SlideShare a Scribd company logo
PRESENTATION TITLE HERE
Presenter Name
Date
2 Copyright © 2009 Juniper Networks, Inc. www.juniper.net
BENEFITS OF MPLS
  Some benefits of MPLS include:
§  Improved route lookup time by using labels to forward traffic
§  Additional control over how traffic moves through the network using
traffic engineering
§  High Availability
§  Increased scalability
R1 R2
R3
R4
R5
R6
1
1
3
2
1
1
R7
1
LSP A
LSP B
3 Copyright © 2009 Juniper Networks, Inc. www.juniper.net
HIGH AVAILABILITY
  Ultimate goal – avoid business impact.
  Business = working service – avoid service disruption or degradation.
  Service disruption:
§  Loss for connectivity = continues packet loss over period of time T
§  1GE = 512B with 880Mp/h; 1% loss is 8Mp/h; is continuous - ~38 sec.
§  Delay, jitter, random packet loss (non-continuous)
§  1GE = 512B with 880Mp/h; 1% loss is 8Mp/h; is equally distributed –
multiple breaks 4us each.
  Challenges:
§  Failures – loss of connectivity
§  Congestions
§  Avoid: capacity planning and topology/link engineering, MPLS LSP path
engineering (non-SPF routes).
§  Manage when happens: QoS tooklit.
4 Copyright © 2009 Juniper Networks, Inc. www.juniper.net
MPLS LSP PATH ENGINEERING (NON-SPF ROUTES)
  Technology is there
  Very really used to fine tune path in order to optimize capacity
utilization:
§  OPEX intensive
§  Multiple possible good states – no network banchmark
§  Dynamic or not adaptive to changing traffic pattern
§  Capacity is cheap, at least in Europe
  Is used to control load balancing, SLRG, and as supportibe
mechanism for other MPLS applications.
5 Copyright © 2009 Juniper Networks, Inc. www.juniper.net
LABEL DISTRIBUTION PROTOCOLS
  Overview of Label Distribution Protocols
§  Often referred to as signaling protocols
§  Dynamically establishes a LSP
§  Exchanges label information
§  Examples of label distribution protocols.
§  Resource Reservation Protocol (RSVP)
§  Label Distribution Protocol (LDP)
§  Border Gateway Protocols (BGP)
6 Copyright © 2009 Juniper Networks, Inc. www.juniper.net
HOW MPLS CAN HELP IN DEALING WITH FAILURES
  Baseline
§  Converged state = the optimal, stable state of routing as per routing
policies and protocols algorithm.
§  MPLS can’t converge faster then IGP.
§  LDP – after IGP converge (after last SPF run), active labels are
selected from LIB.
§  RSVP –
§  failure notification need to be delivered to head of each LSP (IGP flood, or
PATH Err/ RESV Thear.) It take time and depend on network delay from
point of failure.
§  Head end re-signal each LSP. It take time and depend on network diameter/
delay to and from tail of LSP (round-trip).
  Pre-compute alternative path
§  Local quick and dirty fix to keep packet delivery.
§  Not converged state of network.
§  LDP – follow IGP – IGP LFA (IPFRR)
§  RSVP
7 Copyright © 2009 Juniper Networks, Inc. www.juniper.net
LOOP FREE ALTERNATES AND LDP
  LFA heavily depend on network topology and IGP costs
§  Triangles are always good
§  Squares and bigger makes problem
  Requires RSVP-TE backup lsp to fix topology problem – escalate
complexity.
  Packet loss limited below 100ms in case of failure
  Packet loss may appear at the end of convergence period of network –
each node make SPF run ao it’s own time.
  Packet loss may appear what fault is fixed, because it is a topology
change which triggers IGP convergence.
X
RSVP RECAP
9 Copyright © 2009 Juniper Networks, Inc. www.juniper.net
PROPERTIES OF LABEL DISTRIBUTION PROTOCOLS
  RSVP
§  Is used for traffic engineering
§  Internet standard for reserving resources
§  Extended to support:
§ Explicit path configuration
§ Path numbering
§ Route recording
§  Provides keepalive status for:
§ Visibility
§ Redundancy
  BGP
§  SCALABILITY !
§  Inherit BGP path selection, NLRI attributes and policy
§  Does not support engineered paths
10 Copyright © 2009 Juniper Networks, Inc. www.juniper.net
RESOURCE RESERVATION PROTOCOL (RSVP)
  RSVP:
§  A generic quality of service (QoS) signaling protocol
§  An Internet control protocol—uses IP as its network layer
§  Designed originally for host-to-host usage
§  Allows for bandwidth reservation
§  Not a data transport protocol
§  Not a routing protocol
§  Uses the IGP to determine paths
11 Copyright © 2009 Juniper Networks, Inc. www.juniper.net
RSVP SESSIONS
  Unidirectional data flows
§  Ingress router initiates connection
  Soft state
§  Path and resources are maintained dynamically
§  Can change during the life of the RSVP session
§  Path message are sent downstream
§  Reservation message are sent upstream
R1
Site 1
Site 2
R2 R4
R3
R5
Site 3
Egress LSR
Path Message
Reservation Message
Ingress LSR
12 Copyright © 2009 Juniper Networks, Inc. www.juniper.net
EXTENDED RSVP
  Extensions added to support establishment and maintenance of LSPs
§  Hello protocol
§  Label distribution
  RSVP is now used for router-to-router connectivity
13 Copyright © 2009 Juniper Networks, Inc. www.juniper.net
TRAFFIC ENGINEERING EXTENSIONS: PATH
  Path message extensions
§  Mandatory:
§  SESSION Object: LSP_TUNNEL_IPv4
§  LABEL_REQUEST Object: Request LSRs to provide a label binding
§  Optional:
§  EXPLICIT_ROUTE object (ERO): Specify predetermined path, independent of
IGP path
•  Strict Hop: Informs the network of exact path to use
•  Loose Hop: LSP must be transited in order. IGP is used
§  RECORD_ROUTE object (RRO): Listing of the LSRs that the LSP tunnel
traverses
§  SESSION_ATTRIBUTE object: Aids in session identification and also controls
path setup priority, holding priority, and local-rerouting features
§  RSVP-HOP object: Contains the previous hop IP address
14 Copyright © 2009 Juniper Networks, Inc. www.juniper.net
TRAFFIC ENGINEERING EXTENSIONS: RESV
§  Resv message extensions
§  Mandatory:
§  SESSION object: uniquely identifies the LSP being established
§  LABEL object: performs the upstream on demand label distribution
process
§  STYLE object: specifies the reservation style (fixed-filter,
wildcard-filter and shared-explicit)
§  Optional:
§  RECORD_ROUTE object: returns the LSPs path to the sender of the path
message
§  HOP object: contains the previous hop IP address
PROTECTION OF RSVP-TE LSP
16 Copyright © 2009 Juniper Networks, Inc. www.juniper.net
TIME TO RECOVERY—NO PROTECTION (1)
  R3 determines that there is a link failure between R3 and R4
§  Packets traversing the LSP begin dropping
§  R3 sends a ResvTear upstream towards the ingress router as notification
of the failure
R1
Site 1
R2 R3
R4
Site 2
Egress LSR
Ingress LSR
PATH
ERO= {R2, R3}
Link Failure
R5
ResvTear
17 Copyright © 2009 Juniper Networks, Inc. www.juniper.net
TIME TO RECOVERY—NO PROTECTION (2)
  R1 reacts to the reception of a ResvTear for the LSP
§  Path and Resv state blocks for LSP are removed
§  R1 attempts to build a new LSP by sending a path message downstream
§  Packets continue to drop
R1
Site 1
R2 R3
R4
Site 2
Egress LSR
Ingress LSR
PATH
ERO= {R2, R3}
Link Failure
R5
PathTear
18 Copyright © 2009 Juniper Networks, Inc. www.juniper.net
TIME TO RECOVERY—NO PROTECTION (3)
  R4 reacts to the reception of a new Path for the LSP
§  Answers by Resv message
§  Packets continue to drop
  R1 receives Resv message, new LSP is established
R1
Site 1
R2 R3
R4
Site 2
Egress LSR
Ingress LSR
PATH
ERO= {R2, R3}
Link Failure
R5
19 Copyright © 2009 Juniper Networks, Inc. www.juniper.net
TIME TO RECOVERY—NO PROTECTION (4)
  A new LSP is established around the failed link
§  Packets are no longer dropped
R1
Site 1
R2 R3
R4
Site 2
Egress LSR
Ingress LSR
PATH
ERO= {R2, R3}
Link Failure
R5
20 Copyright © 2009 Juniper Networks, Inc. www.juniper.net
PRIMARY AND SECONDARY LSP
  End-to-End protection
  Secondary LSP takes 2nd best best form ingress to egress.
  Secondary LSP can have different constrains (afinity group, BW, ERO)
then primary.
  Secondary LSP can be:
§  Computed after failure – previous example, no CSPF.
§  Pre-computed on ingress LSR, but not signaled – previous example w/ CSPF.
§  Pre-computed and pre-signaled
§  Preestablishes and maintains secondary path
§  Eliminates LSP signaling delays when active path fails
§  Additional state information must be maintained – eacj LSP has 2 RSVP sessions.
Avoid this delay
Avoid this delay
Make this delay not impacting traffic switchover
21 Copyright © 2009 Juniper Networks, Inc. www.juniper.net
TIME TO RECOVERY— SECONDARY STANDBY
  R3 determines that there is a link failure between R3 and R4
§  Packets traversing the LSP begin dropping
§  R3 sends a ResvTear upstream towards the ingress router as notification
of the failure
  R1 switch traffic to secondary LSP
R1
Site 1
R2 R3
R4
Site 2
Egress LSR
Ingress LSR
PATH
ERO= {R2, R3}
Link Failure
R5
ResvTear
What if R3 – R2 delay is 500ms ?
22 Copyright © 2009 Juniper Networks, Inc. www.juniper.net
MOTIVATIONS FOR FAST REROUTE
  Ask yourself these questions:
§  Is there a way to get quicker failover in the event of primary LSP failure?
§  How can I reduce packet loss when I lose my primary LSP?
23 Copyright © 2009 Juniper Networks, Inc. www.juniper.net
FAST REROUTE CHARACTERISTICS (1)
  Short-term solution to reduce packet loss
§  Implement the one-to-one backup method defined in
RFC 4090 (use LSP backup)
§  Implement the many-to-one backup method defined in
RFC 4090 (use facility backup)
§  When node or link fails, upstream node:
§  Immediately switch traffic to detour/bypass LSP
§  Signals failure to ingress LSR
Ingress LSP will re-signal LSP in order to get best possible path end-to-end
R1 is Point of Local Repair (PLR); R3 is Merging Point (MP)
R1
Site 1
R2 R3
R4
Site 2
Egress LSR
Ingress LSR
Protected
Interface
R5
Primary LSP
Bypass LSP
(Link Protection)
24 Copyright © 2009 Juniper Networks, Inc. www.juniper.net
ONE TO ONE FRR CHARACTERISTIC
  Implement the one-to-one backup
method defined in
RFC 4090 (use LSP backup)
§  Scalability issue – O(N*M) where
§  N is # of protected nodes
§  M is # of LSP
§  Detour can inherit all constrains
of primary LSP
§  Ring friendly
§  Label swap
§  Use best path form PLR to egress
LSP
§  MP can be any node – first
common node for detour and
primary LSP
X
25 Copyright © 2009 Juniper Networks, Inc. www.juniper.net
FACILITY BACKUP CHARACTERISTICS
  Implement the many-to-one
backup method defined in
RFC 4090 (use facility backup)
§  Good Scalability– O(N) where N is
either
§  # of protected interfaces (link
protection)
§  # of nodes behind protected node
(node-link protection)
§  Tunnels primary LSP over BYPASS
LSP around failure - Label
swap’n’push
§  MP can be either
§  Node connected by faulty link (link
protection)
§  Node immediately behind faulty
node (node-link protection)
§  Use best path form PLR to MP,
but not egress LSR.
X
26 Copyright © 2009 Juniper Networks, Inc. www.juniper.net
COMMON PRACTICE
  In most cases facility backup is in use
  Mostly because of scalability.
27 Copyright © 2009 Juniper Networks, Inc. www.juniper.net
LINK PROTECTION OVERVIEW
  Protects interfaces instead of entire LSP path
§  Implements the facility backup method defined in RFC 4090
§  LSPs must be flagged to make use of a bypass LSP
§  Bypass LSP established around protected interface to adjacent node
§  Established BEFORE any failure, in normal state of network.
§  Uses CSPF to calculate bypass LSP
§  Can add ERO to influence CSPF routing of bypass LSP
Protected
Interface
Primary LSP
Bypass LSP
(Link Protection)
R1
Site 1
R2 R3
R4
Site 2
Egress LSR
Ingress LSR
PATH
ERO= {R2, R3}
R5
ResvTear
28 Copyright © 2009 Juniper Networks, Inc. www.juniper.net
NODE PROTECTION OVERVIEW
§  Protects against failure of downstream node
§  Uses similar mechanisms to link protection
§  Relies on RSVP hello timers to determine node failure
§  LSPs must be flagged to make use of a bypass LSP
§  One bypass LSP established around downstream node
R1
Site 1
R2 R3
R4
Site 2
Egress LSR
Ingress LSR
Protected
Interface
R5
Primary LSP
Bypass LSP
(Node Protection)
Protected
Node
29 Copyright © 2009 Juniper Networks, Inc. www.juniper.net
FACILITY BACKUP AND RING
  Some capacity is wasted, as
traffic U-turns
  This is only short-term, until
network converge, and lead-end
re-signal LSP.
  But what if primary LSP has
constrain which do not allow for
re-signaling?
§  Affinity group
§  Strict/loose hop of faulty link/
node address
  Use secondary path with other
constrains, or
  Traffic stay on bypass until failure
get fixed.
X
X
30 Copyright © 2009 Juniper Networks, Inc. www.juniper.net
WHY FRR IS SO QUICK AND HOW QUICK?
  No need to any routing computation. No control plane involved.
  For each destination (yes even 100’s of 1000’s form BGP)
backup egress interface and encapsulation descriptor are
programmed in FIB.
  After failure is discovered, ASIC need to change pointer from
active be backup descriptor.
§  ASIC FIB data structure is crucial here – indirection!
pfx_a
pfx_a
pfx_a
pfx_a
pfx_a
pfx_a
Pfx_w
Indirect NH 1
Indirect NH 2
final NH 1
final NH 2
final NH 2
Egress IF
L2 encapsulation
31 Copyright © 2009 Juniper Networks, Inc. www.juniper.net
HOW TO FIND PATH FOR BYPASS
  Requirements
§  Best path from PLR to MP – both are on primary e2e LSP
§  Best path is via faulty link/node
§  BYPASS can’t be routed base on shortest path !
  BYPASS need to be signaled with ERO to overcome protected
link/node
§  Manually configured – not scalable
§  Computed by CSPF – to calculate BYPASS ERO, PLR use TED,
“removes” protected link/node form it and runs SPF.
§  Other constrains (affinity group, bandwitch) can be put on BYPASS
ERO calculation
32 Copyright © 2009 Juniper Networks, Inc. www.juniper.net
CONSTRAINT-BASED ROUTING OVERVIEW
  Modified shortest-path-first algorithm
  Integrates TED data
§  IGP topology information, available bandwidth, and Administrative group
§  Determines optimal path and setup order according to
user-provided constraints
§  Maximum hop count (for fast reroute detours)
§  Bandwidth
§  Strict or loose routing (EROs)
§  Administrative groups
§  Priority
  Prunes nonqualifying paths and performs SPF on remaining routes
§  The result is either an ERO that is handed to RSVP for signaling, or a no
route to host error message
33 Copyright © 2009 Juniper Networks, Inc. www.juniper.net
TOPOLOGY INFORMATION DISTRIBUTION
  IGP extensions propagate additional information
§  IS-IS uses TLV tuples
§  OSPF uses opaque LSA Type 10
§  Information propagated within area or level only
  Information propagated:
§  Bandwidth available
§  Administrative Groups (link colors)
§  Router ID
34 Copyright © 2009 Juniper Networks, Inc. www.juniper.net
user@R1> show ospf database opaque-area detail
OSPF database, Area 0.0.0.0
OpaqArea*1.0.0.3 192.168.2.1 0x80000002 4 0x22 0xe2c
124
Area-opaque TE LSA
Link (2), length 100:
Linktype (1), length 1:
2
LinkID (2), length 4:
172.22.220.2
LocIfAdr (3), length 4:
172.22.220.1
RemIfAdr (4), length 4:
0.0.0.0
TEMetric (5), length 4:
1
MaxBW (6), length 4:
1000Mbps
MaxRsvBW (7), length 4:
1000Mbps
UnRsvBW (8), length 32:
Priority 0, 1000Mbps
Priority 1, 1000Mbps
Priority 2, 1000Mbps
Priority 3, 1000Mbps
Priority 4, 1000Mbps
Priority 5, 1000Mbps
Priority 6, 1000Mbps
Priority 7, 1000Mbps
Color (9), length 4:
0
IGP EXTENSION EXAMPLE: OSPF
35 Copyright © 2009 Juniper Networks, Inc. www.juniper.net
THE CSPF ALGORITHM
  For BYPASS protecting given link/node:
1.  Prune protected link/links of protected node
2.  Prune links with insufficient bandwidth (if BYPASS has BW constrain)
3.  Prune links that do not contain an included color (if BYPASS has affinity
group constrain)
4.  Prune links that contain an excluded color (if BYPASS has affinity group
constrain)
5.  Calculate shortest path from ingress to egress consistent with ERO
6.  If equal-cost paths exist, choose the path whose last hop address equals
the LSP's destination
7.  Select among equal-cost paths (least hop, then fill related criteria)
8.  Pass explicit route (ERO) to RSVP
36 Copyright © 2009 Juniper Networks, Inc. www.juniper.net
BYPASS AND SHARED UNDERPLAYING RESOURCE
  CSPF sees only L3 topology – R2-R3 and R2-R5 are
independent
  But they may share same FO, DWDM, or duct/pipe
  Need to feed CSPF with this information
R1
Site 1
R2 R3
R4
Site 2
Egress LSR
Ingress LSR
Protected
Interface
R5
Primary LSP
Bypass LSP
(Node Protection)
Protected
Node
Common
duct
37 Copyright © 2009 Juniper Networks, Inc. www.juniper.net
SLRG INFORMATION FOR CSPF
  Mark links sharing risk by same label
§  Affinity group (only single 32 vector)
§  SLRG extension (N x 32 bit value)
R1
Site 1
R2 R3
R4
Site 2
Egress LSR
Ingress LSR
Protected
Interface
R5
Primary LSP
Bypass LSP
(Node Protection)
Protected
Node
Common
duct
this IF BYPASS
constrain:
Exclude green
38 Copyright © 2009 Juniper Networks, Inc. www.juniper.net
FAILURE EVENT SEQUENCE
  When failure happen:
§  We loose ~ 50 ms of traffic
§  MPLS FRR locally patch the failure – traffic restored
§  E2E LSP ingress router notified
§  Ingress router re-signal new e2e LSP optimal for current topology –
traffic still use old LSP and BYPASS
§  Ingress router move traffic onto new LSP
§  Traffic use new e2e LSP
§  Old LSP exist and use BYPASS, but no traffic on it.
§  After while, ingress router tear down old LSP
  Switching form old LSP to now LSP is LOSS-LESS
§  Thanks to Make-Before-Break
39 Copyright © 2009 Juniper Networks, Inc. www.juniper.net
FAILURE FIXED
  Traffic is on LSP, which is not optimal
§  It was optimal during failure
§  Fixed link/node change topology – better path possible.
  LSP need to be configured for optimization (not necessary default)
  Sequence of events
§  Ingress router is notified about new link by IGP
§  Ingress router signal new e2e LSP optimal for current topology – traffic
still use old LSP
§  After some time, ingress router move traffic onto new LSP
§  Traffic use new e2e LSP
§  Old LSP exist, but no traffic on it.
§  After while, ingress router tear down old LSP
  Switching form old LSP to now LSP is LOSS-LESS
§  This is very different to IGP/LDP/LFA convergency
40 Copyright © 2009 Juniper Networks, Inc. www.juniper.net
FRR IMPACT ON NETWORK SCALING
  Challenges
§  E2E LSP full mesh among PEs
§  Number of BYPASSES
§  MBB – doubling number of LSP for some time
  Network grow
§  Telco considers Next-Gen Architecture with 10.000’s of MPLS
nodes.
§  Simple LSP full mesh do not scale
§  Even IGP/LDP will not scale
  BGP can scale - use it for label distribution
§  No TE or FRR capability
§  BGP free core
41 Copyright © 2009 Juniper Networks, Inc. www.juniper.net
DIVIDE AND CONQUERED
  Seamless MPLS
architecture
  Regions runs independent
IGP and LDP or RSVP.
  All PE in region runs iBGP-
LU (RFC 3107)
  Regions connected by
either
§  eBGP-LU
§  RR
§  has IF in multiple
regions
§  NHS for iBGP paths
 
42 Copyright © 2009 Juniper Networks, Inc. www.juniper.net
SMALL EXAMPLE
R1
R2
R3
R7
R6
R4
R5
43 Copyright © 2009 Juniper Networks, Inc. www.juniper.net
JUNIPER ICONS
Generic Devices (cont.)
BSR-VSR LogicalGeneric Router,
GCSN
CPE Antenna
Generic Racks 1 Rack
1 Unit
1 Rack
Multiple Units
Generic Core Routers
SBC Option 1 SBC Option 2 Secured
Generic Router
GGSN SGSN RNC, BSCMSC
Blue versions of any generic icons represent
general Juniper versions of each.
L2 Switch,
L3 Switch
L2/L3 Switch
AirWavesLightning
44 Copyright © 2009 Juniper Networks, Inc. www.juniper.net
JUNIPER ICONS
Generic Devices (cont.)
Cable Head-End,
Head-End,
Edge QAM
OLT Cable Modem
Termination, M-CMTS
Integrated Media
Gateway
Dial Access Aggregation,
Optical Mix Multiplexer,
ROADM Multiplexer
Optical
OCX
ONT SONET Switch,
ATM Switch
Frame Relay
Switch
DWDM Switch,
WDM Switch
Video
BNG
Voice
Gateway
Voice Home
Gateway
Voice Softswitch VoIP
Gateway
Wireless Access
Point
Continuous
Systems
PBX MSAN, Access Node,
DSLAM
PSTN
Multiservice
Security, Routing
Switching
Multiservice
Security, VOIP, Routing
Switching
Switch, Gigabit Ethernet,
MPLS, MSC, Class 5,
Layer 2, RNC/BNC, SGSN,
Ethernet LAN,
45 Copyright © 2009 Juniper Networks, Inc. www.juniper.net
JUNIPER ICONS
Location (cont.)
Network Cloud
Unlocked Unlocked
with Key
Locked
with Key
NFP Web
Services
Toolkit, VPN Toolkit,
QoS Toolkit,
Security Toolkit
Toolkits
Scenario/Location
PLNOG 7: Rafał Szarecki - MPLS in an advanced version

More Related Content

What's hot

Introduction to MPLS - NANOG 61
Introduction to MPLS - NANOG 61Introduction to MPLS - NANOG 61
Introduction to MPLS - NANOG 61
Richard Steenbergen
 
Traffic Engineering Using Segment Routing
Traffic Engineering Using Segment Routing Traffic Engineering Using Segment Routing
Traffic Engineering Using Segment Routing
Cisco Canada
 
01 introduction to mpls
01 introduction to mpls 01 introduction to mpls
01 introduction to mpls
Achmad Mardiansyah
 
Mpls
MplsMpls
QoS Classification on Cisco IOS Router
QoS Classification on Cisco IOS RouterQoS Classification on Cisco IOS Router
QoS Classification on Cisco IOS Router
NetProtocol Xpert
 
QoS marking on cisco IOS Router
QoS marking on cisco IOS RouterQoS marking on cisco IOS Router
QoS marking on cisco IOS Router
NetProtocol Xpert
 
Implementation of isp mpls backbone network on i pv6 using 6 pe routers main PPT
Implementation of isp mpls backbone network on i pv6 using 6 pe routers main PPTImplementation of isp mpls backbone network on i pv6 using 6 pe routers main PPT
Implementation of isp mpls backbone network on i pv6 using 6 pe routers main PPT
Satish Kumar
 
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]
APNIC
 
Fast Convergence Techniques
Fast Convergence TechniquesFast Convergence Techniques
Fast Convergence Techniques
Bangladesh Network Operators Group
 
Inter-AS MPLS VPN Deployment
Inter-AS MPLS VPN DeploymentInter-AS MPLS VPN Deployment
Inter-AS MPLS VPN Deployment
Bangladesh Network Operators Group
 
BGP Advanced topics
BGP Advanced topicsBGP Advanced topics
BGP Advanced topics
Olivier Bonaventure
 
Nokia L3 VPN Configuration Guide
Nokia L3 VPN Configuration GuideNokia L3 VPN Configuration Guide
Nokia L3 VPN Configuration Guide
Abel Saduwa
 
SDN Traffic Engineering, A Natural Evolution
SDN Traffic Engineering, A Natural EvolutionSDN Traffic Engineering, A Natural Evolution
SDN Traffic Engineering, A Natural Evolution
APNIC
 
MPLS - Multiprotocol Label Switching
MPLS - Multiprotocol Label SwitchingMPLS - Multiprotocol Label Switching
MPLS - Multiprotocol Label Switching
Peter R. Egli
 
BGP Traffic Engineering with SDN Controller
BGP Traffic Engineering with SDN ControllerBGP Traffic Engineering with SDN Controller
BGP Traffic Engineering with SDN Controller
APNIC
 
Mpls-Multi Protocol label Switching
Mpls-Multi Protocol label Switching Mpls-Multi Protocol label Switching
Mpls-Multi Protocol label Switching
Sumit Pathak
 
Building DataCenter networks with VXLAN BGP-EVPN
Building DataCenter networks with VXLAN BGP-EVPNBuilding DataCenter networks with VXLAN BGP-EVPN
Building DataCenter networks with VXLAN BGP-EVPN
Cisco Canada
 
BGP Overview
BGP OverviewBGP Overview
BGP Overview
Matt Bynum
 
MPLS Deployment Chapter 2 - Services
MPLS Deployment Chapter 2 - ServicesMPLS Deployment Chapter 2 - Services
MPLS Deployment Chapter 2 - Services
Ericsson
 
Demystifying Networking Webinar Series- Routing on the Host
Demystifying Networking Webinar Series- Routing on the HostDemystifying Networking Webinar Series- Routing on the Host
Demystifying Networking Webinar Series- Routing on the Host
Cumulus Networks
 

What's hot (20)

Introduction to MPLS - NANOG 61
Introduction to MPLS - NANOG 61Introduction to MPLS - NANOG 61
Introduction to MPLS - NANOG 61
 
Traffic Engineering Using Segment Routing
Traffic Engineering Using Segment Routing Traffic Engineering Using Segment Routing
Traffic Engineering Using Segment Routing
 
01 introduction to mpls
01 introduction to mpls 01 introduction to mpls
01 introduction to mpls
 
Mpls
MplsMpls
Mpls
 
QoS Classification on Cisco IOS Router
QoS Classification on Cisco IOS RouterQoS Classification on Cisco IOS Router
QoS Classification on Cisco IOS Router
 
QoS marking on cisco IOS Router
QoS marking on cisco IOS RouterQoS marking on cisco IOS Router
QoS marking on cisco IOS Router
 
Implementation of isp mpls backbone network on i pv6 using 6 pe routers main PPT
Implementation of isp mpls backbone network on i pv6 using 6 pe routers main PPTImplementation of isp mpls backbone network on i pv6 using 6 pe routers main PPT
Implementation of isp mpls backbone network on i pv6 using 6 pe routers main PPT
 
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]
 
Fast Convergence Techniques
Fast Convergence TechniquesFast Convergence Techniques
Fast Convergence Techniques
 
Inter-AS MPLS VPN Deployment
Inter-AS MPLS VPN DeploymentInter-AS MPLS VPN Deployment
Inter-AS MPLS VPN Deployment
 
BGP Advanced topics
BGP Advanced topicsBGP Advanced topics
BGP Advanced topics
 
Nokia L3 VPN Configuration Guide
Nokia L3 VPN Configuration GuideNokia L3 VPN Configuration Guide
Nokia L3 VPN Configuration Guide
 
SDN Traffic Engineering, A Natural Evolution
SDN Traffic Engineering, A Natural EvolutionSDN Traffic Engineering, A Natural Evolution
SDN Traffic Engineering, A Natural Evolution
 
MPLS - Multiprotocol Label Switching
MPLS - Multiprotocol Label SwitchingMPLS - Multiprotocol Label Switching
MPLS - Multiprotocol Label Switching
 
BGP Traffic Engineering with SDN Controller
BGP Traffic Engineering with SDN ControllerBGP Traffic Engineering with SDN Controller
BGP Traffic Engineering with SDN Controller
 
Mpls-Multi Protocol label Switching
Mpls-Multi Protocol label Switching Mpls-Multi Protocol label Switching
Mpls-Multi Protocol label Switching
 
Building DataCenter networks with VXLAN BGP-EVPN
Building DataCenter networks with VXLAN BGP-EVPNBuilding DataCenter networks with VXLAN BGP-EVPN
Building DataCenter networks with VXLAN BGP-EVPN
 
BGP Overview
BGP OverviewBGP Overview
BGP Overview
 
MPLS Deployment Chapter 2 - Services
MPLS Deployment Chapter 2 - ServicesMPLS Deployment Chapter 2 - Services
MPLS Deployment Chapter 2 - Services
 
Demystifying Networking Webinar Series- Routing on the Host
Demystifying Networking Webinar Series- Routing on the HostDemystifying Networking Webinar Series- Routing on the Host
Demystifying Networking Webinar Series- Routing on the Host
 

Similar to PLNOG 7: Rafał Szarecki - MPLS in an advanced version

MPLS Deployment Chapter 1 - Basic
MPLS Deployment Chapter 1 - BasicMPLS Deployment Chapter 1 - Basic
MPLS Deployment Chapter 1 - Basic
Ericsson
 
MPLS.pptx
MPLS.pptxMPLS.pptx
PLNOG 8: Rafał Szarecki - Telco Group Network
PLNOG 8: Rafał Szarecki - Telco Group Network PLNOG 8: Rafał Szarecki - Telco Group Network
PLNOG 8: Rafał Szarecki - Telco Group Network
PROIDEA
 
Benchmarking Failure Recovery Time in MPLS FRR with Link Protection
Benchmarking Failure Recovery Time in MPLS FRR with Link ProtectionBenchmarking Failure Recovery Time in MPLS FRR with Link Protection
Benchmarking Failure Recovery Time in MPLS FRR with Link Protection
Vaideesh Ravi Shankar
 
Traffic Engineering Fault Tolerance Using MPLS Routing - Optical Fiber Commun...
Traffic Engineering Fault Tolerance Using MPLS Routing - Optical Fiber Commun...Traffic Engineering Fault Tolerance Using MPLS Routing - Optical Fiber Commun...
Traffic Engineering Fault Tolerance Using MPLS Routing - Optical Fiber Commun...
Sakkar Chowdhury
 
Cloud Traffic Engineer – Google Espresso Project by Shaowen Ma
Cloud Traffic Engineer – Google Espresso Project  by Shaowen MaCloud Traffic Engineer – Google Espresso Project  by Shaowen Ma
Cloud Traffic Engineer – Google Espresso Project by Shaowen Ma
MyNOG
 
Configuration & Routing of Clos Networks
Configuration & Routing of Clos NetworksConfiguration & Routing of Clos Networks
Configuration & Routing of Clos Networks
Cumulus Networks
 
S.t rajan cjb0912010 ft12
S.t rajan cjb0912010 ft12S.t rajan cjb0912010 ft12
S.t rajan cjb0912010 ft12
RAJAN ST
 
Interautonomous System PLS VPN Advanced Concepts
Interautonomous System PLS VPN Advanced ConceptsInterautonomous System PLS VPN Advanced Concepts
Interautonomous System PLS VPN Advanced Concepts
Brozaa
 
ether channel_hsrp
ether channel_hsrpether channel_hsrp
ether channel_hsrp
newbie2019
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 4
CCNA (R & S) Module 04 - Scaling Networks - Chapter 4CCNA (R & S) Module 04 - Scaling Networks - Chapter 4
CCNA (R & S) Module 04 - Scaling Networks - Chapter 4
Waqas Ahmed Nawaz
 
MENOG-Segment Routing Introduction
MENOG-Segment Routing IntroductionMENOG-Segment Routing Introduction
MENOG-Segment Routing Introduction
Rasoul Mesghali, CCIE RS
 
PLNOG 13: Julian Lucek: Centralized Traffic Enginnering
PLNOG 13: Julian Lucek: Centralized Traffic EnginneringPLNOG 13: Julian Lucek: Centralized Traffic Enginnering
PLNOG 13: Julian Lucek: Centralized Traffic Enginnering
PROIDEA
 
Routing to SDN Era
Routing to SDN Era Routing to SDN Era
Routing to SDN Era
APNIC
 
TechWiseTV Workshop: Segment Routing for the Datacenter
TechWiseTV Workshop: Segment Routing for the DatacenterTechWiseTV Workshop: Segment Routing for the Datacenter
TechWiseTV Workshop: Segment Routing for the Datacenter
Robb Boyd
 
Performance Analysis of Dynamic Routing Protocols using OPNET
Performance Analysis of Dynamic Routing Protocols using OPNETPerformance Analysis of Dynamic Routing Protocols using OPNET
Performance Analysis of Dynamic Routing Protocols using OPNET
Muzahidul Islam
 
Hallowed be thy packets by Paul Coggin
Hallowed be thy packets by Paul CogginHallowed be thy packets by Paul Coggin
Hallowed be thy packets by Paul Coggin
EC-Council
 
Evolution Network
Evolution NetworkEvolution Network
Evolution Network
APNIC
 
Segment Routing Technology Deep Dive and Advanced Use Cases
Segment Routing Technology Deep Dive and Advanced Use CasesSegment Routing Technology Deep Dive and Advanced Use Cases
Segment Routing Technology Deep Dive and Advanced Use Cases
Cisco Canada
 

Similar to PLNOG 7: Rafał Szarecki - MPLS in an advanced version (20)

MPLS Deployment Chapter 1 - Basic
MPLS Deployment Chapter 1 - BasicMPLS Deployment Chapter 1 - Basic
MPLS Deployment Chapter 1 - Basic
 
MPLS.pptx
MPLS.pptxMPLS.pptx
MPLS.pptx
 
PLNOG 8: Rafał Szarecki - Telco Group Network
PLNOG 8: Rafał Szarecki - Telco Group Network PLNOG 8: Rafał Szarecki - Telco Group Network
PLNOG 8: Rafał Szarecki - Telco Group Network
 
Benchmarking Failure Recovery Time in MPLS FRR with Link Protection
Benchmarking Failure Recovery Time in MPLS FRR with Link ProtectionBenchmarking Failure Recovery Time in MPLS FRR with Link Protection
Benchmarking Failure Recovery Time in MPLS FRR with Link Protection
 
Traffic Engineering Fault Tolerance Using MPLS Routing - Optical Fiber Commun...
Traffic Engineering Fault Tolerance Using MPLS Routing - Optical Fiber Commun...Traffic Engineering Fault Tolerance Using MPLS Routing - Optical Fiber Commun...
Traffic Engineering Fault Tolerance Using MPLS Routing - Optical Fiber Commun...
 
Cloud Traffic Engineer – Google Espresso Project by Shaowen Ma
Cloud Traffic Engineer – Google Espresso Project  by Shaowen MaCloud Traffic Engineer – Google Espresso Project  by Shaowen Ma
Cloud Traffic Engineer – Google Espresso Project by Shaowen Ma
 
Configuration & Routing of Clos Networks
Configuration & Routing of Clos NetworksConfiguration & Routing of Clos Networks
Configuration & Routing of Clos Networks
 
S.t rajan cjb0912010 ft12
S.t rajan cjb0912010 ft12S.t rajan cjb0912010 ft12
S.t rajan cjb0912010 ft12
 
Interautonomous System PLS VPN Advanced Concepts
Interautonomous System PLS VPN Advanced ConceptsInterautonomous System PLS VPN Advanced Concepts
Interautonomous System PLS VPN Advanced Concepts
 
ether channel_hsrp
ether channel_hsrpether channel_hsrp
ether channel_hsrp
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 4
CCNA (R & S) Module 04 - Scaling Networks - Chapter 4CCNA (R & S) Module 04 - Scaling Networks - Chapter 4
CCNA (R & S) Module 04 - Scaling Networks - Chapter 4
 
Ospf
OspfOspf
Ospf
 
MENOG-Segment Routing Introduction
MENOG-Segment Routing IntroductionMENOG-Segment Routing Introduction
MENOG-Segment Routing Introduction
 
PLNOG 13: Julian Lucek: Centralized Traffic Enginnering
PLNOG 13: Julian Lucek: Centralized Traffic EnginneringPLNOG 13: Julian Lucek: Centralized Traffic Enginnering
PLNOG 13: Julian Lucek: Centralized Traffic Enginnering
 
Routing to SDN Era
Routing to SDN Era Routing to SDN Era
Routing to SDN Era
 
TechWiseTV Workshop: Segment Routing for the Datacenter
TechWiseTV Workshop: Segment Routing for the DatacenterTechWiseTV Workshop: Segment Routing for the Datacenter
TechWiseTV Workshop: Segment Routing for the Datacenter
 
Performance Analysis of Dynamic Routing Protocols using OPNET
Performance Analysis of Dynamic Routing Protocols using OPNETPerformance Analysis of Dynamic Routing Protocols using OPNET
Performance Analysis of Dynamic Routing Protocols using OPNET
 
Hallowed be thy packets by Paul Coggin
Hallowed be thy packets by Paul CogginHallowed be thy packets by Paul Coggin
Hallowed be thy packets by Paul Coggin
 
Evolution Network
Evolution NetworkEvolution Network
Evolution Network
 
Segment Routing Technology Deep Dive and Advanced Use Cases
Segment Routing Technology Deep Dive and Advanced Use CasesSegment Routing Technology Deep Dive and Advanced Use Cases
Segment Routing Technology Deep Dive and Advanced Use Cases
 

Recently uploaded

International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
Sebastiano Panichella
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Sebastiano Panichella
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Matjaž Lipuš
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
Faculty of Medicine And Health Sciences
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
Access Innovations, Inc.
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Sebastiano Panichella
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
faizulhassanfaiz1670
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
IP ServerOne
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
Howard Spence
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
Vladimir Samoylov
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Orkestra
 
Gregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptxGregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptx
gharris9
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Access Innovations, Inc.
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
OWASP Beja
 
María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
eCommerce Institute
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
OECD Directorate for Financial and Enterprise Affairs
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
khadija278284
 

Recently uploaded (17)

International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
 
Gregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptxGregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptx
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
 
María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
 

PLNOG 7: Rafał Szarecki - MPLS in an advanced version

  • 2. 2 Copyright © 2009 Juniper Networks, Inc. www.juniper.net BENEFITS OF MPLS   Some benefits of MPLS include: §  Improved route lookup time by using labels to forward traffic §  Additional control over how traffic moves through the network using traffic engineering §  High Availability §  Increased scalability R1 R2 R3 R4 R5 R6 1 1 3 2 1 1 R7 1 LSP A LSP B
  • 3. 3 Copyright © 2009 Juniper Networks, Inc. www.juniper.net HIGH AVAILABILITY   Ultimate goal – avoid business impact.   Business = working service – avoid service disruption or degradation.   Service disruption: §  Loss for connectivity = continues packet loss over period of time T §  1GE = 512B with 880Mp/h; 1% loss is 8Mp/h; is continuous - ~38 sec. §  Delay, jitter, random packet loss (non-continuous) §  1GE = 512B with 880Mp/h; 1% loss is 8Mp/h; is equally distributed – multiple breaks 4us each.   Challenges: §  Failures – loss of connectivity §  Congestions §  Avoid: capacity planning and topology/link engineering, MPLS LSP path engineering (non-SPF routes). §  Manage when happens: QoS tooklit.
  • 4. 4 Copyright © 2009 Juniper Networks, Inc. www.juniper.net MPLS LSP PATH ENGINEERING (NON-SPF ROUTES)   Technology is there   Very really used to fine tune path in order to optimize capacity utilization: §  OPEX intensive §  Multiple possible good states – no network banchmark §  Dynamic or not adaptive to changing traffic pattern §  Capacity is cheap, at least in Europe   Is used to control load balancing, SLRG, and as supportibe mechanism for other MPLS applications.
  • 5. 5 Copyright © 2009 Juniper Networks, Inc. www.juniper.net LABEL DISTRIBUTION PROTOCOLS   Overview of Label Distribution Protocols §  Often referred to as signaling protocols §  Dynamically establishes a LSP §  Exchanges label information §  Examples of label distribution protocols. §  Resource Reservation Protocol (RSVP) §  Label Distribution Protocol (LDP) §  Border Gateway Protocols (BGP)
  • 6. 6 Copyright © 2009 Juniper Networks, Inc. www.juniper.net HOW MPLS CAN HELP IN DEALING WITH FAILURES   Baseline §  Converged state = the optimal, stable state of routing as per routing policies and protocols algorithm. §  MPLS can’t converge faster then IGP. §  LDP – after IGP converge (after last SPF run), active labels are selected from LIB. §  RSVP – §  failure notification need to be delivered to head of each LSP (IGP flood, or PATH Err/ RESV Thear.) It take time and depend on network delay from point of failure. §  Head end re-signal each LSP. It take time and depend on network diameter/ delay to and from tail of LSP (round-trip).   Pre-compute alternative path §  Local quick and dirty fix to keep packet delivery. §  Not converged state of network. §  LDP – follow IGP – IGP LFA (IPFRR) §  RSVP
  • 7. 7 Copyright © 2009 Juniper Networks, Inc. www.juniper.net LOOP FREE ALTERNATES AND LDP   LFA heavily depend on network topology and IGP costs §  Triangles are always good §  Squares and bigger makes problem   Requires RSVP-TE backup lsp to fix topology problem – escalate complexity.   Packet loss limited below 100ms in case of failure   Packet loss may appear at the end of convergence period of network – each node make SPF run ao it’s own time.   Packet loss may appear what fault is fixed, because it is a topology change which triggers IGP convergence. X
  • 9. 9 Copyright © 2009 Juniper Networks, Inc. www.juniper.net PROPERTIES OF LABEL DISTRIBUTION PROTOCOLS   RSVP §  Is used for traffic engineering §  Internet standard for reserving resources §  Extended to support: § Explicit path configuration § Path numbering § Route recording §  Provides keepalive status for: § Visibility § Redundancy   BGP §  SCALABILITY ! §  Inherit BGP path selection, NLRI attributes and policy §  Does not support engineered paths
  • 10. 10 Copyright © 2009 Juniper Networks, Inc. www.juniper.net RESOURCE RESERVATION PROTOCOL (RSVP)   RSVP: §  A generic quality of service (QoS) signaling protocol §  An Internet control protocol—uses IP as its network layer §  Designed originally for host-to-host usage §  Allows for bandwidth reservation §  Not a data transport protocol §  Not a routing protocol §  Uses the IGP to determine paths
  • 11. 11 Copyright © 2009 Juniper Networks, Inc. www.juniper.net RSVP SESSIONS   Unidirectional data flows §  Ingress router initiates connection   Soft state §  Path and resources are maintained dynamically §  Can change during the life of the RSVP session §  Path message are sent downstream §  Reservation message are sent upstream R1 Site 1 Site 2 R2 R4 R3 R5 Site 3 Egress LSR Path Message Reservation Message Ingress LSR
  • 12. 12 Copyright © 2009 Juniper Networks, Inc. www.juniper.net EXTENDED RSVP   Extensions added to support establishment and maintenance of LSPs §  Hello protocol §  Label distribution   RSVP is now used for router-to-router connectivity
  • 13. 13 Copyright © 2009 Juniper Networks, Inc. www.juniper.net TRAFFIC ENGINEERING EXTENSIONS: PATH   Path message extensions §  Mandatory: §  SESSION Object: LSP_TUNNEL_IPv4 §  LABEL_REQUEST Object: Request LSRs to provide a label binding §  Optional: §  EXPLICIT_ROUTE object (ERO): Specify predetermined path, independent of IGP path •  Strict Hop: Informs the network of exact path to use •  Loose Hop: LSP must be transited in order. IGP is used §  RECORD_ROUTE object (RRO): Listing of the LSRs that the LSP tunnel traverses §  SESSION_ATTRIBUTE object: Aids in session identification and also controls path setup priority, holding priority, and local-rerouting features §  RSVP-HOP object: Contains the previous hop IP address
  • 14. 14 Copyright © 2009 Juniper Networks, Inc. www.juniper.net TRAFFIC ENGINEERING EXTENSIONS: RESV §  Resv message extensions §  Mandatory: §  SESSION object: uniquely identifies the LSP being established §  LABEL object: performs the upstream on demand label distribution process §  STYLE object: specifies the reservation style (fixed-filter, wildcard-filter and shared-explicit) §  Optional: §  RECORD_ROUTE object: returns the LSPs path to the sender of the path message §  HOP object: contains the previous hop IP address
  • 16. 16 Copyright © 2009 Juniper Networks, Inc. www.juniper.net TIME TO RECOVERY—NO PROTECTION (1)   R3 determines that there is a link failure between R3 and R4 §  Packets traversing the LSP begin dropping §  R3 sends a ResvTear upstream towards the ingress router as notification of the failure R1 Site 1 R2 R3 R4 Site 2 Egress LSR Ingress LSR PATH ERO= {R2, R3} Link Failure R5 ResvTear
  • 17. 17 Copyright © 2009 Juniper Networks, Inc. www.juniper.net TIME TO RECOVERY—NO PROTECTION (2)   R1 reacts to the reception of a ResvTear for the LSP §  Path and Resv state blocks for LSP are removed §  R1 attempts to build a new LSP by sending a path message downstream §  Packets continue to drop R1 Site 1 R2 R3 R4 Site 2 Egress LSR Ingress LSR PATH ERO= {R2, R3} Link Failure R5 PathTear
  • 18. 18 Copyright © 2009 Juniper Networks, Inc. www.juniper.net TIME TO RECOVERY—NO PROTECTION (3)   R4 reacts to the reception of a new Path for the LSP §  Answers by Resv message §  Packets continue to drop   R1 receives Resv message, new LSP is established R1 Site 1 R2 R3 R4 Site 2 Egress LSR Ingress LSR PATH ERO= {R2, R3} Link Failure R5
  • 19. 19 Copyright © 2009 Juniper Networks, Inc. www.juniper.net TIME TO RECOVERY—NO PROTECTION (4)   A new LSP is established around the failed link §  Packets are no longer dropped R1 Site 1 R2 R3 R4 Site 2 Egress LSR Ingress LSR PATH ERO= {R2, R3} Link Failure R5
  • 20. 20 Copyright © 2009 Juniper Networks, Inc. www.juniper.net PRIMARY AND SECONDARY LSP   End-to-End protection   Secondary LSP takes 2nd best best form ingress to egress.   Secondary LSP can have different constrains (afinity group, BW, ERO) then primary.   Secondary LSP can be: §  Computed after failure – previous example, no CSPF. §  Pre-computed on ingress LSR, but not signaled – previous example w/ CSPF. §  Pre-computed and pre-signaled §  Preestablishes and maintains secondary path §  Eliminates LSP signaling delays when active path fails §  Additional state information must be maintained – eacj LSP has 2 RSVP sessions. Avoid this delay Avoid this delay Make this delay not impacting traffic switchover
  • 21. 21 Copyright © 2009 Juniper Networks, Inc. www.juniper.net TIME TO RECOVERY— SECONDARY STANDBY   R3 determines that there is a link failure between R3 and R4 §  Packets traversing the LSP begin dropping §  R3 sends a ResvTear upstream towards the ingress router as notification of the failure   R1 switch traffic to secondary LSP R1 Site 1 R2 R3 R4 Site 2 Egress LSR Ingress LSR PATH ERO= {R2, R3} Link Failure R5 ResvTear What if R3 – R2 delay is 500ms ?
  • 22. 22 Copyright © 2009 Juniper Networks, Inc. www.juniper.net MOTIVATIONS FOR FAST REROUTE   Ask yourself these questions: §  Is there a way to get quicker failover in the event of primary LSP failure? §  How can I reduce packet loss when I lose my primary LSP?
  • 23. 23 Copyright © 2009 Juniper Networks, Inc. www.juniper.net FAST REROUTE CHARACTERISTICS (1)   Short-term solution to reduce packet loss §  Implement the one-to-one backup method defined in RFC 4090 (use LSP backup) §  Implement the many-to-one backup method defined in RFC 4090 (use facility backup) §  When node or link fails, upstream node: §  Immediately switch traffic to detour/bypass LSP §  Signals failure to ingress LSR Ingress LSP will re-signal LSP in order to get best possible path end-to-end R1 is Point of Local Repair (PLR); R3 is Merging Point (MP) R1 Site 1 R2 R3 R4 Site 2 Egress LSR Ingress LSR Protected Interface R5 Primary LSP Bypass LSP (Link Protection)
  • 24. 24 Copyright © 2009 Juniper Networks, Inc. www.juniper.net ONE TO ONE FRR CHARACTERISTIC   Implement the one-to-one backup method defined in RFC 4090 (use LSP backup) §  Scalability issue – O(N*M) where §  N is # of protected nodes §  M is # of LSP §  Detour can inherit all constrains of primary LSP §  Ring friendly §  Label swap §  Use best path form PLR to egress LSP §  MP can be any node – first common node for detour and primary LSP X
  • 25. 25 Copyright © 2009 Juniper Networks, Inc. www.juniper.net FACILITY BACKUP CHARACTERISTICS   Implement the many-to-one backup method defined in RFC 4090 (use facility backup) §  Good Scalability– O(N) where N is either §  # of protected interfaces (link protection) §  # of nodes behind protected node (node-link protection) §  Tunnels primary LSP over BYPASS LSP around failure - Label swap’n’push §  MP can be either §  Node connected by faulty link (link protection) §  Node immediately behind faulty node (node-link protection) §  Use best path form PLR to MP, but not egress LSR. X
  • 26. 26 Copyright © 2009 Juniper Networks, Inc. www.juniper.net COMMON PRACTICE   In most cases facility backup is in use   Mostly because of scalability.
  • 27. 27 Copyright © 2009 Juniper Networks, Inc. www.juniper.net LINK PROTECTION OVERVIEW   Protects interfaces instead of entire LSP path §  Implements the facility backup method defined in RFC 4090 §  LSPs must be flagged to make use of a bypass LSP §  Bypass LSP established around protected interface to adjacent node §  Established BEFORE any failure, in normal state of network. §  Uses CSPF to calculate bypass LSP §  Can add ERO to influence CSPF routing of bypass LSP Protected Interface Primary LSP Bypass LSP (Link Protection) R1 Site 1 R2 R3 R4 Site 2 Egress LSR Ingress LSR PATH ERO= {R2, R3} R5 ResvTear
  • 28. 28 Copyright © 2009 Juniper Networks, Inc. www.juniper.net NODE PROTECTION OVERVIEW §  Protects against failure of downstream node §  Uses similar mechanisms to link protection §  Relies on RSVP hello timers to determine node failure §  LSPs must be flagged to make use of a bypass LSP §  One bypass LSP established around downstream node R1 Site 1 R2 R3 R4 Site 2 Egress LSR Ingress LSR Protected Interface R5 Primary LSP Bypass LSP (Node Protection) Protected Node
  • 29. 29 Copyright © 2009 Juniper Networks, Inc. www.juniper.net FACILITY BACKUP AND RING   Some capacity is wasted, as traffic U-turns   This is only short-term, until network converge, and lead-end re-signal LSP.   But what if primary LSP has constrain which do not allow for re-signaling? §  Affinity group §  Strict/loose hop of faulty link/ node address   Use secondary path with other constrains, or   Traffic stay on bypass until failure get fixed. X X
  • 30. 30 Copyright © 2009 Juniper Networks, Inc. www.juniper.net WHY FRR IS SO QUICK AND HOW QUICK?   No need to any routing computation. No control plane involved.   For each destination (yes even 100’s of 1000’s form BGP) backup egress interface and encapsulation descriptor are programmed in FIB.   After failure is discovered, ASIC need to change pointer from active be backup descriptor. §  ASIC FIB data structure is crucial here – indirection! pfx_a pfx_a pfx_a pfx_a pfx_a pfx_a Pfx_w Indirect NH 1 Indirect NH 2 final NH 1 final NH 2 final NH 2 Egress IF L2 encapsulation
  • 31. 31 Copyright © 2009 Juniper Networks, Inc. www.juniper.net HOW TO FIND PATH FOR BYPASS   Requirements §  Best path from PLR to MP – both are on primary e2e LSP §  Best path is via faulty link/node §  BYPASS can’t be routed base on shortest path !   BYPASS need to be signaled with ERO to overcome protected link/node §  Manually configured – not scalable §  Computed by CSPF – to calculate BYPASS ERO, PLR use TED, “removes” protected link/node form it and runs SPF. §  Other constrains (affinity group, bandwitch) can be put on BYPASS ERO calculation
  • 32. 32 Copyright © 2009 Juniper Networks, Inc. www.juniper.net CONSTRAINT-BASED ROUTING OVERVIEW   Modified shortest-path-first algorithm   Integrates TED data §  IGP topology information, available bandwidth, and Administrative group §  Determines optimal path and setup order according to user-provided constraints §  Maximum hop count (for fast reroute detours) §  Bandwidth §  Strict or loose routing (EROs) §  Administrative groups §  Priority   Prunes nonqualifying paths and performs SPF on remaining routes §  The result is either an ERO that is handed to RSVP for signaling, or a no route to host error message
  • 33. 33 Copyright © 2009 Juniper Networks, Inc. www.juniper.net TOPOLOGY INFORMATION DISTRIBUTION   IGP extensions propagate additional information §  IS-IS uses TLV tuples §  OSPF uses opaque LSA Type 10 §  Information propagated within area or level only   Information propagated: §  Bandwidth available §  Administrative Groups (link colors) §  Router ID
  • 34. 34 Copyright © 2009 Juniper Networks, Inc. www.juniper.net user@R1> show ospf database opaque-area detail OSPF database, Area 0.0.0.0 OpaqArea*1.0.0.3 192.168.2.1 0x80000002 4 0x22 0xe2c 124 Area-opaque TE LSA Link (2), length 100: Linktype (1), length 1: 2 LinkID (2), length 4: 172.22.220.2 LocIfAdr (3), length 4: 172.22.220.1 RemIfAdr (4), length 4: 0.0.0.0 TEMetric (5), length 4: 1 MaxBW (6), length 4: 1000Mbps MaxRsvBW (7), length 4: 1000Mbps UnRsvBW (8), length 32: Priority 0, 1000Mbps Priority 1, 1000Mbps Priority 2, 1000Mbps Priority 3, 1000Mbps Priority 4, 1000Mbps Priority 5, 1000Mbps Priority 6, 1000Mbps Priority 7, 1000Mbps Color (9), length 4: 0 IGP EXTENSION EXAMPLE: OSPF
  • 35. 35 Copyright © 2009 Juniper Networks, Inc. www.juniper.net THE CSPF ALGORITHM   For BYPASS protecting given link/node: 1.  Prune protected link/links of protected node 2.  Prune links with insufficient bandwidth (if BYPASS has BW constrain) 3.  Prune links that do not contain an included color (if BYPASS has affinity group constrain) 4.  Prune links that contain an excluded color (if BYPASS has affinity group constrain) 5.  Calculate shortest path from ingress to egress consistent with ERO 6.  If equal-cost paths exist, choose the path whose last hop address equals the LSP's destination 7.  Select among equal-cost paths (least hop, then fill related criteria) 8.  Pass explicit route (ERO) to RSVP
  • 36. 36 Copyright © 2009 Juniper Networks, Inc. www.juniper.net BYPASS AND SHARED UNDERPLAYING RESOURCE   CSPF sees only L3 topology – R2-R3 and R2-R5 are independent   But they may share same FO, DWDM, or duct/pipe   Need to feed CSPF with this information R1 Site 1 R2 R3 R4 Site 2 Egress LSR Ingress LSR Protected Interface R5 Primary LSP Bypass LSP (Node Protection) Protected Node Common duct
  • 37. 37 Copyright © 2009 Juniper Networks, Inc. www.juniper.net SLRG INFORMATION FOR CSPF   Mark links sharing risk by same label §  Affinity group (only single 32 vector) §  SLRG extension (N x 32 bit value) R1 Site 1 R2 R3 R4 Site 2 Egress LSR Ingress LSR Protected Interface R5 Primary LSP Bypass LSP (Node Protection) Protected Node Common duct this IF BYPASS constrain: Exclude green
  • 38. 38 Copyright © 2009 Juniper Networks, Inc. www.juniper.net FAILURE EVENT SEQUENCE   When failure happen: §  We loose ~ 50 ms of traffic §  MPLS FRR locally patch the failure – traffic restored §  E2E LSP ingress router notified §  Ingress router re-signal new e2e LSP optimal for current topology – traffic still use old LSP and BYPASS §  Ingress router move traffic onto new LSP §  Traffic use new e2e LSP §  Old LSP exist and use BYPASS, but no traffic on it. §  After while, ingress router tear down old LSP   Switching form old LSP to now LSP is LOSS-LESS §  Thanks to Make-Before-Break
  • 39. 39 Copyright © 2009 Juniper Networks, Inc. www.juniper.net FAILURE FIXED   Traffic is on LSP, which is not optimal §  It was optimal during failure §  Fixed link/node change topology – better path possible.   LSP need to be configured for optimization (not necessary default)   Sequence of events §  Ingress router is notified about new link by IGP §  Ingress router signal new e2e LSP optimal for current topology – traffic still use old LSP §  After some time, ingress router move traffic onto new LSP §  Traffic use new e2e LSP §  Old LSP exist, but no traffic on it. §  After while, ingress router tear down old LSP   Switching form old LSP to now LSP is LOSS-LESS §  This is very different to IGP/LDP/LFA convergency
  • 40. 40 Copyright © 2009 Juniper Networks, Inc. www.juniper.net FRR IMPACT ON NETWORK SCALING   Challenges §  E2E LSP full mesh among PEs §  Number of BYPASSES §  MBB – doubling number of LSP for some time   Network grow §  Telco considers Next-Gen Architecture with 10.000’s of MPLS nodes. §  Simple LSP full mesh do not scale §  Even IGP/LDP will not scale   BGP can scale - use it for label distribution §  No TE or FRR capability §  BGP free core
  • 41. 41 Copyright © 2009 Juniper Networks, Inc. www.juniper.net DIVIDE AND CONQUERED   Seamless MPLS architecture   Regions runs independent IGP and LDP or RSVP.   All PE in region runs iBGP- LU (RFC 3107)   Regions connected by either §  eBGP-LU §  RR §  has IF in multiple regions §  NHS for iBGP paths  
  • 42. 42 Copyright © 2009 Juniper Networks, Inc. www.juniper.net SMALL EXAMPLE R1 R2 R3 R7 R6 R4 R5
  • 43. 43 Copyright © 2009 Juniper Networks, Inc. www.juniper.net JUNIPER ICONS Generic Devices (cont.) BSR-VSR LogicalGeneric Router, GCSN CPE Antenna Generic Racks 1 Rack 1 Unit 1 Rack Multiple Units Generic Core Routers SBC Option 1 SBC Option 2 Secured Generic Router GGSN SGSN RNC, BSCMSC Blue versions of any generic icons represent general Juniper versions of each. L2 Switch, L3 Switch L2/L3 Switch AirWavesLightning
  • 44. 44 Copyright © 2009 Juniper Networks, Inc. www.juniper.net JUNIPER ICONS Generic Devices (cont.) Cable Head-End, Head-End, Edge QAM OLT Cable Modem Termination, M-CMTS Integrated Media Gateway Dial Access Aggregation, Optical Mix Multiplexer, ROADM Multiplexer Optical OCX ONT SONET Switch, ATM Switch Frame Relay Switch DWDM Switch, WDM Switch Video BNG Voice Gateway Voice Home Gateway Voice Softswitch VoIP Gateway Wireless Access Point Continuous Systems PBX MSAN, Access Node, DSLAM PSTN Multiservice Security, Routing Switching Multiservice Security, VOIP, Routing Switching Switch, Gigabit Ethernet, MPLS, MSC, Class 5, Layer 2, RNC/BNC, SGSN, Ethernet LAN,
  • 45. 45 Copyright © 2009 Juniper Networks, Inc. www.juniper.net JUNIPER ICONS Location (cont.) Network Cloud Unlocked Unlocked with Key Locked with Key NFP Web Services Toolkit, VPN Toolkit, QoS Toolkit, Security Toolkit Toolkits Scenario/Location