SlideShare a Scribd company logo
1 of 22
1
Multi-Protocol Label Switching
(MPLS)
2
MPLS Overview
• A forwarding scheme designed to speed up
IP packet forwarding (RFC 3031)
• Idea: use a fixed length label in the packet
header to decide packet forwarding
– Label carried in an MPLS header between the
link layer header and network layer header
• Support any network layer protocol and link
layer protocol
3
MPLS Header Format
• Label: 20-bit label value
• Exp: experimental use
– Can indicate class of service
• S: bottom of stack indicator
– 1 for the bottom label, 0 otherwise
• TTL: time to live
Label Exp S TTL
20 3 1 8
4
Forwarding Equivalence Class
• An MPLS capable router is called a label
switching router (LSR)
• Forwarding Equivalence Class (FEC): A subset of
packets that are all treated the same way by an
LSR
• A packet is assigned to an FEC at the ingress of an
MPLS domain
5
Forwarding Equivalence Class
• A packet’s FEC can be determined by one or more
of the following:
– Source and/or destination IP address
– Source and/or destination port number
– Protocol ID
– Differentiated services code point
– Incoming interface
• A particular PHB (scheduling and discard policy)
can be defined for a given FEC
6
MPLS Operation
• At ingress LSR of an MPLS domain, an MPLS header is
inserted to a packet before the packet is forwarded
– Label in the MPLS header encodes the packet’s FEC
• At subsequent LSRs
– The label is used as an index into a forwarding table that
specifies the next hop and a new label.
– The old label is replaced with the new label, and the packet
is forwarded to the next hop.
• Egress LSR strips the label and forwards the packet to
final destination based on the IP packet header
7
MPLS Operation
Intf
In
Label
In
Intf
Out
3 40 1
Intf
In
Label
In
Intf
Out
Label
Out
3 50 1 40
1
2
3
1
2
1
2
3
3
FEC Intf
Out
Label
Out
a 1 50
50
40
8
Label Switched Path
• For each FEC, a specific path called Label Switched Path
(LSP) is assigned
– The LSP is unidirectional
• To set up an LSP, each LSR must
– Assign an incoming label to the LSP for the corresponding FEC
• Labels have only local significance
– Inform the upstream node of the assigned label
– Learn the label that the downstream node has assigned to the LSP
• Need a label distribution protocol so that an LSR can
inform others of the label/FEC bindings it has made
• A forwarding table is constructed as the result of label
distribution.
9
Intf
In
Label
In
Intf
Out
3 40 1
Intf
In
Label
In
Intf
Out
Label
Out
3 50 1 40
Label Distribution
47.1
47.247.3
1
2
3
1
2
1
2
3
3
Dest Intf
Out
Label
Out
47.1 1 50 Mapping: 40
Request: 47.1
Mapping: 50
Request: 47.1
10
LSP Route Selection
• Hop-by-hop routing: use the route
determined by the dynamic routing protocol
• Explicit routing (ER): the sender LSR can
specify an explicit route for the LSP
– Explicit route can be selected ahead of time or
dynamically
11
Explicitly Routed LSP
• Advantages
– Can establish LSP’s based on policy, QoS, etc.
– Can have pre-established LSP’s that can be
used in case of failures.
• Signaling protocols
– CR-LDP
– RSVP-TE
12
Diffserv-Aware MPLS
• MPLS can be used together with Differentiated Services to
provide QoS.
• LSPs are configured between each ingress-egress pair.
– For each ingress-egress pair, a separate LSP can be created for
each traffic class, or
– Can create a single LSP for each ingress-egress pair and use the
Exp bits to differentiate packet classes.
• Scalable: as the number of flows increases, the number of
LSPs does not increase.
13
Diffserv-Aware MPLS
• Operations of routers in an ISP network
– At the ingress router, in addition to policing, a MPLS
header is inserted into the packet.
– Core routers process the packets based on the label and
Exp fields
– At the egress router, the MPLS header is removed.
• Whether a ISP’s architecture is DS field-based or
MPLS-based is transparent to other ISPs
 The DS field based architecture and the MPLS
based architecture can easily inter-operate.
14
Diffserv-Aware MPLS
• A customer domain still needs a BB to
– Allocate services
– Request for resources on behalf of the customer domain
when the SLA is dynamic.
• BBs may not be needed in the MPLS-based ISP
networks
– Ingress router can make the admission control decision
– If the resource request is granted, ingress router sends a
PATH message to egress router through a LSP
15
Why MPLS Protection?
• IP restoration is very slow
– OSPF, RIP, etc. require a redistribution of
updated link status information in response to a
failure.
– Routing table convergence time on the order of
seconds.
– Looping and packet loss can occur during
convergence
• MPLS enables fast failure restoration
16
MPLS Protection Approaches
• End-to-End protection
– A backup LSP is set up in advance from the source
LSR to the destination LSR of the primary LSP.
• The backup LSP is link and node disjoint with the
primary LSP
• Need reserve resources for the backup LSP
– Source LSR responsible for restorationsender
must be notified of the failure
17
MPLS Protection Approaches
• Local protection
– When establishing a primary LSP, a backup LSP
for each possible link or node failure is set up
• Resources reserved for each backup LSP
– Failure detecting LSR responsible for switching
traffic to the backup LSR
– Faster restoration than end-to-end protection
18
Local Protection
• Problem: must create a separate set of
backup LSPs for every primary LSP
• Can a single LSP backup a set of
primary LSPs?
• Yes! Use MPLS label stacking.
19
Label Stacking
• A packet may carry multiple labels, organized as a last-in-
first-out stack
• A label may be added to/removed from the stack at any
LSR
• Processing always done on the top label
• Allow the aggregation of LSPs into a single LSP for a
portion of the route, creating a tunnel
– At the beginning of the tunnel, the LSR assigns the same label to
packets from different LSPs by pushing the label onto each
packet’s stack
– At the end of the tunnel, the LSR pops the top label
20
Local Protection Using Label
Stacking
• Bypass tunnel: a LSP used to protect a
set of LSPs passing over a common
facility.
• Label stacking allows different primary
LSPs to use the same bypass tunnel for
failure protection.
21
Local Protection Using Label
Stacking
When a failure occurs:
• LSR at the beginning of the tunnel will
– Switch packets received on the protected LSP x onto the
bypass tunnel
– Replace the old label with a new label that will be
understood by the last node in the bypass tunnel to indicate
LSP x
– Push the bypass tunnel's label onto the label-stack of the
redirected packets.
• LSR at the end of the tunnel will
– Pop the bypass tunnel's label
– Examine the top label to determine the protected LSP that
the packet is to follow.
22
Summary of MPLS
• Simplify packet forwarding based on a
fixed length label
• Enable explicit routing in IP networks
– Can be used for traffic management, QoS
routing
• Enable fast restoration from failures.

More Related Content

What's hot

Multiprotocol label switching
Multiprotocol label switchingMultiprotocol label switching
Multiprotocol label switchingSumita Das
 
Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Online
 
Mpls by vidhu
Mpls by vidhuMpls by vidhu
Mpls by vidhuCU
 
MPLS (Multi-Protocol Label Switching)
MPLS  (Multi-Protocol Label Switching)MPLS  (Multi-Protocol Label Switching)
MPLS (Multi-Protocol Label Switching)NetProtocol Xpert
 
Multiprotocol label switching (mpls) - Networkshop44
Multiprotocol label switching (mpls)  - Networkshop44Multiprotocol label switching (mpls)  - Networkshop44
Multiprotocol label switching (mpls) - Networkshop44Jisc
 
Label Distribution Protocol
Label Distribution ProtocolLabel Distribution Protocol
Label Distribution ProtocolKashif Latif
 
Mpls Traffic Engineering ppt
Mpls Traffic Engineering pptMpls Traffic Engineering ppt
Mpls Traffic Engineering pptNitin Gehlot
 
Multi-Protocol Label Switching: Basics and Applications
Multi-Protocol Label Switching: Basics and ApplicationsMulti-Protocol Label Switching: Basics and Applications
Multi-Protocol Label Switching: Basics and ApplicationsVishal Sharma, Ph.D.
 
An introduction to MPLS networks and applications
An introduction to MPLS networks and applicationsAn introduction to MPLS networks and applications
An introduction to MPLS networks and applicationsShawn Zandi
 
MPLS Concepts and Fundamentals
MPLS Concepts and FundamentalsMPLS Concepts and Fundamentals
MPLS Concepts and FundamentalsShawn Zandi
 

What's hot (20)

Multiprotocol label switching
Multiprotocol label switchingMultiprotocol label switching
Multiprotocol label switching
 
Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Multi protocol label switching (mpls)
Multi protocol label switching (mpls)
 
Mpls by vidhu
Mpls by vidhuMpls by vidhu
Mpls by vidhu
 
MPLS (Multi-Protocol Label Switching)
MPLS  (Multi-Protocol Label Switching)MPLS  (Multi-Protocol Label Switching)
MPLS (Multi-Protocol Label Switching)
 
Mpls technology
Mpls technologyMpls technology
Mpls technology
 
MPLS
MPLSMPLS
MPLS
 
Multiprotocol label switching (mpls) - Networkshop44
Multiprotocol label switching (mpls)  - Networkshop44Multiprotocol label switching (mpls)  - Networkshop44
Multiprotocol label switching (mpls) - Networkshop44
 
Mpls
MplsMpls
Mpls
 
Mpls101
Mpls101Mpls101
Mpls101
 
MPLS ppt
MPLS pptMPLS ppt
MPLS ppt
 
Label Distribution Protocol
Label Distribution ProtocolLabel Distribution Protocol
Label Distribution Protocol
 
Mpls Traffic Engineering ppt
Mpls Traffic Engineering pptMpls Traffic Engineering ppt
Mpls Traffic Engineering ppt
 
Multi-Protocol Label Switching: Basics and Applications
Multi-Protocol Label Switching: Basics and ApplicationsMulti-Protocol Label Switching: Basics and Applications
Multi-Protocol Label Switching: Basics and Applications
 
An introduction to MPLS networks and applications
An introduction to MPLS networks and applicationsAn introduction to MPLS networks and applications
An introduction to MPLS networks and applications
 
Mpls
MplsMpls
Mpls
 
MPLS
MPLSMPLS
MPLS
 
Mpls
MplsMpls
Mpls
 
Mpls Services
Mpls ServicesMpls Services
Mpls Services
 
MPLS Tutorial
MPLS TutorialMPLS Tutorial
MPLS Tutorial
 
MPLS Concepts and Fundamentals
MPLS Concepts and FundamentalsMPLS Concepts and Fundamentals
MPLS Concepts and Fundamentals
 

Viewers also liked

Etiqueta de jabon "JC"
Etiqueta de jabon "JC"Etiqueta de jabon "JC"
Etiqueta de jabon "JC"Hanzo Hasashi
 
S1: Predix ISV Partner Program (Predix Transform 2016)
S1: Predix ISV Partner Program (Predix Transform 2016)S1: Predix ISV Partner Program (Predix Transform 2016)
S1: Predix ISV Partner Program (Predix Transform 2016)Predix
 
PEM1: Device Authentication in IIOT ( Predix Transform 2016)
PEM1:  Device Authentication in IIOT ( Predix Transform 2016)PEM1:  Device Authentication in IIOT ( Predix Transform 2016)
PEM1: Device Authentication in IIOT ( Predix Transform 2016)Predix
 
D6: Cloud Directions ( Predix Transform 2016)
D6: Cloud Directions ( Predix Transform 2016)D6: Cloud Directions ( Predix Transform 2016)
D6: Cloud Directions ( Predix Transform 2016)Predix
 
D4: Predix Cool Features (Predix Transform 2016)
D4: Predix Cool Features (Predix Transform 2016) D4: Predix Cool Features (Predix Transform 2016)
D4: Predix Cool Features (Predix Transform 2016) Predix
 
Border Gateway Protocol
Border Gateway ProtocolBorder Gateway Protocol
Border Gateway ProtocolKashif Latif
 
An Introduction to OAuth 2
An Introduction to OAuth 2An Introduction to OAuth 2
An Introduction to OAuth 2Aaron Parecki
 
Predix Builder Roadshow
Predix Builder RoadshowPredix Builder Roadshow
Predix Builder RoadshowPredix
 
Pas3 Tenancy Design Patterns (Predix Transform 2016)
Pas3 Tenancy Design Patterns (Predix Transform 2016)Pas3 Tenancy Design Patterns (Predix Transform 2016)
Pas3 Tenancy Design Patterns (Predix Transform 2016)ferminordaz
 
Log Analytics with Amazon Elasticsearch Service and Amazon Kinesis - March 20...
Log Analytics with Amazon Elasticsearch Service and Amazon Kinesis - March 20...Log Analytics with Amazon Elasticsearch Service and Amazon Kinesis - March 20...
Log Analytics with Amazon Elasticsearch Service and Amazon Kinesis - March 20...Amazon Web Services
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the CloudGGV Capital
 
Solution Architecture Concept Workshop
Solution Architecture Concept WorkshopSolution Architecture Concept Workshop
Solution Architecture Concept WorkshopAlan McSweeney
 
Solution Architecture – Approach to Rapidly Scoping The Initial Solution Options
Solution Architecture – Approach to Rapidly Scoping The Initial Solution OptionsSolution Architecture – Approach to Rapidly Scoping The Initial Solution Options
Solution Architecture – Approach to Rapidly Scoping The Initial Solution OptionsAlan McSweeney
 
Structured Approach to Solution Architecture
Structured Approach to Solution ArchitectureStructured Approach to Solution Architecture
Structured Approach to Solution ArchitectureAlan McSweeney
 
[Infographic] How will Internet of Things (IoT) change the world as we know it?
[Infographic] How will Internet of Things (IoT) change the world as we know it?[Infographic] How will Internet of Things (IoT) change the world as we know it?
[Infographic] How will Internet of Things (IoT) change the world as we know it?InterQuest Group
 
Mobile Is Eating the World (2016)
Mobile Is Eating the World (2016)Mobile Is Eating the World (2016)
Mobile Is Eating the World (2016)a16z
 

Viewers also liked (20)

Etiqueta de jabon "JC"
Etiqueta de jabon "JC"Etiqueta de jabon "JC"
Etiqueta de jabon "JC"
 
S1: Predix ISV Partner Program (Predix Transform 2016)
S1: Predix ISV Partner Program (Predix Transform 2016)S1: Predix ISV Partner Program (Predix Transform 2016)
S1: Predix ISV Partner Program (Predix Transform 2016)
 
PEM1: Device Authentication in IIOT ( Predix Transform 2016)
PEM1:  Device Authentication in IIOT ( Predix Transform 2016)PEM1:  Device Authentication in IIOT ( Predix Transform 2016)
PEM1: Device Authentication in IIOT ( Predix Transform 2016)
 
D6: Cloud Directions ( Predix Transform 2016)
D6: Cloud Directions ( Predix Transform 2016)D6: Cloud Directions ( Predix Transform 2016)
D6: Cloud Directions ( Predix Transform 2016)
 
D4: Predix Cool Features (Predix Transform 2016)
D4: Predix Cool Features (Predix Transform 2016) D4: Predix Cool Features (Predix Transform 2016)
D4: Predix Cool Features (Predix Transform 2016)
 
Border Gateway Protocol
Border Gateway ProtocolBorder Gateway Protocol
Border Gateway Protocol
 
An Introduction to OAuth 2
An Introduction to OAuth 2An Introduction to OAuth 2
An Introduction to OAuth 2
 
Predix Builder Roadshow
Predix Builder RoadshowPredix Builder Roadshow
Predix Builder Roadshow
 
GE Predix - The IIoT Platform
GE Predix - The IIoT PlatformGE Predix - The IIoT Platform
GE Predix - The IIoT Platform
 
Pas3 Tenancy Design Patterns (Predix Transform 2016)
Pas3 Tenancy Design Patterns (Predix Transform 2016)Pas3 Tenancy Design Patterns (Predix Transform 2016)
Pas3 Tenancy Design Patterns (Predix Transform 2016)
 
Log Analytics with Amazon Elasticsearch Service and Amazon Kinesis - March 20...
Log Analytics with Amazon Elasticsearch Service and Amazon Kinesis - March 20...Log Analytics with Amazon Elasticsearch Service and Amazon Kinesis - March 20...
Log Analytics with Amazon Elasticsearch Service and Amazon Kinesis - March 20...
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
 
Towards Full Stack Security
Towards Full Stack Security Towards Full Stack Security
Towards Full Stack Security
 
Solution Architecture Concept Workshop
Solution Architecture Concept WorkshopSolution Architecture Concept Workshop
Solution Architecture Concept Workshop
 
DDoS Resiliency
DDoS ResiliencyDDoS Resiliency
DDoS Resiliency
 
BGP protocol presentation
BGP protocol  presentationBGP protocol  presentation
BGP protocol presentation
 
Solution Architecture – Approach to Rapidly Scoping The Initial Solution Options
Solution Architecture – Approach to Rapidly Scoping The Initial Solution OptionsSolution Architecture – Approach to Rapidly Scoping The Initial Solution Options
Solution Architecture – Approach to Rapidly Scoping The Initial Solution Options
 
Structured Approach to Solution Architecture
Structured Approach to Solution ArchitectureStructured Approach to Solution Architecture
Structured Approach to Solution Architecture
 
[Infographic] How will Internet of Things (IoT) change the world as we know it?
[Infographic] How will Internet of Things (IoT) change the world as we know it?[Infographic] How will Internet of Things (IoT) change the world as we know it?
[Infographic] How will Internet of Things (IoT) change the world as we know it?
 
Mobile Is Eating the World (2016)
Mobile Is Eating the World (2016)Mobile Is Eating the World (2016)
Mobile Is Eating the World (2016)
 

Similar to MPLS (Multi-Protocol Label Switching): An Overview

Similar to MPLS (Multi-Protocol Label Switching): An Overview (20)

MPLS.ppt
MPLS.pptMPLS.ppt
MPLS.ppt
 
MPLS Lecture1(H)-102020.pdf
MPLS Lecture1(H)-102020.pdfMPLS Lecture1(H)-102020.pdf
MPLS Lecture1(H)-102020.pdf
 
Mpls te
Mpls teMpls te
Mpls te
 
01 introduction to mpls
01 introduction to mpls 01 introduction to mpls
01 introduction to mpls
 
MPLS Tutorial2
MPLS Tutorial2MPLS Tutorial2
MPLS Tutorial2
 
SEGMENT Routing
SEGMENT RoutingSEGMENT Routing
SEGMENT Routing
 
MPLS_cisco.ppt
MPLS_cisco.pptMPLS_cisco.ppt
MPLS_cisco.ppt
 
MPLS
MPLSMPLS
MPLS
 
yun-MPLS.ppt
yun-MPLS.pptyun-MPLS.ppt
yun-MPLS.ppt
 
MPLS101.ppt
MPLS101.pptMPLS101.ppt
MPLS101.ppt
 
MPLS-jpl.ppt
MPLS-jpl.pptMPLS-jpl.ppt
MPLS-jpl.ppt
 
Digital network lecturer3
Digital network  lecturer3Digital network  lecturer3
Digital network lecturer3
 
MPLS-extra.ppt
MPLS-extra.pptMPLS-extra.ppt
MPLS-extra.ppt
 
Traffic Engineering Fault Tolerance Using MPLS Routing - Optical Fiber Commun...
Traffic Engineering Fault Tolerance Using MPLS Routing - Optical Fiber Commun...Traffic Engineering Fault Tolerance Using MPLS Routing - Optical Fiber Commun...
Traffic Engineering Fault Tolerance Using MPLS Routing - Optical Fiber Commun...
 
Mpls
MplsMpls
Mpls
 
MPLS
MPLSMPLS
MPLS
 
mpls.ppt
mpls.pptmpls.ppt
mpls.ppt
 
Broadband Network Presentation
Broadband Network PresentationBroadband Network Presentation
Broadband Network Presentation
 
MPLS
MPLSMPLS
MPLS
 
S.t rajan cjb0912010 ft12
S.t rajan cjb0912010 ft12S.t rajan cjb0912010 ft12
S.t rajan cjb0912010 ft12
 

MPLS (Multi-Protocol Label Switching): An Overview

  • 2. 2 MPLS Overview • A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) • Idea: use a fixed length label in the packet header to decide packet forwarding – Label carried in an MPLS header between the link layer header and network layer header • Support any network layer protocol and link layer protocol
  • 3. 3 MPLS Header Format • Label: 20-bit label value • Exp: experimental use – Can indicate class of service • S: bottom of stack indicator – 1 for the bottom label, 0 otherwise • TTL: time to live Label Exp S TTL 20 3 1 8
  • 4. 4 Forwarding Equivalence Class • An MPLS capable router is called a label switching router (LSR) • Forwarding Equivalence Class (FEC): A subset of packets that are all treated the same way by an LSR • A packet is assigned to an FEC at the ingress of an MPLS domain
  • 5. 5 Forwarding Equivalence Class • A packet’s FEC can be determined by one or more of the following: – Source and/or destination IP address – Source and/or destination port number – Protocol ID – Differentiated services code point – Incoming interface • A particular PHB (scheduling and discard policy) can be defined for a given FEC
  • 6. 6 MPLS Operation • At ingress LSR of an MPLS domain, an MPLS header is inserted to a packet before the packet is forwarded – Label in the MPLS header encodes the packet’s FEC • At subsequent LSRs – The label is used as an index into a forwarding table that specifies the next hop and a new label. – The old label is replaced with the new label, and the packet is forwarded to the next hop. • Egress LSR strips the label and forwards the packet to final destination based on the IP packet header
  • 7. 7 MPLS Operation Intf In Label In Intf Out 3 40 1 Intf In Label In Intf Out Label Out 3 50 1 40 1 2 3 1 2 1 2 3 3 FEC Intf Out Label Out a 1 50 50 40
  • 8. 8 Label Switched Path • For each FEC, a specific path called Label Switched Path (LSP) is assigned – The LSP is unidirectional • To set up an LSP, each LSR must – Assign an incoming label to the LSP for the corresponding FEC • Labels have only local significance – Inform the upstream node of the assigned label – Learn the label that the downstream node has assigned to the LSP • Need a label distribution protocol so that an LSR can inform others of the label/FEC bindings it has made • A forwarding table is constructed as the result of label distribution.
  • 9. 9 Intf In Label In Intf Out 3 40 1 Intf In Label In Intf Out Label Out 3 50 1 40 Label Distribution 47.1 47.247.3 1 2 3 1 2 1 2 3 3 Dest Intf Out Label Out 47.1 1 50 Mapping: 40 Request: 47.1 Mapping: 50 Request: 47.1
  • 10. 10 LSP Route Selection • Hop-by-hop routing: use the route determined by the dynamic routing protocol • Explicit routing (ER): the sender LSR can specify an explicit route for the LSP – Explicit route can be selected ahead of time or dynamically
  • 11. 11 Explicitly Routed LSP • Advantages – Can establish LSP’s based on policy, QoS, etc. – Can have pre-established LSP’s that can be used in case of failures. • Signaling protocols – CR-LDP – RSVP-TE
  • 12. 12 Diffserv-Aware MPLS • MPLS can be used together with Differentiated Services to provide QoS. • LSPs are configured between each ingress-egress pair. – For each ingress-egress pair, a separate LSP can be created for each traffic class, or – Can create a single LSP for each ingress-egress pair and use the Exp bits to differentiate packet classes. • Scalable: as the number of flows increases, the number of LSPs does not increase.
  • 13. 13 Diffserv-Aware MPLS • Operations of routers in an ISP network – At the ingress router, in addition to policing, a MPLS header is inserted into the packet. – Core routers process the packets based on the label and Exp fields – At the egress router, the MPLS header is removed. • Whether a ISP’s architecture is DS field-based or MPLS-based is transparent to other ISPs  The DS field based architecture and the MPLS based architecture can easily inter-operate.
  • 14. 14 Diffserv-Aware MPLS • A customer domain still needs a BB to – Allocate services – Request for resources on behalf of the customer domain when the SLA is dynamic. • BBs may not be needed in the MPLS-based ISP networks – Ingress router can make the admission control decision – If the resource request is granted, ingress router sends a PATH message to egress router through a LSP
  • 15. 15 Why MPLS Protection? • IP restoration is very slow – OSPF, RIP, etc. require a redistribution of updated link status information in response to a failure. – Routing table convergence time on the order of seconds. – Looping and packet loss can occur during convergence • MPLS enables fast failure restoration
  • 16. 16 MPLS Protection Approaches • End-to-End protection – A backup LSP is set up in advance from the source LSR to the destination LSR of the primary LSP. • The backup LSP is link and node disjoint with the primary LSP • Need reserve resources for the backup LSP – Source LSR responsible for restorationsender must be notified of the failure
  • 17. 17 MPLS Protection Approaches • Local protection – When establishing a primary LSP, a backup LSP for each possible link or node failure is set up • Resources reserved for each backup LSP – Failure detecting LSR responsible for switching traffic to the backup LSR – Faster restoration than end-to-end protection
  • 18. 18 Local Protection • Problem: must create a separate set of backup LSPs for every primary LSP • Can a single LSP backup a set of primary LSPs? • Yes! Use MPLS label stacking.
  • 19. 19 Label Stacking • A packet may carry multiple labels, organized as a last-in- first-out stack • A label may be added to/removed from the stack at any LSR • Processing always done on the top label • Allow the aggregation of LSPs into a single LSP for a portion of the route, creating a tunnel – At the beginning of the tunnel, the LSR assigns the same label to packets from different LSPs by pushing the label onto each packet’s stack – At the end of the tunnel, the LSR pops the top label
  • 20. 20 Local Protection Using Label Stacking • Bypass tunnel: a LSP used to protect a set of LSPs passing over a common facility. • Label stacking allows different primary LSPs to use the same bypass tunnel for failure protection.
  • 21. 21 Local Protection Using Label Stacking When a failure occurs: • LSR at the beginning of the tunnel will – Switch packets received on the protected LSP x onto the bypass tunnel – Replace the old label with a new label that will be understood by the last node in the bypass tunnel to indicate LSP x – Push the bypass tunnel's label onto the label-stack of the redirected packets. • LSR at the end of the tunnel will – Pop the bypass tunnel's label – Examine the top label to determine the protected LSP that the packet is to follow.
  • 22. 22 Summary of MPLS • Simplify packet forwarding based on a fixed length label • Enable explicit routing in IP networks – Can be used for traffic management, QoS routing • Enable fast restoration from failures.

Editor's Notes

  1. Start with slide 37
  2. P529 of Stalling for details of TTL RFC 3032
  3. In IP, FEC is destination network
  4. Once a packet is assigned to a FEC, no further header analysis is done by subsequent routers; all forwarding is driven by the labels.
  5. Inform all potential upstream nodes of the assigned label
  6. http://www.ietf.org/internet-drafts/draft-ietf-mpls-rsvp-lsp-fastreroute-07.txt Section 4.1