Upload
khangvd
View
220
Download
0
Embed Size (px)
Citation preview
8/2/2019 1801_Pres
1/50
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties.
Introduction to MPLS
Technology Tutorials
Session 1801
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 2
1801 Introduction to MPLS
Agenda
Introduction
MPLS Fundamentals
MPLS Applications
Traffic Engineering
Resiliency and restoration
MPLS-based VPNs
Advanced Topics
MPLS Support in OPNET
Conclusion
8/2/2019 1801_Pres
2/50
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 3
1801 Introduction to MPLS
What is MPLS?
Different things to different people
One answer
Generic tunneling mechanism
Evolving suite of IETF standard/near standard protocols for the Internetbackbone
Enabling technology for new and converged IP services
Integrates packet switching with network layer routing
De-couples routing from forwarding in an IP network
Works with any routing paradigm
Employs a simple forwarding paradigm called label swapping
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 4
1801 Introduction to MPLS
Origins
Mid 90s
Switch when you can, route when you must
Bring L2 performance to L3 (IP)
Switching (L2)
Simple table lookup
Could be done in hardware at wire speed
IP Routing (L3)
Longest prefix match algorithm
Was performed in software at < wire speed
Make IP networks work more like ATM without the cost andcomplexity
8/2/2019 1801_Pres
3/50
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 5
1801 Introduction to MPLS
MPLS Timeline
Precursors started in mid 1990s
Toshiba (Cell Switching Router)
Ipsilon (IP Switching)
Cisco (Tag Switching)
IBM (Aggregate Route-based IP Switching)
IETF MPLS working group formed in 1997 MPLS was chosen as a generic name for the technology
MPLS RFCs released in 2001
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 6
1801 Introduction to MPLS
MPLS Combines Routing and Switching
IP routing (pure Layer 3 technology) Provides rich functionality: wide range of protocols, interface types, and
speeds
ATM switching (pure Layer 2 technology) Does simple forwarding of Layer 2 protocol packets based on circuit numbers
One view is that MPLS combines the best of both Rich functionality and flexibility of Layer 3 routing
Speed and simplicity of Layer 2 switching
IP Routing ATM SwitchingMultiprotocol Label
Switching
8/2/2019 1801_Pres
4/50
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 7
1801 Introduction to MPLS
Motivation for MPLS Today
Original performance motivations no longer relevant LPM can be done at wire speed
Other factors have taken over Growth and evolution of the Internet
Growing number of users
Increasing need for bandwidth
Diverse service types and QoS requirements
Use of overlapping address space (RFC 1918)
Managing bandwidth vs. buying bandwidth
Limitations of existing core technologies
Movement to a single unified network
Need for scalability in the Internet backbone
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 8
1801 Introduction to MPLS
Agenda
Introduction
MPLS Fundamentals
MPLS Applications
Traffic Engineering
Resiliency and restoration
MPLS-based VPNs
Advanced Topics
MPLS Support in OPNET
Conclusion
8/2/2019 1801_Pres
5/50
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 9
1801 Introduction to MPLS
MPLS Fundamentals
How it works
The Label Switched Path (LSP)
Label Switching Router (LSR) functions
Traffic assignment
Inside the MPLS label
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 10
1801 Introduction to MPLS
Label Switching Router (LSR)
Sets up Label Switched Paths (LSPs)
Forwards traffic along LSPs using label swapping
Can be a router or switch
Runs one or more IP routing protocols
to learn network topology
to distribute MPLS topology state information to other LSRs
to forward native IP packets
8/2/2019 1801_Pres
6/50
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 11
1801 Introduction to MPLS
Label Switched Path (LSP)
A unidirectional tunnel through the MPLS domain For a round trip, two LSPs are required
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 12
1801 Introduction to MPLS
Forwarding Equivalence Class (FEC)
Definition: A group of IP packets that are forwarded in the same way
Packets are classified into FECs
Only once
At the ingress to the MPLS domain
A FEC identifies a set of IP packets to map to an LSP
Packets in the same FEC
Receive the same label from the ingress LSR
Are mapped to the same LSP and forwarded over the same path (or sets ofpaths in the case of multi-path routing)
8/2/2019 1801_Pres
7/50
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 13
1801 Introduction to MPLS
FEC (cont.)
FECs are not necessarily new In conventional IP, a FEC is formed at each routerbased on Layer 3 lookup
Packets with the same longest matching address prefix (based on destinationaddress) are treated in the same way
FECs are currently derived from IP routing protocols
Based on destination IP prefix (IP header)
Mappings can be policy-based (e.g., ToS bits)
MPLS offers additional flexibility and granularity for classification ofFECs, such as
Same egress router or switch
Same longest matching destination address IP prefix
Same longest matching destination IP Prefix AND same Type of Service bits Same application flow
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 14
1801 Introduction to MPLS
MPLS How It Works
LSRs use (extended) link state IGPs to learn network topology
Path setup: For each LSP configured on an ingress LSR:
Ingress LSR looks up or calculates the path
Ingress LSR signals the LSP
Transit and egress LSRs set up labels for the LSP and confirm to ingress LSR
Forwarding: For each packet that arrives on an ingress LSR:
Ingress LSRs assigns traffic to LSPs based on FEC
Interior LSRs forward traffic using label switching
Egress LSR forwards traffic based on IP or VPN rules
8/2/2019 1801_Pres
8/50
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 15
1801 Introduction to MPLS
MPLS Domain Boundaries
IP packet enters the MPLS domain
Ingress LSR (LSR1) assigns a label and forwards the packet to the next hop in the
label switched path (LSP) Intermediate LSR (LSR2, LSR3) does a simple lookup, swaps the label, and forwards
the packet
Egress LSR (LSR4) or Penultimate hop (LS3) removes the label and forwards thepacket using based on conventional IP or VPN rules
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 16
1801 Introduction to MPLS
Path Setup Example
LSR1 transmits a Label Request message to LSR4 Each downstream router modifies the route list
LSR4 transmits a Label Mapping message to LSR1 LSR4 assigns an inbound label and transmits upstream
Intermediate LSRs (LSR3 and LSR2) Store outbound label provided by downstream LSR
Assign an inbound label and transmit upstream
LSR1 binds the label to the FEC
8/2/2019 1801_Pres
9/50
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 17
1801 Introduction to MPLS
Packet Forwarding Example
Ingress: LSR1
Egress: LSR 4
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 18
1801 Introduction to MPLS
MPLS Label
Short fixed length identifier used to designate a FEC
Has local significance only
Changes from hop to hop
For IP, the label is contained in a shim header
For ATM the label is VPI/VCI
For Frame Relay the label is DLCI
8/2/2019 1801_Pres
10/50
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 19
1801 Introduction to MPLS
MPLS Packet Format and Shim Header
MPLS is often described as introducing a shim header between theoriginal layer 2 and layer 3 headers
This is the reason MPLS is sometimes described as Layer 2.5
The 32-bit MPLS shim header is added to the IP header
Maps network layer routing to data link layer switched paths
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 20
1801 Introduction to MPLS
Where Does MPLS Fit in the OSI Model?
MPLS works with and supports Layer 3 technologies, but does nothave routing and addressing
MPLS is not Layer 3
MPLS is not Layer 2
MPLS is Layer 2.5 Shim Layer
It helps Layer 2 and Layer 3 fit better
8/2/2019 1801_Pres
11/50
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 21
1801 Introduction to MPLS
Label Stacking
Labels can be ordered hierarchically in a stack
Label stacks permit nesting of LSPs
Similar to ATM VPs for aggregating multiple VCs, but MPLS supportsarbitrary levels of hierarchy
Can be used to reduce the number of LSPs through the core
Only top label is swapped
Packets are forwarded based on the value of the label at the top of the stack
Last-in, first-out stack
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 22
1801 Introduction to MPLS
Label Stacking Example
Useful for IP/MPLS VPNs and TE (illustrated later)
Also used to support resiliency (FRR bypass tunnels)
8/2/2019 1801_Pres
12/50
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 23
1801 Introduction to MPLS
MPLS Routing
Topology Determination
Path Determination
IGP
CSPF
Explicit Routing
IP Routing Interactions
Load Balancing
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 24
1801 Introduction to MPLS
Topology Determination
Definition: An MPLS domain is a set of physically connected LSRs(includes LSRs acting as LERs)
Routers within an MPLS domain use routing protocols to discover thenetwork topology
MPLS IGPs: OSPF-TE and ISIS-TE
MPLS EGP: BGP4
8/2/2019 1801_Pres
13/50
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 25
1801 Introduction to MPLS
LSP Path Determination
Path determination options depending on label distribution protocol
LSP paths can be determined using
LDP: Routers calculate dynamically using IGP
Selects IGP shortest path
RSVP-TE: Routers calculate dynamically using CSPF
Selects shortest path that meets constraints
RSVP-TE: Network operator specifies using Explicit Routes (ERs)
Uses configured ERs
Multiple Explicit Routes can be configured per LSP
Primary (no more than one)
Secondary (zero or more)
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 26
1801 Introduction to MPLS
LSP Attributes
Path Definition Defined at ingress LSR
Remote destination (usually loopback address)
Path Selection and Management Administratively configured explicit routes
Explicit routes may be mandatory
Fallback to CSPF
CSPF constraints, including:
Required bandwidth
Maximum hop count
Resource classes: eligibility to use a link Must be consistent with resource classes configured on interface
Priority (Setup and Holding) Used for preemption (policy-based bumping) in dynamic routing
Resilience Mode (Recovery policy)
8/2/2019 1801_Pres
14/50
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 27
1801 Introduction to MPLS
Constraint-Based Shortest Path First(CSPF)
Automated constraint-based TE is its intent Associate flow requirements with a FEC
Track new link state parameters
TE Extensions to OSPF and IS-IS
Calculate the shortest path across the MPLS domain that
Meets the flow requirement based on current network state
Meets a set of constraints specified in LSP attributes
Path cost based on Dijkstras shortest path first (SPF) algorithm Build a network graph
Graph edge (link) cost: inherit or override IGP link cost
Apply constraints: prune a link if
Insufficient resources to accommodate the LSP
Link cannot satisfy LSP local constraints (e.g. resource classes) Compute shortest (least-cost) path using the pruned graph
Path must also satisfy LSP constraints (e.g. maximum hops)
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 28
1801 Introduction to MPLS
Explicit Routing
Explicitly routed LSPs
Sometimes referred to as Traffic Engineered Tunnels
Administratively pinning routes of LSPs
Done manually or automatically (e.g., using a TE computation)
Can mix and match with dynamically routed LSPs
Local (selected LSPs, partial mesh) a.k.a. Tactical
Global (full mesh among LERs)
Permits centralized, global decision making for traffic engineering
Explicit Routes are the output (decision variables) of TE
Indirectly enables QoS- and service-level-focused mechanisms Assuring that certain traffic or service types traverse certain network resources
(devices, links)
Possibly computed using external TE solution
8/2/2019 1801_Pres
15/50
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 29
1801 Introduction to MPLS
Explicitly Routed LSPs
Explicit routes can be strictly or loosely defined Strict: All hops are specified from ingress to egress, that is, each next hop is
directly connected (fully pinned)
Loose: The path between ingress and egress is partially specified (partiallypinned). When the next hop is not directly connected, use IGP or CSPF toreach it.
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 30
1801 Introduction to MPLS
Agenda
Introduction
MPLS Fundamentals
MPLS Applications
Traffic Engineering
Resiliency and restoration
MPLS-based VPNs
Advanced Topics
MPLS Support in OPNET
Conclusion
8/2/2019 1801_Pres
16/50
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 31
1801 Introduction to MPLS
Traffic Engineering
Top-level view Capacity Planning: placing bandwidth to support traffic
Traffic Engineering: placing traffic where there is bandwidth
MPLS ability to arbitrarily segregate flows at whatever level ofgranularity is desired and to route those flows independently of oneanother (regardless of source/destination addresses) forms the basis fortraffic engineering
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 32
1801 Introduction to MPLS
MPLS Traffic Engineering
MPLS traffic engineering defined
Definition
Controlling traffic in a predictable manner to maintain service levels
Goal
Optimize network resource utilization and traffic performance
Three types
Inline TE performed on a device using local information
Online TE done using global information by a central serverconnected to the network
Offline TE done by a server external to the network usingglobal information
8/2/2019 1801_Pres
17/50
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 33
1801 Introduction to MPLS
Why TE?
Bandwidth availability Infrastructure limitations, lead times
Pipe size granularity issues
Class-of-service routing
Knobs to tweak under failure scenarios
Hedge against traffic issues
Uncertainty, growth, fluctuations
Economics
Especially today
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 34
1801 Introduction to MPLS
Traditional IP TE Motivation
Problem: Hyper-aggregation of flows
8/2/2019 1801_Pres
18/50
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 35
1801 Introduction to MPLS
Traditional IP TE Cycle
ClassicallyUnstable
Still flawed, but lessso with predictive
tools
Solution approach: Trial and Error
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 36
1801 Introduction to MPLS
The Problem with Traditional IP TE
Brute force solution
8/2/2019 1801_Pres
19/50
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 37
1801 Introduction to MPLS
TE with MPLS
MPLS Tactical LSP Solution
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 38
1801 Introduction to MPLS
MPLS Traffic Engineering
Online/Offline
MPLS provides the building blocks to perform IP traffic engineeringbetter, but it does not provide the full TE solution
TE presents an opportunity to solve some global optimizationproblems focused on balancing loads and improving service levels
This requires new TE software, methodology, and processes
8/2/2019 1801_Pres
20/50
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 39
1801 Introduction to MPLS
MPLS Online/Offline TE Process
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 40
1801 Introduction to MPLS
MPLS TE Automated Model-Building
Automatically constructing a detailed, operationally correct model ofthe existing network
Topology (nodes and links)
Detailed device and protocol configuration
Existing LSPs, their configuration, routes
Link and LSP usage information
IF-MIB (Cisco), IF-MIB extension (Juniper)
(Optionally) traffic
Usual imperfect sources
3rd party systems
TMS (Cisco)
Traffic inference
8/2/2019 1801_Pres
21/50
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 41
1801 Introduction to MPLS
MPLS TE Explicit Route Generation
Automated design and analysis of traffic engineering solutions againstoperational goals
Design
CSPF versus explicit routing
Explicit route computations (primary, secondary, restoration, etc.)
Analysis
Performance analysis (e.g., design utilization metrics, device and linkusage/subscription metrics, delay metrics, etc.)
Failure analysis
Traffic growth analysis
Topology analysis
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 42
1801 Introduction to MPLS
Global LSP Optimization vs. Greedy LSP
Routing
Greedy: Ingress router uses the constrained shortest path at LSP setup time
The setup order can greatly affect the overall solution quality
Global optimization: use a holistic view to generate a globally optimal solution
Example: Largest LSP (size 8) takes its shortest path, other LSPs are blocked
8
12
8
6
6 - blocked
Routed second
8/2/2019 1801_Pres
22/50
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 43
1801 Introduction to MPLS
MPLS TE Validation
Supports network operations in understanding and using expertjudgment about the final changes to be implemented
Must be supported on two levels:
Summary reports on MPLS configuration adds, deletes, or changes and theirimpact on design criteria and operational tolerances
Ability to directly review and diff configurations for the affected devices
Validation concerns include:
Correctness
Value of changes
Ensuring that decisions were based on accurate and current data
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 44
1801 Introduction to MPLS
MPLS TE Deployment
Ability to parse the validated configuration results generated by thesystem into a form most useful for implementation
Issues here are:
Deployment model (matter of operations preference)
Granularity, order, chunking
Deployment means
Direct through device configlets, SNMP, NMS/OSS interfaces
Requires Change Management functions consistent with deploymentmodel and means
Ability to introduce, check point, archive, and back out configuration changes
8/2/2019 1801_Pres
23/50
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 45
1801 Introduction to MPLS
MPLS TE Automating the Process
The answer to What is the appropriate time scale for this cycle?drives automation
Closer to being a reality in the technology than one that will beaccepted organizationally
IP/Optical and other NGN initiatives may contribute to accelerating thetechnology and increasing its acceptance
Expect a gradual transition through
Human operated
At each process step
Human supervised
For validation and to supervise deployment
Exception managed Operated like IGPs are today
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 46
1801 Introduction to MPLS
MPLS TE Results on an Example Network
Basic MPLS TE load balancingvia primary ERs improves networkperformance
Survivable TE assures networkfailure resilience
Note: Results are network-specific.
96%
41%
39%
0%
20%
40%
60%
80%
100%
CSPF TE
Maximum Link Utilization
Failure
Normal
8/2/2019 1801_Pres
24/50
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 47
1801 Introduction to MPLS
Summary: TE Options
Inline (CSPF)+ Still better than IGP routing
+ Least overall complexity
+ No need for external TE system
- Non-optimal use of bandwidth
- Still need process or mechanism to sizeLSPs
- Vendor interoperability issues?
Online/Offline TE (ERs)+ Most efficient use of bandwidth
+ Better protection (SRGs)
- Can be operationally complex
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 48
1801 Introduction to MPLS
MPLS TE Deployment Considerations
Governed by underlying topology, traffic mix and applications
MPLS topology different deployment models for LSP topology(flat/hierarchical)
Flow segregation different strategies for flow segregation onto LSPs (FECs)
Application-specific deployment to support specific applications or services(QoS/ToS per-hop behaviors)
8/2/2019 1801_Pres
25/50
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 49
1801 Introduction to MPLS
MPLS Topology For Traffic Engineering
For TE purposes, MPLS is deployed in the core routers (or aTE layer internal to the core routers)
Deployment scenarios include
Tactical deployment to fix a particular problem
Alleviate congestion
Improve service level(s)
Fully traffic-engineered flows
Motivated by measurement it enables and control
Full-mesh or hierarchical
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 50
1801 Introduction to MPLS
MPLS Topology For Tactical TE
To alleviate congestion, an LSP is created to move one of theflows on the congested link to an alternate (non-IGP) route
8/2/2019 1801_Pres
26/50
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 51
1801 Introduction to MPLS
MPLS Topology A Full TE Mesh
Enables measurement octet/packet counts on each LSP
Enables control routing decisions per LSP if needed
Flat Deployment Hierarchical Deployment
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 52
1801 Introduction to MPLS
Intermission
8/2/2019 1801_Pres
27/50
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 53
1801 Introduction to MPLS
Agenda
Introduction
MPLS Fundamentals
MPLS Applications
Traffic Engineering
Resiliency and restoration
MPLS-based VPNs
Advanced Topics
MPLS Support in OPNET
Conclusion
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 54
1801 Introduction to MPLS
MPLS Resiliency and Restoration
An LSP becomes unusable if any network resource along its route fails
LSP restoration mechanisms can be setup at different time scales
Mechanisms generally have a tradeoff between the time required to restoreservice after a failure, resources used, and complexity of configuration
Slower mechanisms tend to provide better long-term solutions in terms ofnetwork resources
Faster mechanisms protect in-flight data but at the cost of sub-optimal use ofnetwork resources
Some carriers seeking near SONET (50 milliseconds) restoration times
Multiple mechanisms make sense
A networks resiliency is the degree to which the network cansuccessfully survive failures
8/2/2019 1801_Pres
28/50
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 55
1801 Introduction to MPLS
Resiliency and Restoration
Can occur at one or several layers Optical layer
SONET layer
MPLS layer
IP layer
Routing protocol convergence
Configuring restoration mechanisms at all layers can be expensive
Need to balance cost and complexity of planning for resiliency withcost and risk of a failure.
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 56
1801 Introduction to MPLS
Types of Failures
Link Failures
Node Failures
Shared Risk Group (SRG) Failures
SRGs are collections of network resources that share the same risk offailure.
Examples:
Circuits that traverse that same physical fiber span (fiber cut)
Devices in the same building (natural disaster)
Devices sharing the same power supply (power failure)
8/2/2019 1801_Pres
29/50
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 57
1801 Introduction to MPLS
MPLS Restoration Two Common Means
Path protection Head end can reroute what it signaled
Longer-term, more optimized, repair made at the source
Motivation is quality of repair at a cost of speed ~ O(seconds)
(Alternative strategy: have an alternate LSP up and running whose usage undernormal conditions is precluded using metrics)
Local protection
Temporary, likely sub-optimal, repair made locally in the neighborhood of thepoint of failure to keep critical flows up
Motivation is speed ~ O(milliseconds)
Attempt to keep data in flight until more permanent repair can be made
Example: Fast Reroute
Path and local protection are complementary
One is a short term fix, the other a long(er) term fix
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 58
1801 Introduction to MPLS
Path Protection
8/2/2019 1801_Pres
30/50
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 59
1801 Introduction to MPLS
Link Protection (Local)
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 60
1801 Introduction to MPLS
Node Protection (Local)
8/2/2019 1801_Pres
31/50
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 61
1801 Introduction to MPLS
SRG Protection (Local)
Protected SRG
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 62
1801 Introduction to MPLS
MPLS Protection Approaches
Path protection
Failover to CSPF route
Default
Requires head-end router to detect failure, recompute shortest path on the remainingnetwork, and set up new path (may be several seconds)
Failover to precomputed secondary route
Requires head-end router to detect failure and set up new path
The secondary route should be failure disjoint from the primary
Secondary route only uses resources when the primary fails
Failover to backup (standby) LSP
For each primary LSP, one or more backup LSPs are designated
Backup LSPs are set up before failures occur and can consume resources under non-failure conditions
Can be set up with zero bandwidth
TE metric used to prevent use of the backup LSP under non-failure conditions
Head-end router switches from primary to backup when it detects the failure
8/2/2019 1801_Pres
32/50
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 63
1801 Introduction to MPLS
MPLS Protection Approaches
Local protection Each LSR in the path has a precomputed alternate next-hop LSP to replace thephysical next hop if the primary becomes unavailable (Cisco Fast Reroute)
Requires stackable LSPs (LSPs riding other LSPs)
Does not require head-end signaling (45-50 milliseconds typical)
Does not use additional resources until the failure occurs
Temporary solution until head-end router can restore the LSP
Physical layer protection
Relying on the SONET redundancy features to handle link failures before theyare detected by IP/MPLS (< 50 milliseconds)
Hybrid strategies
Example protection strategy:
Platinum/Real-time traffic (VoIP/Video): FRR
Gold/Premium: secondary explicit routes
Bronze/Best effort: no protection
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 64
1801 Introduction to MPLS
Agenda
Introduction
MPLS Fundamentals
MPLS Applications
Traffic Engineering
Resiliency and restoration
MPLS-based VPNs
Advanced Topics
MPLS Support in OPNET
Conclusion
8/2/2019 1801_Pres
33/50
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 65
1801 Introduction to MPLS
MPLS-Enabled IP VPNs
Head-to-head with MPLS TE in importance
MPLS VPNs (Virtual Private Networks) are inherently based onMPLS ability to segregate flows in this case on a per VPN (i.e. percustomer) basis from provider edge (PE) to provider edge (PE)
Key motivators (analogous to FR/ATM) for MPLS VPNs
Revenue
Address space reuse and overall ease of management, security, etc.
Ability to address customer service levels (via routing or in combination withQoS mechanisms) and monitor customer traffic
Granularity of decisions available under failure conditions
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 66
1801 Introduction to MPLS
MPLS-Based VPNs
Motivation for MPLS VPNs
MPLS-Based Layer 2 VPNs
MPLS-Based Layer 3 VPNs
Tradeoffs MPLS-Based Layer 2 versus Layer 3 VPNs
8/2/2019 1801_Pres
34/50
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 67
1801 Introduction to MPLS
Motivation for MPLS L2 VPNs
Have a single network technology for all types of services PE-to-PEregardless of the customer-facing technology (decouple PE technologyfrom CE technology)
One operations center, reduced staff, one OSS/BSS infrastructure
A single MPLS infrastructure enables traditional (FR, ATM) and new(Ethernet) VPN services over a single Packet-over-SONET (POS)infrastructure
Network consolidation for SPs offering private data and IP services
New revenue opportunity for IP services only providers
Simplify provisioning
Signaling and label stacking
Touch only edge devicesScalability
Core switches aggregate MPLS tunnels (label stacked) and thus managesfewer connections
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 68
1801 Introduction to MPLS
MPLS-Based Layer 2 VPNs
Martini MPLS Layer 2 VPNs
Encapsulations for Frame Relay, Ethernet port /802.1q VLAN, ATM AAL5,ATM Cells, and PPP/HDLC
Provider pre-provisions outer (service-related) LSPs all services look like avirtual circuit to the MPLS network
Each service is provisioned over MPLS using LDP signaling by associatingeach endpoint with common VC identifier (VCID)
e.g., for FR, the port/DLCI at each end is associated with the same VCID
Network automatically determines VC Label to push onto the layer 2 frame
LDP sessions advertise VC Labels for VCIDs
Network also determines Tunnel Label to stack on top based on usual routing
8/2/2019 1801_Pres
35/50
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 69
1801 Introduction to MPLS
Martini MPLS Layer 2 VPNs
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 70
1801 Introduction to MPLS
Example L2 VPN Frame Relay
FR from customer premises (e.g., FRAD) to edge LSR
Edge LSR
Translates FR DLCIs
Maintains VC Label to in/out port and DLCI mappings
MPLS defines the label distribution and encapsulation
FR PDU (including header, FECN and BECN bits, ) transported intheir entirety edge to edge
FR DE bit mapped to MPLS EXP values
8/2/2019 1801_Pres
36/50
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 71
1801 Introduction to MPLS
Example L2 VPN ATM
ATM from customer premises (e.g., ATM Switch) to edge LSR
Edge LSR
Translates ATM VPI/VCIs
Maintains VC label to in/out port and VPI/VCI mappings
MPLS defines the label distribution and encapsulation
AAL5 and ATM cell transport modes are supported
AAL5 mode reassembles ATM PDUs from a VC into a packet
Cell mode transports each ATM cell as a packet
CLP bit to EXP field mapping supported
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 72
1801 Introduction to MPLS
Example L2 VPN Ethernet
Ethernet/FastEthernet/GigabitEthernet from customer premises (e.g.,Ethernet Switch) to edge LSR
Edge LSR
Translates MAC addresses
Maintains MAC label to in/out port and optionally VLAN mappings
MPLS defines the label distribution and encapsulation
Ethernet frame is transported
VLAN tags are transported
Priority to EXP field mapping
8/2/2019 1801_Pres
37/50
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 73
1801 Introduction to MPLS
Kompella MPLS Layer 2 VPNs
Similarities with Martini VPNs Similar approach to label stacking for scalability
Similar applications (ATM, FR, Metro Ethernet)
Differences
VPN membership information distributed automatically via BGP
VPN sites can be added with little provisioning
BGP permits Service Provider to inter-work unlike media (e.g., ATM and FR)in a scalable fashion over MPLS
Extended service offerings
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 74
1801 Introduction to MPLS
VPLS (Virtual Private LAN Services)
Martini VPNs only provide point-to-point connectivity
VPLS builds upon Martini to provide multipoint connectivity
Alternative to L3 MPLS VPNs
Ethernet based (Virtual LAN) Per-customer broadcast domain
Full mesh of Martini tunnels between PE devices
PE devices learn MAC forwarding information just like regular Ethernetswitch
Frames with unknown MAC addresses are broadcast
Full mesh and broadcast nature of Ethernet creates scalability issues Hierarchical-VPLS (H-VPLS) addresses these limitations
2 tier architecture
Draft-ietf-l2vpn-vpls-ldp-01.txt
8/2/2019 1801_Pres
38/50
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 75
1801 Introduction to MPLS
MPLS-Based Layer 3 VPNs
Mature technology based on BGP/MPLS VPNs RFC2547
Services enabled
IP VPNs to enterprise customers
Inter-provider VPNs hook two VPNs together across providers
Carrier-of-carrier services
IP transport to retail ISPs BGP/MPLS VPN across carrier core only
IP transport to SP itself providing L2/L3 services BGP/MPLS VPN acrossthe network of SP and carrier
Mature technology
Large-scale deployments
Hardware optimized for scalability in excess of 1000 VPNs per PE
Mature provisioning/management software
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 76
1801 Introduction to MPLS
MPLS Topology for MPLS BGP VPNs
VPNs with MPLS and BGP Internet Draft draft-rosen-rfc2547bis-03.txt (Feb 2001)
Three device roles are defined CE (customer edge) Router
PE (provider edge) LSR
P (provider core) LSR
PE device:multiple virtual routing/forwarding (VRF) tables One forwarding table per set of directly attached sites with common VPN
membership
Customer routes are extended with unique label (Route Distinguisher)
Permits private addressing
Multiprotocol BGP (MBGP) extensions advertise VPN reachability
PE LSRs participate in a full mesh of MBGP that distributes VPN labels
LDP typically used to distribute path labels from PE-to-PE routers Uses MPLS hop-by-hop routing along IGP path
P routers do not need to be aware of VPN routes
8/2/2019 1801_Pres
39/50
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 77
1801 Introduction to MPLS
PE
CE
IP
1) Receive IP and
send IP datagram
to PE via ATM, FR,
Ethernet, etc.
IP 2547 L2 MPLSMPLS L1
2) Add RFC 2547
Header Label for
VPN ID.
Add MPLS tunnel;
label and send to
MPLS network.
RFC 2547: Forwarding Plane
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 78
1801 Introduction to MPLS
CE
PE
CE
IP
3) Pop MPLS tunnel
label.
4) Pop VPN label and
send to CE.
IP 2547 L2 MPLSMPLS L1
RFC 2547: Forwarding Plane
8/2/2019 1801_Pres
40/50
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 79
1801 Introduction to MPLS
CE 1
PE 1P
1) CE1 PE 1
Exchange routers
with IGP (Rip, OSPF,IS-IS)
192.168.10.0/24.
2) PE 1 build VRF for
VRF BLUE 192.168.10.0/24.
VRF Blue
RFC 2547: Control Plane
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 80
1801 Introduction to MPLS
CE 1
PE 1
PE 2
CE 2
AB
4) PE 2 build VRF Blue VPN
for 192.168.10.0/24.
VRF Blue
P
3) PE1 PE 2
Exchange routes for Blue VPN
with BGP 192.168.10.0/24.
Do not share with P routers.
Use LDP tunnel or RSVP.
RFC 2547: Control Plane
8/2/2019 1801_Pres
41/50
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 81
1801 Introduction to MPLS
CE
CE
192.168.10.0/24 192.168.10.0/24
192.168.10.0/24192.168.10.0/24
Company B
Company A
VRF Blue
VRF Red
RFC-2547: Overlapping Private Addresses
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 82
1801 Introduction to MPLS
CE
CE
192.168.10.0/24 192.168.10.0/24
192.168.10.0/24192.168.10.0/24
Company B
BGP
RD 1 (blue)
RFC-2547: Overlapping Private Addresses
192.168.10.0/24
RD 2 (red) 192.168.10.0/24
8/2/2019 1801_Pres
42/50
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 83
1801 Introduction to MPLS
MPLS L2 VPNs Versus L3 VPNs
L2 VPNs (Martini/Kompella/VPLS)
Positives: Traditional L2 VPN from customersperspective
Provider not routing customer traffic
Single network architecture andinfrastructure for both Internet and VPNtraffic
Decouples core and edge technologies
Auto-provisioning via LDP setup
Negatives: Point-to-point focus
(Martini/Kompella)
Scalability (VPLS)
Not as flexible in terms of serviceopportunities
L3 VPNs (RFC2547)
Positives: Value-added service for customers that
want to outsource
Mature technology
Lots of (somewhat esoteric) serviceopportunities QoS/CoS, carrier ofcarriers, inter-SP VPNs
Negatives:Not transparent - migration requires
effort
Customer must peer with provider
CE device must be a router
Some customers strongly object to thisinvasion of privacy
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 84
1801 Introduction to MPLS
Agenda
Introduction
MPLS Fundamentals
MPLS Applications
Traffic Engineering
Resiliency and restoration
MPLS-based VPNs
Advanced Topics
MPLS Support in OPNET
Conclusion
8/2/2019 1801_Pres
43/50
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 85
1801 Introduction to MPLS
Advanced Topics
Implementing QoS in MPLS
IP Routing Interactions
IGP Interactions
Load Balancing
Status of MPLS
Whos working on MPLS
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 86
1801 Introduction to MPLS
Implementing QoS in MPLS
Multiple service levels (e.g., Bronze, Gold, Platinum)
Service Level assignment based on VPN (ingress port) or ToS (IPheader)
8/2/2019 1801_Pres
44/50
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 87
1801 Introduction to MPLS
Implementing QoS in MPLS LSP-based
Strategy 1: Apply QoS to LSP Multiple LSPs between each ingress/egress LER (full mesh per service level!)
Destination IP address & ToS, or VPN, used in FEC
L-LSP
LSPs differentiated by
Setup/Hold Priorities (for dynamic/CSPF routing)
Primary Explicit Routes (favoring some LSPs in global optimization)
Protection mechanisms (Fast Reroute, Secondary Explicit Routes)
Resource classes (to reserve shortest paths for best service)
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 88
1801 Introduction to MPLS
Implementing QoS in MPLS
IPQoS-based
Strategy 2: Piggyback underlying IP QoS
Single LSP between each ingress/egress LER
Destination address (only) used in FEC
E-LSP
Use ToS to assign EXP bits in MPLS Shim header
Configure transit LSRs to provide favorable queuing based on EXP bits
Must provide protection mechanisms (Fast Reroute, Secondary ERs) andadequate bandwidth (primary and protection) to all LSPs
8/2/2019 1801_Pres
45/50
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 89
1801 Introduction to MPLS
Implementing QoS in MPLS DiffServ TE
Strategy 3: DiffServ TE
OPNETWORK 1825Advanced Topics in MPLS: QoS, DiffServ TE, and GMPLS
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 90
1801 Introduction to MPLS
IP Routing Interactions
In an operational network, routing can be configured in a number ofways so that flows are routed using LSPs
BGP ingress/egress mode
Flows entering the network at an AS boundary can have their BGP next hopset to point to an LSP
Mechanism used for L3 MPLS VPNs
IGP Shortcut LSP
Examples are Ciscos Autoroute and Juniper IGP Shortcuts
Visible at head-end LER only
After IGP routing has computed the shortest path tree, a post processing step
is used to replace IGP next hops with shortcut LSP paths Forwarding Adjacency LSPs
Directly used in the IGP shortest path computation as layer-3 adjacencies
More predictable and intuitive than shortcuts
Results in N2 adjacencies in an LSP mesh
8/2/2019 1801_Pres
46/50
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 91
1801 Introduction to MPLS
IGP Interactions
IGPs often support equal-weight split path routing at each hop alongthe IGP path to a destination
The number of splits per hop is small typically four, but it is configurable
The number of splits compounds geometrically hop-to-hop (4x4x4, )
This creates de-facto load balancing under the best of circumstances
Can also create congestion where the equal-weight paths (IGP link weights areconfigured) do not reflect the link capacities along the paths
MPLS deployment disables IGP split pathing
MPLS can be configured similarly to provide split path routing alongparallel LSPs
Splitting is proportional to LSP bandwidth
Splitting occurs only once at the ingress of the parallel LSPs
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 92
1801 Introduction to MPLS
Load Balancing
There are two categories of load balancing in MPLS
Path selection
When multiple equal cost paths to egress are available, CSPF can use tiebreaking rules to select the one to use:
Random randomly select a path to use
Least-fill prefer the path with the largest minimum available bandwidthratio
Most-fill prefer the path with the smallest minimum availablebandwidth ratio
where available bandwidth ratio = (avail bw on link)/(max reservable bwon link)
Balancing traffic over multiple LSPs
Per-prefix (IP addr/netmask) keeps individual flows on one route
Per-packet can split individual flows over multiple LSPs in proportion tothe bandwidth of the LSPs
8/2/2019 1801_Pres
47/50
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 93
1801 Introduction to MPLS
Status of MPLS
Lots of excitement
Hundreds of deployments worldwide
Cisco reported >200 deployments in 2003
Almost all providers offing some form of MPLS VPN service
Most are doing TE within their core
Standardization work continues
RFCs, internet drafts
Interoperability labs
University of New Hampshire's InterOperability Lab
Isocore Internetworking Lab
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 94
1801 Introduction to MPLS
Whos Working on MPLS?
8/2/2019 1801_Pres
48/50
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 95
1801 Introduction to MPLS
Agenda
Introduction
MPLS Fundamentals
MPLS Applications
Traffic Engineering
Resiliency and restoration
MPLS-based VPNs
Advanced Topics
MPLS Support in OPNET
Conclusion
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 96
1801 Introduction to MPLS
OPNET Support for MPLS?
MPLS data collection
Routers, LSPs, configuration
LSP utilization
Cisco, Juniper, Foundry
MPLS modeling, simulation & optimization
CSPF (OSPF-TE, ISIS-TE), ERs
LDP, RSVP
QoS, Diffserv-TE
Failure analysis
Traffic engineering optimization
Resiliency design
MPLS VPNs
L2 (Martini, Kompella, VPLS) & L3 (RFC 2547)
Graphical provisioning wizard
Views to study logical VPN topology
Support for MPLS-related R&D
8/2/2019 1801_Pres
49/50
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 97
1801 Introduction to MPLS
Agenda
Introduction
MPLS Fundamentals
MPLS Applications
Traffic Engineering
Resiliency and restoration
MPLS-based VPNs
Advanced Topics
MPLS Support in OPNET
Conclusion
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 98
1801 Introduction to MPLS
References
Books
MPLS Technologies and Applications (Bruce Davie and Yakov Rekhter,Morgan Kaufmann, 2000)
Advanced MPLS Design and Implementation (Vivek Alwayn, ciscopress.com,2002)
MPLS and VPN Architectures (Ivan Pepelnjak and Jim Guichard,ciscopress.com, 2001)
Many vendors have literature posted on their websites
RFC and Internet draft documents
http://www.ietf.org/html.charters/mpls-charter.html
MPLS Forum http://www.mplsforum.org
MPLS Resource Center
http://www.mplsrc.com
8/2/2019 1801_Pres
50/50
Copyright 2005 OPNET Technologies, Inc. Confidential, not for distribution to third parties. 99
1801 Introduction to MPLS
Other MPLS-Related Sessions
Network Tutorials Track 1818 Introduction to VPNs
1825 Advanced Topics in MPLS: QoS, DiffServ TE, and GMPLS
Network Analysis, Planning and Troubleshooting
1331 Planning and Analyzing VPN Architectures
1310 Planning, Analyzing, and Optimizing MPLS TE and FRR Deployments
1354 Planning, Analyzing, and Optimizing DiffServ TE and MPLS QoS
Discrete Event Simulation for R&D
1511 Understanding MPLS Model Internals
1801 Introduction to MPLS
Take-Away Points
Main Concepts
Separates control and data plane
Supports multiple routing paradigms
Simple forwarding paradigm (label swapping)
Enables advanced IP Services
Triple Play (Voice, Video, and Data) with QoS
Traffic Engineering
Resiliency and restoration
VPNs
Compatible with existing technologies ATM, Frame Relay, Ethernet
Broadly supported in OPNET products
Import: VNE Server and MVI
Simulation and design: SP Guru