Successfully reported this slideshow.
Your SlideShare is downloading. ×

Krzysztof Mazepa - IOS XR - IP Fast Convergence

Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Loading in …3
×

Check these out next

1 of 34 Ad

More Related Content

Slideshows for you (20)

Similar to Krzysztof Mazepa - IOS XR - IP Fast Convergence (20)

Advertisement

Recently uploaded (20)

Krzysztof Mazepa - IOS XR - IP Fast Convergence

  1. 1. © 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1 IOS XR - IP Fast Convergence Krzysztof Mazepa kmazepa@cisco.com
  2. 2. © 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 2 Abstract Mechanisms available on XR platforms (CRS-1, 12k XR) that allows Service Providers to achieve subsecond convergence: IGP Fast convergence IPoDWDM proactive protection BGP Local Convergence Upon PE-CE Link Failure BGP Prefix Independent Convergence Where those mechanisms should be deployed Internet IP/MPLS core L3 VPN networks (R4 mobile core) IPTV networks
  3. 3. © 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 3 Fast convergence (FC) • The routing protocol detects the failure and computes an alternate path around the failure • The HW and SW must be optimized FAST: sub 200msec SIMPLE: without any design or knob tuning, works for any failure, end-to-end MULTI-SERVICE: for any service SCALABLE
  4. 4. © 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 4 IOS-XR IGP Fast Convergence
  5. 5. © 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 5 ISIS • LSP Generation is optimized by default lsp-gen-interval maximum-wait <M> initial-wait <I> secondary-wait <E> Default value of I = 50 msec • Flooding & Pacing is optimized by default • Full SPT computation has been all rewritten and optimized spf-interval maximum-wait <M> initial-wait <I> secondary-wait <E> Default-value if I = 50msec Full SPT takes [6, 9] msec for a 1000-router Tier1 network (real test) • Incremental SPT ispf [level-1 | level-2 ]
  6. 6. © 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 6 ISIS • Prefix Prioritization 4 priorities: Critical, High, Medium, Low /32 IPv4 and /128 IPv6 prefixes are classified by default in Medium Priority Rest is classified by default in Low Priority • Customization spf prefix-priority This command supports prefix list for the first three priorities. The unmatched prefixes will be updated with low priority. As soon as the “prefix priority” command is used, then the /32 heuristic is no longer applied. If you then want to keep the /32’s in medium, you need to configure the medium ACL so.
  7. 7. © 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 7 ISIS • Prefix Prioritization is THE key behavior CRITICAL: IPTV SSM sources HIGH: Most Important PE’s MEDIUM: All other PE’s LOW: All other prefixes • Prefix prioritization customization is required for CRITICAL and HIGH
  8. 8. © 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 8 Reference slide ISIS: Prefix Priority Customization ipv4 prefix-list isis-critical-acl 10 permit 0.0.0.0/0 eq 32 ipv4 prefix-list isis-high-acl 10 permit 0.0.0.0/0 eq 30 ipv4 prefix-list isis-med-acl 10 permit 0.0.0.0/0 eq 29 router isis 1 address-family ipv4 unicast spf prefix-priority critical isis-critical-acl spf prefix-priority high isis-high-acl spf prefix-priority medium isis-med-acl
  9. 9. © 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 9 IGP Case Study
  10. 10. © 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 10 Lab topology • ISIS priority: 10 /24 in critical 500 /32 in high • BGP-NH is first of high UUT Default metric 1 10 X X Local failure Remote failure B C D E SRC DST A 1000 LSPs and 5000 prefixes 350k BGP prefixes
  11. 11. © 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 11 iox-crs1-P-ISIS-BGPipv4-dpi2i-021307_154358-l-nlb 0 50 100 150 200 250 300 350 400 0 1000 2000 3000 4000 5000 6000 7000 prefix nr trafficloss(msec) 0% 50% 90% 100% 0% 50% 90% 100% Agilent measurements ISIS FC in large-scale T1 network Testbed: Tier1 ISP topology (1000nodes), CRS1, IOX3.5, 5000 ISIS prefixes, 350k IPv4 BGP dependents to impacted BGP nhop 500th PE: <150msec IPTV SSM sources: <100msec
  12. 12. © 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 12 iox-crs1-P-ISIS-BGPipv4-dpi2i-021307_154358-l-nlb 0 50 100 150 200 250 300 350 400 0 1000 2000 3000 4000 5000 6000 7000 prefix nr trafficloss(msec) 0% 50% 90% 100% 0% 50% 90% 100% Agilent measurements ISIS and BGP PIC core in a T1 ISP Testbed: Tier1 ISP topology, CRS1, IOX3.5, 5000 ISIS prefixes, 350k IPv4 BGP dependents to impacted BGP nhop BGP PIC effect
  13. 13. © 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 13 IOS-XR IPoDWDM / Routing Integration
  14. 14. © 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 14 Trans- ponder SR port on router WDM port on router Optical impairments Correctedbits FEC limit Working path Switchover lost data Protected pathBER LOF Optical impairments Correctedbits FEC limit Protection trigger Working path Protect path BER Near-hitless switch WDM WDM FEC FEC Today’s protection Proactive protection IP-over-DWDM Advanced Protection feature Superior Protection Compared to Transponder-Based Networks
  15. 15. © 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 15 Test Matrix - MPLS FRR 13.49 2602 11.16 0 0 10.99 Lowest AverageHighest 83.43 2852 11.61 14.97 0.12 11.48 Packet Loss (ms) 2727Noise-injectionN 0.05Noise-injectionY 37.63 11.32 4.97 11.24 Fibre-pull Optical-switch (25ms) Fibre-pull Optical-switch (25ms) Fault N N Y Y pre-FEC FRR
  16. 16. © 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 16 Pre-FEC Results for ISIS Fast Convergence 540620596Fast noise-injection (0.5dB/500ms)N 288030352990Slow noise-injection (0.1dB/1000ms)N 159205180Optical-switchN 093Fast noise-injection (0.5dB/500ms)Y 0123Slow noise-injection (0.1dB/1000ms)Y 163220170Optical-switchY C(1)C(1000)C(500) Max. Packet Loss (ms) Fault Pre FEC
  17. 17. © 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 17 IOS-XR BGP Fast Convergence
  18. 18. © 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 18 PE-CE link failure RR1 RR2 RR4RR3 PE1 PE2 PE3 CE2CE1 VPN 1 site A VPN 1 site B x.x.x.x/y x.x.x.x/y 1. via PE2 from RR1, imp, best 2. via PE3 from RR1, imp 3. via PE2 from RR3, imp 4. via PE3 from RR3, imp RD 1:1 RD 2:1 RD 3:1 2:1:x.x.x.x/y 1. via PE2, from PE2, best 3:1:x.x.x.x/y 1. via PE3, from PE3, best 2:1:x.x.x.x/y 1. via PE2, from RR2, best 2. via PE2, from RR4 3:1:x.x.x.x/y 1. via PE3, from RR2, best 2. via PE3, from RR4
  19. 19. © 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 19 RR1 RR2 RR4RR3 PE1 PE2 PE3 CE2CE1 VPN 1 site A VPN 1 site B x.x.x.x/y 1. link PE2-CE2 fails 2. Fast External Fallover scans BGP table, calculating new bestpaths RD 1:1 RD 2:1 RD 3:1 PE-CE link failure
  20. 20. © 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 20 VPN 1 site B x.x.x.x/y RD 1:1 RD 2:1 RD 3:1 PE-CE link failure RR1 RR2 RR4RR3 PE1 PE2 PE3 CE2CE1 VPN 1 site A 1. link PE2-CE2 fails 2. Fast External Fallover scans BGP table, calculating new bestpaths 5. RR1 and RR3 propagate withdraws 3. PE2 withdraws paths 4. RR2 and RR4 propagate withdraws
  21. 21. © 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 21 VPN 1 site B x.x.x.x/y RD 1:1 RD 2:1 RD 3:1 PE-CE link failure RR1 RR2 RR4RR3 PE1 PE2 PE3 CE2CE1 VPN 1 site A 1. link PE2-CE2 fails 2. Fast External Fallover scans BGP table, calculating new bestpaths 3. PE2 withdraws paths 4. RR2 and RR4 propagate withdraws 5. RR1 and RR3 propagate withdraws 6. PE1 deletes path via PE2, now going via PE3
  22. 22. © 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 22 BGP Local Convergence Upon PE-CE Link Failure
  23. 23. © 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 23 Case Study • Premium VPN with very tight convergence requirement (eg. VoIP MGW…) • Connectivity to VPN customer can either be as a simple GE host, or via static route or via eBGP over any type of link • SP requires a solution which allows for a multiservice PE (Internet + VPN’s) • Failure scenario: PE-CE Link Down or PE-CE Link Up • Assumption: unique RD’s are used PE3 PE1 PE2 MGW 1/8 .1 .2 .3 Premiumvpn Premiumvpn
  24. 24. © 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 24 Case Study • An aggregate label is dedicated to a VRF. It is available as long as the VRF exists. • Upon matching such a label, a receiving PE pops that label and look-up the resulting IP packet in the VRF table pointed out by the VRF Label PE3 PE1 PE2 MGW 1/8 .3 BGP Table RD1: 1/8 Incoming LBL: VRF-LABEL > via GE via PE2 (LBL: 200) [imported from RD2:1/8] RD1-VRF-LABEL: 100 RD1:1/8 via PE1 LBL 100 RD2:1/8 via PE2 LBL 200 RD3: 1/8 > via PE1 (LBL: 100) [imported from RD1:1/8] via PE2 (LBL: 200) [imported from RD2:1/8] LFIB Table 100: pop and look-up in VRF RD1 VRF RD1 1/8 via GE BGP Table RD2: 1/8 Incoming LBL: VRF-LABEL > via GE via PE1 (LBL: 100) [imported from RD1:1/8] RD1-VRF-LABEL: 200 LFIB Table 200: pop and look-up in VRF RD2 VRF RD2 1/8 via GE
  25. 25. © 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 25 Case Study • Upon local interface failure (same for BFD failure detection if MGW supports BFD), PE1’s RIB immediately notifies BGP which immediately finds and updates the impacted route (no scan). PE1’s BGP selects an alternate (already-known) path and inserts it in the VRF. • Even if PE3 still routes through PE1, any packet received at PE1 with LBL=100 and IP DA=1.*.*.* is redirected via PE2 • BGP Local Convergence PE3 PE1 PE2 MGW 1/8 .3 BGP Table RD1: 1/8 Incoming LBL: VRF-LABEL > via GE via PE2 (LBL: 200) [imported from RD2:1/8] RD1-VRF-LABEL: 100 RD1:1/8 via PE1 LBL 100 RD2:1/8 via PE2 LBL 200 RD3: 1/8 > via PE1 (LBL: 100) [imported from RD1:1/8] via PE2 (LBL: 200) [imported from RD2:1/8] LFIB Table 100: pop and look-up in VRF RD1 VRF RD1 1/8 via GE BGP Table RD2: 1/8 Incoming LBL: VRF-LABEL > via GE via PE1 (LBL: 100) [imported from RD1:1/8] RD1-VRF-LABEL: 200 LFIB Table 200: pop and look-up in VRF RD2 VRF RD2 1/8 via GE > Via PE2 with LBL 200
  26. 26. © 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 26 Very Conservative Connected Case Study Case study A-1: 200kInt/500vrf(100i,1C) 0 50 100 150 200 250 300 350 400 450 500 P50 P90 P100 LoC (ms) 12k crs1 200k internet routes 50k VPNv4 routes 500 VRF’s, each with 100 ibgp prefixes and 1 connected prefix Event: Interface to VoIP VRF goes down Results obtained with IOX 3.3 A multiservice PE with 200k IPv4 routes, IPv4 peerings, 500 VPN’s, 50k VPNv4 routes detects and reroutes around the failure to a critical VPN site in less than 250ms with CRS/IOX3.3 (the median is < 100ms!)
  27. 27. © 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 27 IOS-XR BGP Prefix Independent Convergence CORE Scenario
  28. 28. © 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 28 BGP Prefix-Independent Convergence Core failure • Upon a core failure, the IGP finds an alternate path to the BGP next-hop PE2 in a few 100’s of msec • Requirement: the BGP prefixes depending on reachability to PE2 must leverage the new ISIS path as soon as it is updated in the FIB PE1 PE2 10.1.1/24 via PE2 99.99.99/24 via PE2 10.1.2/24 via PE2 …. PE1’s RIB: PE2 is reachable via PoS1PoS2 PoS1 PoS2 When?
  29. 29. © 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 29 The right architecture: hierarchical FIB • Pointer Indirection between BGP and IGP entries allow for immediate leveraging of the IGP convergence oifIGP LDIBGP LDI BGP net BGP net BGP net … BGP nexthop(s) IGP nexthop(s) Output Interface
  30. 30. © 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 30 iox-crs1-P-ISIS-BGPipv4-dpi2i-021307_154358-l-nlb 0 50 100 150 200 250 300 350 400 0 1000 2000 3000 4000 5000 6000 7000 prefix nr trafficloss(msec) 0% 50% 90% 100% 0% 50% 90% 100% Agilent measurements The right behavior is “BGP PIC/core” • Testbed: Tier1 ISP topology, CRS1, IOX3.5, 5000 ISIS prefixes, 350k IPv4 BGP dependents to impacted BGP nhop same behavior for VPNv4 as of 3.5 • When ISIS converges, all the BGP dependents immediately leverage the ISIS convergence BGP PIC effect
  31. 31. © 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 31 Conclusion
  32. 32. © 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 32 Simplicity • IGP, BGP and PIM are meant to route around failure • Goal: meet the restoration targets without externalizing any complexity to the designer/operator the complexity/intelligence is in the SW/HW implementation all behaviors are tuned by default no complex design to conceive or operate • Simplicity = Cost Savings for the designer/operator
  33. 33. © 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 33 Reality IGP sub-second convergence is very conservative Tier1 lead customer achieving mythical sub-200msec • BGP convergence for VoIP VPN < 500 msec • IPTV SSM convergence for 400 channels in < 300msec • Border router failure with 300k BGP prefixes in < 1sec • Failure Frequency An european backbone (2003): Mean Time Between Link Failure > 230 hours
  34. 34. © 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 34 Dziękuję za uwagę, komentarze i pytania kmazepa@cisco.com

×