of Quality of Service(QoS) Fundamental of Quality of Service(QoS)
Fundamental of Quality of Service(QoS)
 
Broadband Network Presentation
Broadband Network PresentationBroadband Network Presentation
Broadband Network Presentation
 
Generalized two
Generalized twoGeneralized two
Generalized two
 
A Scalable, Commodity Data Center Network Architecture
A Scalable, Commodity Data Center Network ArchitectureA Scalable, Commodity Data Center Network Architecture
A Scalable, Commodity Data Center Network Architecture
 
Application-Driven Flow Control in Network-on-Chip for Many-Core Architectures
Application-Driven Flow Control in Network-on-Chip for Many-Core ArchitecturesApplication-Driven Flow Control in Network-on-Chip for Many-Core Architectures
Application-Driven Flow Control in Network-on-Chip for Many-Core Architectures
 
Qo s 09-integrated and red
Qo s 09-integrated and redQo s 09-integrated and red
Qo s 09-integrated and red
 
integrated and diffrentiated services
 integrated and diffrentiated services integrated and diffrentiated services
integrated and diffrentiated services
 
I41026670
I41026670I41026670
I41026670
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 
Optimal multicast capacity and delay tradeoffs in mane ts
Optimal multicast capacity and delay tradeoffs in mane tsOptimal multicast capacity and delay tradeoffs in mane ts
Optimal multicast capacity and delay tradeoffs in mane ts
 
Webinar Slides: Tungsten Connector / Proxy – The Secret Sauce Behind Zero-Dow...
Webinar Slides: Tungsten Connector / Proxy – The Secret Sauce Behind Zero-Dow...Webinar Slides: Tungsten Connector / Proxy – The Secret Sauce Behind Zero-Dow...
Webinar Slides: Tungsten Connector / Proxy – The Secret Sauce Behind Zero-Dow...
 
Traffic-adaptive Medium Access Protocol
Traffic-adaptive Medium Access ProtocolTraffic-adaptive Medium Access Protocol
Traffic-adaptive Medium Access Protocol
 
Mit6 02 f12_chap18
Mit6 02 f12_chap18Mit6 02 f12_chap18
Mit6 02 f12_chap18
 
Performance Improved Network on Chip Router for Low Power Applications
Performance Improved Network on Chip Router for Low Power ApplicationsPerformance Improved Network on Chip Router for Low Power Applications
Performance Improved Network on Chip Router for Low Power Applications
 
WSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient RoutingWSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient Routing
 
Entanglement Distribution
Entanglement DistributionEntanglement Distribution
Entanglement Distribution
 

Similar to Traffic Engineering Fault Tolerance Using MPLS Routing - Optical Fiber Communication

Similar to Traffic Engineering Fault Tolerance Using MPLS Routing - Optical Fiber Communication (20)

S.t rajan cjb0912010 ft12
S.t rajan cjb0912010 ft12S.t rajan cjb0912010 ft12
S.t rajan cjb0912010 ft12
 
MPLS-jpl.ppt
MPLS-jpl.pptMPLS-jpl.ppt
MPLS-jpl.ppt
 
MPLS.pptx
MPLS.pptxMPLS.pptx
MPLS.pptx
 
yun-MPLS.ppt
yun-MPLS.pptyun-MPLS.ppt
yun-MPLS.ppt
 
MPLS-extra.ppt
MPLS-extra.pptMPLS-extra.ppt
MPLS-extra.ppt
 
MPLS Deployment Chapter 1 - Basic
MPLS Deployment Chapter 1 - BasicMPLS Deployment Chapter 1 - Basic
MPLS Deployment Chapter 1 - Basic
 
Internet Traffic Engineering
Internet Traffic EngineeringInternet Traffic Engineering
Internet Traffic Engineering
 
Benchmarking Failure Recovery Time in MPLS FRR with Link Protection
Benchmarking Failure Recovery Time in MPLS FRR with Link ProtectionBenchmarking Failure Recovery Time in MPLS FRR with Link Protection
Benchmarking Failure Recovery Time in MPLS FRR with Link Protection
 
Mpls
MplsMpls
Mpls
 
J010136172
J010136172J010136172
J010136172
 
MPLS
MPLSMPLS
MPLS
 
MPLS (Multiprotocol Label Switching)
MPLS (Multiprotocol Label Switching)MPLS (Multiprotocol Label Switching)
MPLS (Multiprotocol Label Switching)
 
MPLS
MPLSMPLS
MPLS
 
Multi Protocol Label Switching. (by Rahil Reyaz)
Multi Protocol Label Switching. (by Rahil Reyaz)Multi Protocol Label Switching. (by Rahil Reyaz)
Multi Protocol Label Switching. (by Rahil Reyaz)
 
MPLS
MPLSMPLS
MPLS
 
Mpls te
Mpls teMpls te
Mpls te
 
V25112115
V25112115V25112115
V25112115
 
MPLS_SDN.pdf
MPLS_SDN.pdfMPLS_SDN.pdf
MPLS_SDN.pdf
 
Mpls co s
Mpls co sMpls co s
Mpls co s
 
MPLS Tutorial
MPLS TutorialMPLS Tutorial
MPLS Tutorial
 

More from Sakkar Chowdhury

Urinary Stress Incontinence
Urinary Stress IncontinenceUrinary Stress Incontinence
Urinary Stress IncontinenceSakkar Chowdhury
 
Pregnancy Related Dermatoses
Pregnancy Related DermatosesPregnancy Related Dermatoses
Pregnancy Related DermatosesSakkar Chowdhury
 
Grand Round (Medicine Unit)
Grand Round (Medicine Unit)Grand Round (Medicine Unit)
Grand Round (Medicine Unit)Sakkar Chowdhury
 
Simple Presentation On Raspberry pi
Simple Presentation On Raspberry piSimple Presentation On Raspberry pi
Simple Presentation On Raspberry piSakkar Chowdhury
 
Perioperative Management of Diabetes Mellitus
Perioperative Management  of Diabetes MellitusPerioperative Management  of Diabetes Mellitus
Perioperative Management of Diabetes MellitusSakkar Chowdhury
 

More from Sakkar Chowdhury (6)

Urinary Stress Incontinence
Urinary Stress IncontinenceUrinary Stress Incontinence
Urinary Stress Incontinence
 
Wound healing
Wound healingWound healing
Wound healing
 
Pregnancy Related Dermatoses
Pregnancy Related DermatosesPregnancy Related Dermatoses
Pregnancy Related Dermatoses
 
Grand Round (Medicine Unit)
Grand Round (Medicine Unit)Grand Round (Medicine Unit)
Grand Round (Medicine Unit)
 
Simple Presentation On Raspberry pi
Simple Presentation On Raspberry piSimple Presentation On Raspberry pi
Simple Presentation On Raspberry pi
 
Perioperative Management of Diabetes Mellitus
Perioperative Management  of Diabetes MellitusPerioperative Management  of Diabetes Mellitus
Perioperative Management of Diabetes Mellitus
 

Recently uploaded

Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 

Recently uploaded (20)

Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 

Traffic Engineering Fault Tolerance Using MPLS Routing - Optical Fiber Communication

  • 1. MPLS-TE FaultTolerance MPLS- TE PROTECTION OR FAST REROUTE (FRR) Sakkhor Chowdhury
  • 2. What is MPLS? From MPLS Resource center: “MPLS stands for "Multiprotocol Label Switching". In an MPLS network, incoming packets are assigned a "label" by a "label edge router (LER)". Packets are forwarded along a "label switch path (LSP)" where each "label switch router (LSR)" makes forwarding decisions based solely on the contents of the label. At each hop, the LSR strips off the existing label and applies a new label which tells the next hop how to forward the packet. Label Switch Paths (LSPs) are established by network operators for a variety of purposes, such as to guarantee a certain level of performance, to route around network congestion, or to create IP tunnels for network-based virtual private networks. In many ways, LSPs are no different than circuit-switched paths in ATM or Frame Relay networks, except that they are not dependent on a particular Layer 2 technology. An LSP can be established that crosses multiple Layer 2 transports such as ATM, Frame Relay or Ethernet. Thus, one of the true promises of MPLS is the ability to create end-to-end circuits, with specific performance characteristics, across any type of transport medium, eliminating the need for overlay networks or Layer 2 only control mechanisms.”
  • 3. MPLS process Label removal Classification Label assignment Routing Protocol Label Switch Path LFIB Layer 2 Layer 1 Layer 2 Layer 1 Layer 2 Layer 1 LFIB Layer 2 Layer 1 Layer 2 Layer 1 FEC FEC FEC LFIB Label Swapping
  • 4. Traffic Engineering • Traffic engineering allows a network administrator to make the path deterministic and bypass the normal routed hop-by-hop paths. An administrator may elect to explicitly define the path between stations to ensure QoS or have the traffic follow a specified path to reduce traffic loading across certain hops. • The network administrator can reduce congestion by forcing the frame to travel around the overloaded segments. Traffic engineering, then, enables an administrator to define a policy for forwarding frames rather than depending upon dynamic routing protocols. • Traffic engineering is similar to source-routing in that an explicit path is defined for the frame to travel. However, unlike source-routing, the hop-by-hop definition is not carried with every frame. Rather, the hops are configured in the LSRs ahead of time along with the appropriate label values.
  • 5. MPLS – Traffic Engineering  End-to-End forwarding decision determined by ingress node.  Enables Traffic Engineering LER 1 LSR 2 LSR 3 LER 4 LIP Forward to LSR 2 LSR 3 LSR 4 LSR X Overload !! Overload !! IP IP LIP LIP
  • 6. NetworkFailures • Node failures Hardware Failures Maintenance Electrical Problems • Link failures Loose Cables Fiber Cuts ADM Problems PacketLost
  • 7. PossibleSolutions • Interior GatewayProtocol(IGP) • OSPF • IS-IS Convergence/Rapid Convergence Congestion SPF • SONETAutomatic Protection Switching (APS) • Active Link • Passive/Standby Link ~50msDelaybetween link changes IGPConvergence ADM Required Insufficient FaultTolerance
  • 8. Background • RFC2702 “Requirementsfor TrafficEngineeringOverMPLS” • LSP reroute/Headendreroute New TELSP(RSVP)Signaling SFP Substantial TrafficLost PacketLost MPLS-TEProtection or FastReroute (FRR)
  • 9. Protection • Procedures • Resources • Physical • Links • Nodes • Logical • LSP Minimal TrafficLost • Protection  Preset LSPBackup  Pre-computed  Pre-signaled
  • 10. ProtectionSchemes • Path Protection • End-to-End Protection • LocalProtection • Link Protection • Node Protection
  • 11. PathProtection • Backup/SecondaryLSP • Parallel to Primary LSP • Distinct route • Pre-signaled • BWproperties similar to primary LSP  Better Convergencevs.IGP& TELSPreroute 1:1 Bit Scalable
  • 12. LocalProtection • BackupLSPfor asegment of the primary LSP • Pre-signaled • Around the affected link (link protection) • Around the affected node (node protection) • Encapsulatesprimary LSP  FastFailure Recovery  1:N  High Scalability
  • 13. LabelStacking •12008a – 12008c link failure •12008a switch traffic to backup LSP •12008a stack label 38 to 33, {38,33} •12008a switch to 12008b {38,33} •12008b relieve {38,33} & switch to 12008d based on high level label (38), replacing 38 by 35, {35,33} •12008d receive {35,33}, performs PHPremoving 35 & switch to 12008c,{33} •12008c receive {33}, performs PHP& resend to7200c• Required • Label Stacking • Global Label Space
  • 14. LinkProtection • BackupTunnel or LSP • Avoids "protected link"  Protects against linkfailures. Vulnerable against node failures • NHopTunnels • From PLRto NHopNode • PLRknows MPexpectedlabel
  • 15. Node Protection • BackupTunnel or LSP • Avoids "protected node" • NNHopTunnels • From PLRto NNHop • Label Recording required  Protects against link and nodefailures
  • 16. Advanced Methods ofProtection • Multiple backuptunnels • BackupBWReservation • Promotion
  • 17. Conclusions Slow andInsufficient • Real-timeApplications • VoIP • Live Meeting • etc. • IGP • MPLS-TEheadend reroute • FRR • Local Protection